The Internet and Security Steven Shedd. The Internet How it began How it began.

Slides:



Advertisements
Similar presentations
TERMINAL SERVER DEPLOYMENT PLAN. STEP 1: PREPARATION  UTILIZE THE CURRENT SERVER FOR: ACTIVE DIRECTORY (AD) ACTIVE DIRECTORY (AD) NEEDED FOR STORAGE.
Advertisements

(4.4) Internet Protocols Layered approach to Internet Software 1.
_IT Security and Intellectual Property Summer 2006 Bashar Al Takrouri Personal Firewalls “Case study ::ZoneAlarm Security Suite” Instructor: Prof. Dr.
Kittiphan Techakittiroj (21/05/58 10:00 น. 21/05/58 10:00 น. 21/05/58 10:00 น.) Firewall Kittiphan Techakittiroj
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Network Security Overview Tales from the trenches.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
A Guide to major network components
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Jeopardy Chatting with strangers Spam and other viruses Security and Privacy Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Proxy Servers & Firewalls. What is proxy ? What is proxy ? Main purpose of using proxies Main purpose of using proxies How a proxy works ? How a proxy.
How do Computer Viruses Work? Max Miller What is a Computer Virus? similar to biological viruses. both parasitic. a virus can be seen and a computer.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Security Unix Mail Services David Funk Systems Administrators Computer Systems Support COE, University of Iowa.
Module 11: Designing Security for Network Perimeters.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
A Network Security -Firewall Bruce Turin.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
2/11/ Dela Cruz.  Trojan Horses  Worms  Viruses  Piggyback software  Attachments with viruses 2/11/2016 Dela Cruz 2.
Chapter 10 Studycast Marilee Betz.  is NOT private or confidential.  Created by committees.  Vary  GAME PLAN  Common elements  Glossary of.
GOOD MORNING TO ONE AND ALL. OUR TEAM VENKATESH THARUN SADIK FROM AVANTHI ENGG. COLLEGE.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
Chapter 40 Internet Security.
Network Security Marshall Leitem 11/30/04
Why Computer Security Need???
Cyber Security By: Pratik Gandhi.
Introduction to Computers
Firewalls.
Computer courses in Chandigarh. What is Computer Forensics.
Computer Viruses.
NETWORK SECURITY.
Operating Systems Security
Firewalls Jiang Long Spring 2002.
Fire-wall.
Malicious Software Network security Master:Mr jangjou
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
An overview over Botnets
INTERNET SECURITY.
Presentation transcript:

The Internet and Security Steven Shedd

The Internet How it began How it began

The Internet How it began How it began -President Eisenhower -ARPANET -TCP/IP

The Internet How it began How it began -President Eisenhower -ARPANET -TCP/IP How it’s managed How it’s managed

The Internet Future of the Internet Future of the Internet

The Internet Future of the Internet Future of the Internet -Commercial services -Research -Household

Computer Virus What is a Computer Virus What is a Computer Virus

Computer Virus What is a Computer Virus What is a Computer Virus Types of Computer Viruses Types of Computer Viruses - virus -Trojan -Worm

Computer Virus The Future of Computer Viruses The Future of Computer Viruses -Nimda -“super” virus

Firewalls What it is What it is

Firewalls How it works How it works -Packet filtering -Proxy server -Stateful inspection

Firewalls Protects from: Protects from: - Viruses, Application backdoors, Remote logins, Spam, bombs, Redirect Bombs, Source Routing and more.

Firewalls The future of protection The future of protection -faster everything -the government’s roll