Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Unit 6 Digital Literacy Study S3 Obj 2-2
(4.4) Internet Protocols Layered approach to Internet Software 1.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Computer Security Dylan, Robert, Matanel, Jordan.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Intranet, Extranet, Firewall. Intranet and Extranet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security facilities for secure communication.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Viruses & Destructive Programs
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Computer viruses are small software programs designed to spread from one computer to another corrupt or delete data on your computer.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Two Types of Software.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Course Title: WEB SECURITY Chapter No: 01 “Introduction to Web-Security” 1 Maiwand Institute Of Higher Education.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Securing Interconnect Networks By: Bryan Roberts.
2 Computer JEOPARDY How’s Your Inbox? Computers Get Sick Too See You in Cyberspace W Cubed ScatteredBits
Instructor Materials Chapter 7 Network Security
Lecture 5. Security Threats
Network security threats
Networking for Home and Small Businesses – Chapter 8
Unit 8 Network Security.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Module 4 System and Application Security
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
INTERNET SECURITY.
Presentation transcript:

Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary

What is internet security?? Internet security is a:   branch of computer security   specifically related to the internet.   It's objective is to establish rules   and measure to use against   attacks over the Internet.

Flow Chart Of Security Types of Security Network Layer Security IPsec Protocol Electronic mail security ( ) Background(MIME) Pretty Good Privacy (PGP ) (S/MIME)

Figure of Firewall

Firewall And Their Role   Firewall is a device that controls the access between networks.   It generally consists of gateways, and filters, which vary from one firewall to another.   It is secure gateway between public internet and private network.   Fire walls act as the intermediate server between SMTP and HTTP connections.

Flow diagram of firewall Types of Firewalls Packet Filters Circuit Level Gateways Application- Level Gateways Stateful Multi level Network level

Anti-viruses are used due to following threat software programs   Malware & Spyware   Worms   Trojan horses   Bots   Viruses

Anti-spyware   There are two major kinds of threats in relation to spyware:   Spyware collects and relays data from the compromised computer to a third-party.   Adware automatically plays, displays, or downloads advertisements

Pop-up Blocker   Pop-up blocking software is also an an essential component of your security scheme.   Unauthorized windows and tabs can be stopped from appearing with robust pop-up blocking software.

Buffer overflow attacks   A buffer overflow is:   An attack that could be used by a cracker to get full system access through various methods.   It is similar to "Brute Forcing" a computer in that it sends an immense attack to the victim computer until it cracks.

Phishing   The act of sending an to a user falsely claiming to be an established legitimate enterprise.   To scam the user into surrendering private information that will be used for identity theft.

2010 Security Suites   Norton Power Eraser.   Panda Internet Security 2010   Kaspersky Internet Security 2011   K7 TotalSecurity Version 10.0: It's popular in Japan,   BitDefender Total Security 2011

Summary   Increasing the provision of security advice to users when its booting up PCs or launching applications.   Ensuring the default security settings are as high as practicable even if functionally is restricted.   An industry wide code of practice on use of clear and simple language in security messages.   Government should also develop a web-based reporting system for e-crime. The public face of this system should be a website designed to facilitate public and business..

Summary   Increasing the provision of security advice to users when its booting up PCs or launching applications.   Ensuring the default security settings are as high as practicable even if functionally is restricted An industry wide code of practice on use of clear and simple language in security messages.