Presentation is loading. Please wait.

Presentation is loading. Please wait.

h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as.

Similar presentations


Presentation on theme: "h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as."— Presentation transcript:

1

2 h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as possible, with monitoring and / or access control, even if this measure is part of the normal safety and not the "security" is always the case to note how often the fact of adopting the most sophisticated techniques to generate a false sense of security that can lead to neglect those simple. The second level is usually the logic that provides authentication and authorization to an entity that represents the user in the system. After the authentication process, the operations performed by the user are plotted in log files. This process of monitoring the activities mentioned audit or accountability. To avoid accidental events instead, there is no general solution, but it is usually the user's common sense to make a backup copy of the system, make periodic backups of data and applications in order to deal with any unexpected damage.

3 . Hacking attacks, often known under the name of cracker attacks, are made through the Internet, by users just called the company "cracker", which through the use of special software, sometimes they have created themselves, sneak Hacking the system, achieving full availability of the machine, to manage resources and data without having the right requirements. The danger of this attack as such, is not only to take possession of requirements, data and services of others, but also because the user called "robbed" a kind of insecurity to faith on computer systems are often part of our everyday life.

4 . The problem of security programs and especially for sending and receiving confidential data protected, it was brought to the attention of software developers as a result of significant growth in the use of computers and the Internet. With regard to the production of software "protected" we can start by defining the concept of security as the absence of conflicting conditions capable of producing death or irreparable damage to a system. In the design of software is therefore essential to achieve the most functional compromise between the efficiency of use of this program and its ability to "survival" to external attacks and errors more or less critical. Internet security With the growth in excess of the internet and the "www", the security issues have been extended to it and therefore serve ideas and principles upon which to build. To cope with the risks involved in using it, the European Union makes its contribution through the security program "Safer Internet". On the technical protection measures in the network are reflected in the use of appropriate network protocols such as HTTPS, SSL, TLS, IPsec and SSH that do nothing more than apply the encryption method of one or more layers of network architecture of the ISO model -OSI.

5 . The IEEE (Institute of Electrical and Electronics Engineers) has cataloged the errors in the software in three different voices depending on the nature of the errors themselves. They are: Error: is a human error occurred during the process of interpretation of the specifications or during the use of a method or in an attempt to solve a problem Failure: it is an unexpected software behavior and incongruous to the specific program Fault: a defect in the source code. Program errors are not harmful, such as spyware and buffer overflow have the characteristic of not edit system files and do no harm to the characteristics of the system


Download ppt "h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as."

Similar presentations


Ads by Google