2013-2015 Submitted By-Piyush Mantri Poonam Kothari Pooja Parmar Submitted to-Vikas jain
2013-2015
Submitted By-Piyush Mantri Poonam Kothari Pooja Parmar
Submitted to-Vikas jain
Content
i. Firewall securityii. Massage securityiii. Data securityiv. Document security
Firewall
Firewalls•Isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others. Network gateway, handles incoming & outgoing traffic, Access manager, blocks/grants access to services, networks
firewall
administerednetwork
publicInternet
firewall
Modem
Firewall Design
Firewalls: Whyprevent denial of service(DoS) attacks:
SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections.
prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with something else
allow only authorized access to inside network (set of authenticated users/hosts)
two types of firewalls: application-level packet-filtering
Firewall
• Packet Filter– scans IP address, port number– block specific addresses, ports– Stateful: adds connection filtering
• Application Proxy– scans packet payload– filter harmful data, program commands
• Personal– combination of filter & proxy
• Packet Filter– harmful data passes through
• Application Proxy– unknown application vulnerabilities
The Benefits The Drawbacks
Messag
e Securi
ty
MESSAGE SECURITY
Messaging Security is a program that provides protection for companies messaging infrastructure.
It protects all the personal message of the company which are related to company’s vision and mission.
Encryption as the basis of Message security
Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key.
Its provide a protection against harmful factors affecting our data. Its purpose is only to secure our data.
AdvantagesNo can figure out the private key from the corresponding public key. Hence, the key management problems is mostly confined to the management of private keys
The need for sender and receiver to share secret information over public channels is completely eliminated.
Data security
Data Security
Many large organizations use computers to store important data (information). Large companies, government departments, colleges and hospitals all keep important information, for example, employee records and wages, patient or student records and accounts.
Why?
1. Efficiency2. Accuracy3. Capacity4. Sharing and Transmission etc.
Why your Information Sensitive? What would happen if your competitor had a copy of a spreadsheet file
containing your short and long term sales strategy?What could a resourceful private detective and a cunning lawyer do with
information on your computer?
Sensitive Information
Sensitive information is any information stored on your computer that you would hate to have fall into the wrong hands. This could be personal information, employee information, trade secrets, etc. It is the ramifications that are the concern.
Data Security
Data Security
There are two problems with keeping this information on computers. The first problem is information can be lost through technical or human error.
The second problem is that some information is confidential - only certain people should see it. These people can be described as ‘authorized users’ and the people who shouldn’t see this information as ‘unauthorized users’.
Security of Data
Data
Confidentiality
Data
Integrity
Data
Availability
Secure Data
Data
Document security