1 / 10

Internet Security

Internet Security By Abdiasis Mohamud What is Internet Security Internet security is the practice of protecting and preserving private resources and information on the Internet.

libitha
Download Presentation

Internet Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Security By Abdiasis Mohamud

  2. What is Internet Security • Internet security is the practice of protecting and preserving private resources and information on the Internet. • Internet Security is keeping anyone from doing things you do not want them to do, with on or from your computers or any peripheral devices. • One of the Internet's key strengths is that no one agency or organization is responsible for its overall management, leaving it largely free of bureaucratic control and burdensome regulation. From a security standpoint, however, this could also be viewed as one of its weaknesses.

  3. Types Of Protocols • TCP/IP- It’s the usual shorthand phrase for a collection of communications protocols. Originally developed by ARPANET. • IP- Packets are bundles of data from the foundation of TCP/IP protocol suite. • ARP- Works by sending out the an Ethernet broadcast packet containing the desired IP address. • TCP- Provides reliable virtual circuits to user processes. • UDP- Is used for large transmissions it tends to behave badly on network. Its easier to spoof UDP than TCP packets, since there’s no handshakes or sequence numbers.

  4. Cont’d • ICMP- Its used to influence behavior of TCP and UDP connections. To report trouble with route and terminate connection because of network problems. • FTP- Supports the transmission and character set translation of text and binary files.

  5. Internet Security Problems • Securing the web server and data that is on it • Securing Information that travels between the web and the user • Securing the end user’s computer and other devices that people use to access the Internet. • Business Integrity- Credit card security is one of the biggest issue of the Internet because the potential to literally create a world wide commerce opens a very large hole to credit card fraud. • Systems Disabled- Systems providing TCP-based services (WWW, email, newsgroup, gopher, etc ...) to the Internet community may be unable to provide those services while under a hacker's attack and for some time after the attack has ceased.

  6. How Hackers Operate?? • Hacker-is programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources gain unauthorized access through skill and tactics. • Password Cracking-are usually the first thing a hacker will try to "break" to gain access to your system. • Packet and password sniffing- Hackers have programs which do this, and then scan all the messages which traverse a network looking for passwords. • IP spoofing- Hacker sends a client request to the server using the source route. • Social Engineering- Phone, talk or Internet chat.

  7. I need Security • Firewalls- is device that checks each packet against a list rules to permit or deny that transmission. • It a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software or a combination of both. • Proxy Firewall- User runs an application, then the application connects to the firewall and logs in.

  8. Cont’d • Encryption- Encryption is the transformation of data into a form unreadable by anyone without a secret decryption key. • Symmetric Encryption-It is a type of encryption where the same key is used to encrypt and decrypt the message. • Authentication- is a process whereby the receiver of a digital message can be confident of the identity of the sender and/or the integrity of the message. Its mechanism for users to change their passwords or obtain new passwords.

  9. What Can You Do?? • Make sure network is guided against spoofing. • Secure your machines. • Make your password difficult, use Punctuations and characters.

  10. References • Firewalls And Internet Security by William R. Cheswick and Steven M. Bellovin • Web Security by Simon Garfinkel and Gene Spafford. • Protect Your Privacy On The Internet, by Byran Bfaffenberger • http://www.nss.co.uk/WhitePapers/InternetSecurity.htm.

More Related