Internet Security
-
Upload
rakesh-padiyath -
Category
Documents
-
view
31 -
download
0
description
Transcript of Internet Security
INTERNET SECURITY
WHAT IS INTERNET SECURITY?Internet security is a branch of computer security specifically related to the internet.It’s objective is to establish rules and measures to use against attacks over the internet
TYPES OF SECURITY SECURITY
Network layer security IPSec Protocol Electronic mail security (E-mail)
PGP MIME S/MIME
NETWORK LAYER SECURITYUses cryptographic methodsUsed for securing communications on internet
WHAT ARE THE RISK?
Vulnerabilities
Phishing
Virus
Hacking
Trojan horses
VULNERABILITIESIn computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance.To be vulnerable, an attacker must have at least one applicable tool or technique that can connect to a system weakness
IDENTIFYING & REMOVING VULNERABILITIES
Removal methods
constant vigilancebest practices in deployment auditing
PHISHINGIn the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
PHISHING TECHNIQUES
Phishing techniques
Link manipulation Filter evasion Phone phishing
LINK MANIPULATION
Most methods of phishing use some form of technical deception designed to make a link in an e-mail (and the spoofed website it leads to) appear to belong to the spoofed organization
The following example link, http://en.wikipedia.org/wiki/Genuine, appears to take you to an article entitled "Genuine"; clicking on it will in fact take you to the article entitled "Deception"
FILTER EVASIONPhishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
PHONE PHISHINGNot all phishing attacks require a fake websiteMessages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accountsVishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
MAIN TARGETS FOR PHISHING SCAMS
WHAT IS COMPUTER VIRUS?
A computer virus is a computer program that can
copy itself and infect a computer
The term "virus" is also commonly but
erroneously used to refer to other types
of malware, including but not limited
to adware and spyware programs that do not
have the reproductive ability
HOW DOES IT SPREAD?
HOW TO PREVENT VIRUS INVASION?Load only software from original disk or CD’s.Execute only programs of which you are familiar as to their originCheck all shareware and free programs Purchase a virus program that runs as you boot or work your computer
HACKINGIn common usage, a hacker is a stereotypical person who breaks into computers and computer networks, either for profit or motivated by the challenge.
HACKING TECHNIQUES
TECHNIQES
Vulnerability scanner
Passw
ord cr
ackin
g Packet sniffer
Spoofi
ng attack
Social engineering Trojan horses
Vir
use
s
HOW WE CAN AVOID THESE RISKS?We must use antivirus software’sWe must use firewall for hacker attacksWe shouldn’t open every filesWhen we receive an email we should be
carefulWe shouldn’t share our personal information
on internetWe shouldn’t accept every file, when we talk
our friends such as msn messenger
ROLE OF FIREWALLS IN INTERNET SECURITY
A firewall controls access between networksIt generally consists of gateways and filters which vary from one firewall to anotherFirewalls act as the intermediate server between SMTP and HTTP connections
TYPES OF FIREWALLS
FIREWALLS
Packet Filters Circuit-Level GatewaysApplication-Level Gateways
A presentation bySREEJITH.SUIT NTA
THANK YOU