Top Banner

Click here to load reader

of 21

IT

May 27, 2015

ReportDownload

Education

about security

  • 1. 2013-2015Submitted By-Piyush Mantri Poonam Kothari Pooja ParmarSubmitted to-Vikas jain

2. i. Firewall security ii. Massage security iii. Data security iv. Document security 3. FirewallsfirewallIsolates organizations internal net from larger Internet, allowing some packets to pass, blocking others. Network gateway, handles incoming & outgoing traffic, Access manager, blocks/grants access to services, networksModemadministered networkpublic Internet firewall 4. Firewall Design 5. Firewalls: Why prevent denial of service(DoS) attacks: SYN flooding: attacker establishes many bogus TCP connections, no resources left for real connections. prevent illegal modification/access of internal data. e.g., attacker replaces CIAs homepage with something else allow only authorized access to inside network (set of authenticated users/hosts) two types of firewalls: application-level packet-filtering 6. Firewall The Benefits Packet Filter scans IP address, port number block specific addresses, ports Stateful: adds connection filtering Application Proxy scans packet payload filter harmful data, program commands Personal combination of filter & proxyThe Drawbacks Packet Filter harmful data passes through Application Proxy unknown application vulnerabilities 7. MESSAGE SECURITY Messaging Security is a program that provides protectionfor companies messaging infrastructure. protects all the personal message of the company which Itare related to companys vision and mission. 8. Encryption as the basis of Message security Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key. Its provide a protection against harmful factors affecting our data. Its purpose is only to secure our data. 9. Advantages No can figure out the private key from the correspondingpublic key. Hence, the key management problems is mostly confined to the management of private keys The need for sender and receiver to share secret informationover public channels is completely eliminated. 10. Data Security Many large organizations use computers to store important data (information). Large companies, government departments, colleges and hospitals all keep important information, for example, employee records and wages, patient or student records and accounts.Why? 1. Efficiency 2. Accuracy 3. Capacity 4. Sharing and Transmission etc. 11. Data Security Why your Information Sensitive? What would happen if your competitor had a copy of a spreadsheet file containing your short and long term sales strategy? What could a resourceful private detective and a cunning lawyer do with information on your computer? Sensitive Information Sensitive information is any information stored on your computer that you would hate to have fall into the wrong hands. This could be personal information, employee information, trade secrets, etc. It is the ramifications that are the concern. 12. Data Security There are two problems with keeping this information on computers. The first problem is information can be lost through technical or human error. The second problem is that some information is confidential only certain people should see it. These people can be described as authorized users and the people who shouldnt see this information as unauthorized users. 13. Security of Data DataConfidentialityDataIntegrityDataSecure DataDataAvailability