Presentation is loading. Please wait.

Presentation is loading. Please wait.

ONLINE SECURE DATA SERVICE

Similar presentations


Presentation on theme: "ONLINE SECURE DATA SERVICE"— Presentation transcript:

1 ONLINE SECURE DATA SERVICE
PRESENTED BY SREEJU,S7 CSE

2 CONTENTS INTRODUCTION. EXISTING SYSTEM. PROPOSED SYSTEM.
SERVICES PROVIDED. ADVANTAGES AND DISADVANTAGES FUTURE ENHANCEMENTS CONCLUSION. SREEJU,S7 CSE

3 INTRODUCTION Its examines the proliferation of threats to Internet consumer privacy and security and their adverse impact access appropriate information in a more secure and precise manner. Some of the threats are real, others are fears based on misconceptions. SREEJU,S7 CSE

4 EXISTING SYSTEM Send mails or Receive mails without any security
Not Reliable Data transfer. Any Hacker read mails ie, Send or Received. SREEJU,S7 CSE

5 PROPOSED SYSTEM File Encryption & Decryption.
Encryption & Decryption. File compression & File Decompression. Provide Data Authentication & Integrity. Provide both Online Store & Forward Technology. SREEJU,S7 CSE

6 LOCAL FILE The files in the client machine can be encrypted or decrypted and can be stored either locally or in the server itself. NETWORK FILE The files from any of the machine in the network can be stored either locally or in the server itself. SREEJU,S7 CSE

7 VIRTUAL DIRECTORY Provide a consolidated view of user identity without having to construct an entire directory infrastructure Receives queries and directs them to the appropriate data sources. When the user data comes back, the directory presents the data to the enterprise application Technology ideal for consolidating data stored in a distributed environment. SREEJU,S7 CSE

8 ADVANTAGES OF VIRTUAL DIRECTORIES
Faster deployment by avoiding synchronization Influence in existing investments in security and high- availability for reliable data stores Provide application specific views of identity data Allow a single view of identity data without violating internal or external regulations prevent denial of service attacks on the primary data- storage Changes made in authoritative sources are reflected in real-time SREEJU,S7 CSE

9 FILE ENCRYPTION AND DECRYPTION
Sensitive information sent over the internet by encrypting the data first. Useful for storing private documents and files on PC Works with both text information and files Generates random passwords of any length. Helps to keep passwords and associated information in safe and secure manner Invisible mode feature present to hide the program from task bar and icons from menu SREEJU,S7 CSE

10 E-MAIL ENCRYPTION/DECRYPTION
vendors / dealer offer products that encrypt messages, are easy to use and provide the ability to send private data, including attachments work by sending a link to the recipient, who then clicks on it and logs on to a secure server, which the organization either owns or outsource to an appropriate vendor / dealer . non-Web-based technology that allows transportation of secure messages from one person or organization to another, the most common of which is public key infrastructure (PKI) SREEJU,S7 CSE

11 FILE COMPRESSION AND DECOMPRESSION
File compression reduces the size of a file by minimizing redundant data. Takes an existing file or files and produce a file or files that are compressed versions of the originals. Application can only operate on such files with the assistance of a file compression library Editing is typically not supported, and seeking is limited if supported at all. SREEJU,S7 CSE

12 WHY COMPRESS FILES? These utilities allow two or more related files to be combined into a single file. Makes it possible to transfer multiple files with a single command. It reduce the size of a file (or group of files). Take up less storage space on the host and less time to transfer over the network. Used to convert binary files to an encoded format using only ASCII characters. possible to transfer binary files via electronic mail other transport method that does not ordinarily support binary data. SREEJU,S7 CSE

13 DATA AUTHENTICATION Allows a receiver to verify that the data really was sent by the claimed sender. In the two-party communication case, data authentication can be achieved through a purely symmetric mechanism: The sender and the receiver share a secret key to compute a message authentication code (MAC) of all communicated data. When a message with a correct MAC arrives, the receiver knows that it must have been sent by the sender SREEJU,S7 CSE

14 DATA INTEGRITY Refers to the validity of data. Data integrity can be affected in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another Software bugs or viruses Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods SREEJU,S7 CSE

15 THREATS TO DATA INTEGRITY
Backing up data regularly Controlling access to data via security mechanisms Designing user interfaces that prevent the input of invalid data Using error detection and correction software when transmitting data SREEJU,S7 CSE

16 STORE AND FORWARD The temporary storage of a message for transmission to its destination at a later time. Store and forward techniques allow for routing over networks that are not accessible at all times. SREEJU,S7 CSE

17 ADVANTAGES AND DISADVANTAGES
Savings Global Accessible Safety Disadvantages: Less Control Closure of Online Company SREEJU,S7 CSE

18 THE FUTURE OF INTERNET SECURITY
Legacy Systems Threat Consciousness Operating Systems Security Tools The Cost of Storage The Internet Cryptographic Methods SREEJU,S7 CSE

19 CONCLUSION Traditional security measures such as password and identification cards cannot satisfy every security requirement. Security and privacy are two major issues that continue to raise concerns with all those involved with the Internet. Internet is a different area than most of us are used to dealing with in our daily lives. One of the things that make it so difficult is that it is always "on" -- the Internet never sleeps. SREEJU,S7 CSE

20 Thank You SREEJU,S7 CSE


Download ppt "ONLINE SECURE DATA SERVICE"

Similar presentations


Ads by Google