Internet Security

Слайд 2

Is a branch of computer security specifically related to the Internet, often

Is a branch of computer security specifically related to the Internet, often
involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.
Its objective is to establish rules and measures to use against attacks over the Internet.The Internet represents an insecure channel for
exchanging information leading to
a high risk of intrusion or fraud,
such as phishing.
Different methods have been used to
protect the transfer of data,
including encryption.

Internet security

Слайд 3

▶ Network layer security
▶ IPsec Protocol
▶ Electronic mail security (E-mail)
▪ Background

▶ Network layer security ▶ IPsec Protocol ▶ Electronic mail security (E-mail)
▪ Pretty Good Privacy (PGP)
▪ Multipurpose Internet Mail
Extensions (MIME)
▪ Message Authentication Code

Types of security:

Слайд 4

A firewall controls access between networks. It generally consists of gateways and

A firewall controls access between networks. It generally consists of gateways and
filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.

Firewalls

Слайд 5

Firewalls impose restrictions on incoming and outgoing packets to and from private

Firewalls impose restrictions on incoming and outgoing packets to and from private
networks. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet.

Role of firewalls in Internet security and web security

Слайд 6

▶ Packet filters
▶ Circuit-level gateways
▶ Application-level gateways

Types of firewalls

▶ Packet filters ▶ Circuit-level gateways ▶ Application-level gateways Types of firewalls

Слайд 7

▶ Malware
▶ Viruses
▶ Trojan horse
▶ Spyware
▶ Worms
▶ Botnet

Malicious software and antivirus

▶ Malware ▶ Viruses ▶ Trojan horse ▶ Spyware ▶ Worms ▶

Слайд 8

Antivirus programs and Internet security programs are useful in protecting a computer

Antivirus programs and Internet security programs are useful in protecting a computer
or programmable device from malware.

Antivirus

Слайд 9

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is
an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

Denial of service attack

Слайд 10

Web browser statistics tend to affect the amount a Web browser is

Web browser statistics tend to affect the amount a Web browser is exploited. Browser choice
exploited.

Browser choice

Слайд 11

A buffer overflow is an attack that could be used by a

A buffer overflow is an attack that could be used by a
cracker to get full system access through various methods by essentially cracking a computer using brute force. Most security applications and suites are incapable of adequate defense against these kinds of attacks.

Buffer overflow attacks

Имя файла: Internet-Security-.pptx
Количество просмотров: 509
Количество скачиваний: 11