YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: internet security

1

Page 2: internet security

2

 Types of securities

Attack From Internet

Security products

Conclution

Page 3: internet security

3

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide.

What’s internet security

Internet security is a branch of computer security specifically related to the Internet, often involving browser security

Page 4: internet security

4

TYPES OF SECURITIES

Network layer security

Internet Protocol Security

Security token

Electronic mail security

Page 5: internet security

5

NETWORK LAYER SECURITYThe network layer, commonly referred to as the physical interface between the host system and the network hardware.

It defines how data packets are to be formatted for transmission and routings

Network layer can be made secure with the help of cryptographic methods and protocols developed for securing communications on the Internet.

Page 6: internet security

6

INTERNET PROTOCOL SECURITY

Internet Protocol Security  is a  protocol for securing Internet Protocol communications by authenticating and encrypting  the data.

IPsec can be used in protecting data flows between a pair of hosts or between a pair of security gateways or between a security gateway and a host

Page 7: internet security

7

SECURITY TOKENA security token is a physical device that an authorized user of computer services is given to ease authentication.

Security tokens are used to prove one's identity electronically.

The token acts like an electronic key to access something.

Page 8: internet security

8

ELECTRONIC MAIL SECURITY

The protection of email from unauthorized access and inspection is known as email security .

This email security is used to prevent an cracker to acess.

Page 9: internet security

9

ATTACK FROM INTERNET

Denial-of-service attack

Buffer overflow attacks

Malicious software

Page 10: internet security

10

DENIAL-OF-SERVICE ATTACK

DoS attack is an attempt to make a machine or network resource unavailable to its original users.

It generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Buffer overflow attacks In computer security and programming, a buffer overflow, is an Software bug where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory.

Page 11: internet security

11

MAMALICIOUS SOFTWAREOUS SOFTWARE

Malicious software is software used to disrupt computer operation, or gather sensitive information, or gain access to private computer systems

Main Types of Malicious softwareVirusesWormsTrojan horse

Page 12: internet security

12

VIRUSES A computer virus is a type of malicious software that, when

executed, replicates by inserting copies of itself into other program.

Worms

A computer worm is a  malware  program that replicates itself, across a network to other computers.

Trojan horse

A Trojan horse in computing is a non-self-replicating type of malware program containing malicious code that, when executed in a slower process.

Page 13: internet security

13

INTERNET

products

Page 14: internet security

14

Firewalls

Antivirus

Page 15: internet security

15

FIREWALLS

Firewall is a technological barrier designed to prevent unauthorizition between computer networks or hosts.

A firewall controls access between networks. It generally consists of gateways and filters.

Firewalls also screen network traffic and are able to block traffic that is dangerous.

Page 16: internet security

16

ANTIVIRUSAntivirus,  is computer software used to prevent, detect and remove malicious computer viruses.

Antivirus software blocks known malicious web sites that attempt to install malware

Page 17: internet security

17

Internet securities main objective is to establish rules and measures to use against attacks over the Internet.

Page 18: internet security

18

Page 19: internet security

19

THANK YOU