internet related security (2)

Upload: shweta-tripathi

Post on 04-Jun-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Internet Related Security (2)

    1/22

  • 8/13/2019 Internet Related Security (2)

    2/22

    WHAT IS INTERNET ?

    The Internetis a global system of interconnected computernetworksthat use the standard Internet ProtocolSuite(TCP/IP) to serve billions of users worldwide.

    It is a network of networksthat consists of millions ofprivate, public, academic, business, and government

    networks, of local to global scope, that are linked by a broadarray of electronic, wireless and optical networkingtechnologies.

    The Internet can also be defined as a worldwideinterconnection of computers and computer networks thatfacilitate the sharing or exchange of informationamong users.

    The Internet carries a vast range of informationresources andservices, such as the inter-linked hypertextdocuments oftheWorld Wide Web(WWW) and the infrastructure tosupport electronic m

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Userhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Hypertexthttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Electronic_mailhttp://en.wikipedia.org/wiki/Electronic_mailhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Hypertexthttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Userhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_network
  • 8/13/2019 Internet Related Security (2)

    3/22

    Internet Security?

    Spoofing

    Replay Attack

  • 8/13/2019 Internet Related Security (2)

    4/22

    What do we Need to Protect?

    To Secure Data: Information we keep on computers (product

    design, financial records, personnel data)

    Lost time, lost sales, lost confidence

    Resources Unauthorized use of computer time & space

    Reputation Misrepresentation, forgery, negative publicity

  • 8/13/2019 Internet Related Security (2)

    5/22

    Fundamental Security

    Objectives

    Four fundamental objectives of Info Security

    Confidentiality- Protection from unauthorizedpersons

    Integrity- consistency of data; no unauthorizedcreation, alteration or destruction

    Availability- ensuring access to legitimate users Legitimate use- ensuring appropriate use by

    authorized users

  • 8/13/2019 Internet Related Security (2)

    6/22

    6

    Who is vulnerable?

    Financial institutions and banks Internet service providers

    Pharmaceutical companies Government and defense agencies Contractors to various government

    agencies Multinational corporations ANYONE ON THE NETWORK

  • 8/13/2019 Internet Related Security (2)

    7/22

    Adware

    Cookies

    Phishing Spyware

    Hackers

    BASIC SECURITY ATTACKS:

  • 8/13/2019 Internet Related Security (2)

    8/22

    ADWARES

    Installed with Good Programs

    Hotbar

    Kazaa

    Weatherbug

    ITS EFFECTS:

    Often hijacks your home page.

    Continuous popups

    Slower computer processing, takes the

    computer longerto process or startup.

  • 8/13/2019 Internet Related Security (2)

    9/22

    INTERNET COOKIES

    Short pieces of data used by web servers to help identifyweb users

    Helpful on shopping sites

    ITS EFFECTS: Identifies your IP address during your visit

    CAN SEE WHAT WEB PAGES YOU VISIT, HOW OFTEN,AND HOW LON

    Identifies your IP address during your visit

  • 8/13/2019 Internet Related Security (2)

    10/22

    Phishing

    Sending people e-mail messages in order tolure them into divulging sensitive data

    The data sought is commonly passwordsand credit-card details

    The sender commonly assumes a relativelyhighly trusted identity e.g. a finl institution

    The data is commonly keyed into a web-form

    on a site that purports to be operated by thetrusted identity

  • 8/13/2019 Internet Related Security (2)

    11/22 Tom Stafford, 2004

    What isSpyware?

    The Spyware is defined as software that aidsin gathering information about a person ororganization without their knowledge, and

    that may send that information to anotherentity without user consent Spyware guru Steve Gibson considers it to

    be anything that surreptitiously utilizes acomputers Internet back channel tocommunicate with an external server

  • 8/13/2019 Internet Related Security (2)

    12/22

    VIRUS SPYWARE

    Damages data Steals sensitive privateinformation.

    Written by hackers Written by professional onlinecriminals.

    Infection is obvious and can bedetected with anti-virus software.

    Infection is silent and cannot bydetected with anti-virus software.

    Most computer users are sufficientlyprotected.

    Very few computer users areprotected

    The threat is decreasing. The threat is increasing.

    SPYWARE AND VIRUS

  • 8/13/2019 Internet Related Security (2)

    13/22

    Trojan HorsesSpyware that is often disguised as harmless or even desirableprograms, but is actually designed to cause loss or theft of computer data and todestroy computer systems. They usually arrive as email attachments or bundled

    with other software . Somegive attackers unrestricted access to your computeranytimeyoure online, allowing file transfers , adding or deleting of files and

    programs, and taking control of your mouse and keyboard.

    VirusA software program written to disrupt computer systems and to destroydataviruses are the most well known Internet security threat.

    WormsSimilar to viruses but much more dangerous. They spread rapidly by

    accessing your email address book and automatically forwarding themselves toevery address it contains. Current anti-virus software cant find worms oncetheyve been loaded ontoyour system.

    Web filteringA software tool that allows computer users to determine whichWeb content they will allow onto your computer through their browser.

    DIFFERENT TYPES OF SPYWARE :

  • 8/13/2019 Internet Related Security (2)

    14/22

    SECURITY COUNTERMEASURES

    THREE PHASE APPROACH

    PROTECTION

    DETECTION

    RESPONSEIR

  • 8/13/2019 Internet Related Security (2)

    15/22

    Different types of Countermeasures for Security

    FIREWALL

    SPY SWEEPER

    Ad-AWARE

    NORTON ANTI SECURITY VIRUS

    COUNTER SPY

  • 8/13/2019 Internet Related Security (2)

    16/22

    What is a Firewall?

    A firewall is hardware, software, or acombination of both that is used to

    prevent unauthorized programs orInternet users from accessing a privatenetwork and/or a single computer

  • 8/13/2019 Internet Related Security (2)

    17/22

    How does a firewall work?

    Inspects each individual packet of dataas it arrives at either side of the firewall

    Inbound to or outbound from yourcomputer

    Determines whether it should be allowedto pass through or if it should be blocked

  • 8/13/2019 Internet Related Security (2)

    18/22

    Firewall

    Visible

    IP

    Address

    Internal

    Network

    PC Servers

    Host

    A system or group of systems that enforces an access control policy between twonetworks.

    Firewall

    Router

  • 8/13/2019 Internet Related Security (2)

    19/22

    TYPES:Spyware/Adware

    ADVANTAGES:

    Has immunity that blocks known Spyware/Adware

    User friendly

    DISADVANTAGES:

    Costly($29) Takes a while to scan .

    SPY SWEEPER

  • 8/13/2019 Internet Related Security (2)

    20/22

    AD-AWARE 6.0

    TYPES:Adware

    ADVANTAGE:

    EASY TO USE SCANNING . User friendly.

    DISADVANTAGES:

    Costly($39) It was built to detect Adware

    so its lacks ability to detect Spyware

  • 8/13/2019 Internet Related Security (2)

    21/22

    NORTON SYSTEMATIC ANTI VIRUS

    TYPES:

    Virus,Adware,Spyware.

    ADVANTAGE:

    Can detect viruses , hacking programs,

    spyware programs and adware programs.

    Comes with Firewall.

    DISADVANTAGES:

    Costly($69).

    Very confusing to use .

  • 8/13/2019 Internet Related Security (2)

    22/22

    THANK YOUPRESENTED BY:

    SARVESH TRIVEDI- 45

    SHWETA TRIPATHI-44

    TRISHALA SHAH-

    SNIGDHA