Top Banner

of 19

internet security

Nov 02, 2014




  • 1. 1

2. Types of securities Attack From Internet Security products Conclution 2 3. The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide. Whats internet security Internet security is a branch of computer security specifically related to the Internet, often involving browser security 3 4. TYPES OF SECURITIES Network layer security Internet Protocol Security Security token Electronic mail security 4 5. NETWORK LAYER SECURITY The network layer, commonly referred to as the physical interface between the host system and the network hardware. It defines how data packets are to be formatted for transmission and routings Network layer can be made secure with the help of cryptographic methods and protocols developed for securing communications on the Internet. 5 6. INTERNET PROTOCOL SECURITY Internet Protocol Security is a protocol for securing Internet Protocol communications by authenticating and encrypting the data. IPsec can be used in protecting data flows between a pair of hosts or between a pair of security gateways or between a security gateway and a host 6 7. SECURITY TOKEN A security token is a physical device that an authorized user of computer services is given to ease authentication. Security tokens are used to prove one's identity electronically. The token acts like an electronic key to access something. 7 8. ELECTRONIC MAIL SECURITY The protection of email from unauthorized access and inspection is known as email security . This email security is used to prevent an cracker to acess. 8 9. ATTACK FROM INTERNET Denial-of-service attack Buffer overflow attacks Malicious software 9 10. DENIAL-OF-SERVICE ATTACK DoS attack is an attempt to make a machine or network resource unavailable to its original users. It generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Buffer overflow attacks In computer security and programming, a buffer overflow, is an Software bug where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. 10 11. MAMALICIOUS SOFTWAREOUS SOFTWARE Malicious software is software used to disrupt computer operation, or gather sensitive information, or gain access to private computer systems Main Types of Malicious software Viruses Worms Trojan horse 11 12. VIRUSES A computer virus is a type of malicious software that, when executed, replicates by inserting copies of itself into other program. Worms A computer worm is a malware program that replicates itself, across a network to other computers. Trojan horse A Trojan horse in computing is a non-self-replicating type of malware program containing malicious code that, when executed in a slower process. 12 13. INTERNET products 13 14. Firewalls Antivirus 14 15. FIREWALLS Firewall is a technological barrier designed to prevent unauthorizition between computer networks or hosts. A firewall controls access between networks. It generally consists of gateways and filters. Firewalls also screen network traffic and are able to block traffic that is dangerous. 15 16. ANTIVIRUS Antivirus, is computer software used to prevent, detect and remove malicious computer viruses. Antivirus software blocks known malicious web sites that attempt to install malware 16 17. Internet securities main objective is to establish rules and measures to use against attacks over the Internet. 17 18. 18 19. 19