internet security
Post on 02-Nov-2014
49 Views
Preview:
DESCRIPTION
TRANSCRIPT
1
2
Types of securities
Attack From Internet
Security products
Conclution
3
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide.
What’s internet security
Internet security is a branch of computer security specifically related to the Internet, often involving browser security
4
TYPES OF SECURITIES
Network layer security
Internet Protocol Security
Security token
Electronic mail security
5
NETWORK LAYER SECURITYThe network layer, commonly referred to as the physical interface between the host system and the network hardware.
It defines how data packets are to be formatted for transmission and routings
Network layer can be made secure with the help of cryptographic methods and protocols developed for securing communications on the Internet.
6
INTERNET PROTOCOL SECURITY
Internet Protocol Security is a protocol for securing Internet Protocol communications by authenticating and encrypting the data.
IPsec can be used in protecting data flows between a pair of hosts or between a pair of security gateways or between a security gateway and a host
7
SECURITY TOKENA security token is a physical device that an authorized user of computer services is given to ease authentication.
Security tokens are used to prove one's identity electronically.
The token acts like an electronic key to access something.
8
ELECTRONIC MAIL SECURITY
The protection of email from unauthorized access and inspection is known as email security .
This email security is used to prevent an cracker to acess.
9
ATTACK FROM INTERNET
Denial-of-service attack
Buffer overflow attacks
Malicious software
10
DENIAL-OF-SERVICE ATTACK
DoS attack is an attempt to make a machine or network resource unavailable to its original users.
It generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
Buffer overflow attacks In computer security and programming, a buffer overflow, is an Software bug where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory.
11
MAMALICIOUS SOFTWAREOUS SOFTWARE
Malicious software is software used to disrupt computer operation, or gather sensitive information, or gain access to private computer systems
Main Types of Malicious softwareVirusesWormsTrojan horse
12
VIRUSES A computer virus is a type of malicious software that, when
executed, replicates by inserting copies of itself into other program.
Worms
A computer worm is a malware program that replicates itself, across a network to other computers.
Trojan horse
A Trojan horse in computing is a non-self-replicating type of malware program containing malicious code that, when executed in a slower process.
13
INTERNET
products
14
Firewalls
Antivirus
15
FIREWALLS
Firewall is a technological barrier designed to prevent unauthorizition between computer networks or hosts.
A firewall controls access between networks. It generally consists of gateways and filters.
Firewalls also screen network traffic and are able to block traffic that is dangerous.
16
ANTIVIRUSAntivirus, is computer software used to prevent, detect and remove malicious computer viruses.
Antivirus software blocks known malicious web sites that attempt to install malware
17
Internet securities main objective is to establish rules and measures to use against attacks over the Internet.
18
19
THANK YOU
top related