Top Banner
2013-2015 Submitted By-Piyush Mantri Poonam Kothari Pooja Parmar Submitted to-Vikas jain
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IT

2013-2015

Submitted By-Piyush Mantri Poonam Kothari Pooja Parmar

Submitted to-Vikas jain

Page 2: IT

Content

i. Firewall securityii. Massage securityiii. Data securityiv. Document security

Page 3: IT

Firewall

Page 4: IT

Firewalls•Isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others. Network gateway, handles incoming & outgoing traffic, Access manager, blocks/grants access to services, networks

firewall

administerednetwork

publicInternet

firewall

Modem

Page 5: IT

Firewall Design

Page 6: IT

Firewalls: Whyprevent denial of service(DoS) attacks:

SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections.

prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with something else

allow only authorized access to inside network (set of authenticated users/hosts)

two types of firewalls: application-level packet-filtering

Page 7: IT

Firewall

• Packet Filter– scans IP address, port number– block specific addresses, ports– Stateful: adds connection filtering

• Application Proxy– scans packet payload– filter harmful data, program commands

• Personal– combination of filter & proxy

• Packet Filter– harmful data passes through

• Application Proxy– unknown application vulnerabilities

The Benefits The Drawbacks

Page 8: IT

Messag

e Securi

ty

Page 9: IT

MESSAGE SECURITY

Messaging Security is a program that provides protection for companies messaging infrastructure.

It protects all the personal message of the company which are related to company’s vision and mission.

Page 10: IT

Encryption as the basis of Message security

Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key.

Its provide a protection against harmful factors affecting our data. Its purpose is only to secure our data.

Page 11: IT

AdvantagesNo can figure out the private key from the corresponding public key. Hence, the key management problems is mostly confined to the management of private keys

The need for sender and receiver to share secret information over public channels is completely eliminated.

Page 12: IT

Data security

Page 13: IT

Data Security

Many large organizations use computers to store important data (information). Large companies, government departments, colleges and hospitals all keep important information, for example, employee records and wages, patient or student records and accounts.

Why?

1. Efficiency2. Accuracy3. Capacity4. Sharing and Transmission etc.

Page 14: IT

Why your Information Sensitive? What would happen if your competitor had a copy of a spreadsheet file

containing your short and long term sales strategy?What could a resourceful private detective and a cunning lawyer do with

information on your computer?

Sensitive Information

Sensitive information is any information stored on your computer that you would hate to have fall into the wrong hands. This could be personal information, employee information, trade secrets, etc. It is the ramifications that are the concern.

Data Security

Page 15: IT

Data Security

There are two problems with keeping this information on computers. The first problem is information can be lost through technical or human error.

The second problem is that some information is confidential - only certain people should see it. These people can be described as ‘authorized users’ and the people who shouldn’t see this information as ‘unauthorized users’.

Page 16: IT

Security of Data

Data

Confidentiality

Data

Integrity

Data

Availability

Secure Data

Data

Page 17: IT

Document security

Page 18: IT
Page 19: IT
Page 20: IT
Page 21: IT