ONLINE SECURE DATA SERVICE

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Security, 2nd edition1 Cryptography.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Authentication Approaches over Internet Jia Li
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
 An ISO is a multi national body dedicated to worldwide agreement on international standards.  An ISO standard that covers all aspects of network communications.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
Types of Electronic Infection
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
MODULE I NETWORKING CONCEPTS.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
ACM 511 Introduction to Computer Networks. Computer Networks.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Pretty Good Privacy (PGP) Security for Electronic .
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Chapter 40 Internet Security.
Securing Information Systems
Key management issues in PGP
The OSI Model Prof. Choong Seon HONG.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Security Using Armstrong Numbers and Authentication using Colors
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
THE OSI MODEL By: Omari Dasent.
Network Security.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Cryptographic Hash Function
Controlling Computer-Based Information Systems, Part II
e-Health Platform End 2 End encryption
B. R. Chandavarkar CSE Dept., NITK Surathkal
MICROSOFT OUTLOOK and Outlook service Provider
Layered Architectures
BY GAWARE S.R. DEPT.OF COMP.SCI
Understanding the OSI Reference Model
Cloud Computing By P.Mahesh
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
NET 311 Information Security
Chapter 3: Open Systems Interconnection (OSI) Model
Confidentiality and Privacy Controls
Security through Encryption
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
ELECTRONIC MAIL SECURITY
INFORMATION SYSTEMS SECURITY and CONTROL
ONE® Mail Training Presentation
ELECTRONIC MAIL SECURITY
Lecture 4 - Cryptography
Security.
Module 4 System and Application Security
Fluency with Information Technology Lawrence Snyder
EDI Systems What They Are and Why They Matter
Presentation transcript:

ONLINE SECURE DATA SERVICE PRESENTED BY 20-08-2009 SREEJU,S7 CSE

CONTENTS INTRODUCTION. EXISTING SYSTEM. PROPOSED SYSTEM. SERVICES PROVIDED. ADVANTAGES AND DISADVANTAGES FUTURE ENHANCEMENTS CONCLUSION. 20-08-2009 SREEJU,S7 CSE

INTRODUCTION Its examines the proliferation of threats to Internet consumer privacy and security and their adverse impact access appropriate information in a more secure and precise manner. Some of the threats are real, others are fears based on misconceptions. 20-08-2009 SREEJU,S7 CSE

EXISTING SYSTEM Send mails or Receive mails without any security Not Reliable Data transfer. Any Hacker read mails ie, Send or Received. 20-08-2009 SREEJU,S7 CSE

PROPOSED SYSTEM File Encryption & Decryption. E-mail Encryption & Decryption. File compression & File Decompression. Provide Data Authentication & Integrity. Provide both Online Store & Forward Technology. 20-08-2009 SREEJU,S7 CSE

LOCAL FILE The files in the client machine can be encrypted or decrypted and can be stored either locally or in the server itself. NETWORK FILE The files from any of the machine in the network can be stored either locally or in the server itself. 20-08-2009 SREEJU,S7 CSE

VIRTUAL DIRECTORY Provide a consolidated view of user identity without having to construct an entire directory infrastructure Receives queries and directs them to the appropriate data sources. When the user data comes back, the directory presents the data to the enterprise application Technology ideal for consolidating data stored in a distributed environment. 20-08-2009 SREEJU,S7 CSE

ADVANTAGES OF VIRTUAL DIRECTORIES Faster deployment by avoiding synchronization Influence in existing investments in security and high- availability for reliable data stores Provide application specific views of identity data Allow a single view of identity data without violating internal or external regulations prevent denial of service attacks on the primary data- storage Changes made in authoritative sources are reflected in real-time 20-08-2009 SREEJU,S7 CSE

FILE ENCRYPTION AND DECRYPTION Sensitive information sent over the internet by encrypting the data first. Useful for storing private documents and files on PC Works with both text information and files Generates random passwords of any length. Helps to keep passwords and associated information in safe and secure manner Invisible mode feature present to hide the program from task bar and icons from menu 20-08-2009 SREEJU,S7 CSE

E-MAIL ENCRYPTION/DECRYPTION vendors / dealer offer products that encrypt e-mail messages, are easy to use and provide the ability to send private data, including e-mail attachments work by sending a link to the recipient, who then clicks on it and logs on to a secure e-mail server, which the organization either owns or outsource to an appropriate vendor / dealer . non-Web-based technology that allows transportation of secure messages from one person or organization to another, the most common of which is public key infrastructure (PKI) 20-08-2009 SREEJU,S7 CSE

FILE COMPRESSION AND DECOMPRESSION File compression reduces the size of a file by minimizing redundant data. Takes an existing file or files and produce a file or files that are compressed versions of the originals. Application can only operate on such files with the assistance of a file compression library Editing is typically not supported, and seeking is limited if supported at all. 20-08-2009 SREEJU,S7 CSE

WHY COMPRESS FILES? These utilities allow two or more related files to be combined into a single file. Makes it possible to transfer multiple files with a single command. It reduce the size of a file (or group of files). Take up less storage space on the host and less time to transfer over the network. Used to convert binary files to an encoded format using only ASCII characters. possible to transfer binary files via electronic mail other transport method that does not ordinarily support binary data. 20-08-2009 SREEJU,S7 CSE

DATA AUTHENTICATION Allows a receiver to verify that the data really was sent by the claimed sender. In the two-party communication case, data authentication can be achieved through a purely symmetric mechanism: The sender and the receiver share a secret key to compute a message authentication code (MAC) of all communicated data. When a message with a correct MAC arrives, the receiver knows that it must have been sent by the sender 20-08-2009 SREEJU,S7 CSE

DATA INTEGRITY Refers to the validity of data. Data integrity can be affected in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another Software bugs or viruses Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods 20-08-2009 SREEJU,S7 CSE

THREATS TO DATA INTEGRITY Backing up data regularly Controlling access to data via security mechanisms Designing user interfaces that prevent the input of invalid data Using error detection and correction software when transmitting data 20-08-2009 SREEJU,S7 CSE

STORE AND FORWARD The temporary storage of a message for transmission to its destination at a later time. Store and forward techniques allow for routing over networks that are not accessible at all times. 20-08-2009 SREEJU,S7 CSE

ADVANTAGES AND DISADVANTAGES Savings Global Accessible Safety Disadvantages: Less Control Closure of Online Company 20-08-2009 SREEJU,S7 CSE

THE FUTURE OF INTERNET SECURITY Legacy Systems Threat Consciousness Operating Systems Security Tools The Cost of Storage The Internet Cryptographic Methods 20-08-2009 SREEJU,S7 CSE

CONCLUSION Traditional security measures such as password and identification cards cannot satisfy every security requirement. Security and privacy are two major issues that continue to raise concerns with all those involved with the Internet. Internet is a different area than most of us are used to dealing with in our daily lives. One of the things that make it so difficult is that it is always "on" -- the Internet never sleeps. 20-08-2009 SREEJU,S7 CSE

Thank You 20-08-2009 SREEJU,S7 CSE