documentit

21
2013-2015 Submitted By-Piyush Mantri Poonam Kothari Pooja Parmar Submitted to-Vikas jain

Upload: piyush-maheshwari

Post on 27-May-2015

66 views

Category:

Education


0 download

DESCRIPTION

about security

TRANSCRIPT

Page 1: DocumentIT

2013-2015

Submitted By-Piyush Mantri Poonam Kothari Pooja Parmar

Submitted to-Vikas jain

Page 2: DocumentIT

Content

i. Firewall securityii. Massage securityiii. Data securityiv. Document security

Page 3: DocumentIT

Firewall

Page 4: DocumentIT

Firewalls•Isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others. Network gateway, handles incoming & outgoing traffic, Access manager, blocks/grants access to services, networks

firewall

administerednetwork

publicInternet

firewall

Modem

Page 5: DocumentIT

Firewall Design

Page 6: DocumentIT

Firewalls: Whyprevent denial of service(DoS) attacks:

SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections.

prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with something else

allow only authorized access to inside network (set of authenticated users/hosts)

two types of firewalls: application-level packet-filtering

Page 7: DocumentIT

Firewall

• Packet Filter– scans IP address, port number– block specific addresses, ports– Stateful: adds connection filtering

• Application Proxy– scans packet payload– filter harmful data, program commands

• Personal– combination of filter & proxy

• Packet Filter– harmful data passes through

• Application Proxy– unknown application vulnerabilities

The Benefits The Drawbacks

Page 8: DocumentIT

Messag

e Securi

ty

Page 9: DocumentIT

MESSAGE SECURITY

Messaging Security is a program that provides protection for companies messaging infrastructure.

It protects all the personal message of the company which are related to company’s vision and mission.

Page 10: DocumentIT

Encryption as the basis of Message security

Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key.

Its provide a protection against harmful factors affecting our data. Its purpose is only to secure our data.

Page 11: DocumentIT

AdvantagesNo can figure out the private key from the corresponding public key. Hence, the key management problems is mostly confined to the management of private keys

The need for sender and receiver to share secret information over public channels is completely eliminated.

Page 12: DocumentIT

Data security

Page 13: DocumentIT

Data Security

Many large organizations use computers to store important data (information). Large companies, government departments, colleges and hospitals all keep important information, for example, employee records and wages, patient or student records and accounts.

Why?

1. Efficiency2. Accuracy3. Capacity4. Sharing and Transmission etc.

Page 14: DocumentIT

Why your Information Sensitive? What would happen if your competitor had a copy of a spreadsheet file

containing your short and long term sales strategy?What could a resourceful private detective and a cunning lawyer do with

information on your computer?

Sensitive Information

Sensitive information is any information stored on your computer that you would hate to have fall into the wrong hands. This could be personal information, employee information, trade secrets, etc. It is the ramifications that are the concern.

Data Security

Page 15: DocumentIT

Data Security

There are two problems with keeping this information on computers. The first problem is information can be lost through technical or human error.

The second problem is that some information is confidential - only certain people should see it. These people can be described as ‘authorized users’ and the people who shouldn’t see this information as ‘unauthorized users’.

Page 16: DocumentIT

Security of Data

Data

Confidentiality

Data

Integrity

Data

Availability

Secure Data

Data

Page 17: DocumentIT

Document security

Page 18: DocumentIT
Page 19: DocumentIT
Page 20: DocumentIT
Page 21: DocumentIT