Presentation is loading. Please wait.

Presentation is loading. Please wait.

Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.

Similar presentations


Presentation on theme: "Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with."— Presentation transcript:

1 Web Servers Security: What You Should Know

2 The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with Internet users. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with Internet users. Many companies use the web to expand their business and increase profit margins. Many companies use the web to expand their business and increase profit margins.

3 Without security it is very possible and probable that intruders can change the contents of your web page. Without security it is very possible and probable that intruders can change the contents of your web page. If host for the web server is compromised you may find that the content on your web page is altered If host for the web server is compromised you may find that the content on your web page is altered Intruders can also have access to confidential information. Intruders can also have access to confidential information.

4 Without security you show that your business is unprofessional and inexperienced. And ultimately your business may fail on the World Wide Web. Without security you show that your business is unprofessional and inexperienced. And ultimately your business may fail on the World Wide Web.

5 Managers and top officials rushing to establish a Web presence without considering security issues. Managers and top officials rushing to establish a Web presence without considering security issues. Companies are not willing to spend time and capital to plan and implement secure sites. Companies are not willing to spend time and capital to plan and implement secure sites.

6 Denial Of Service It is important to protect your server from Denial-of Service attacks. It is important to protect your server from Denial-of Service attacks. You can protect yourself by installing a filter on the network before a stream of information reaches your sites web server. You can protect yourself by installing a filter on the network before a stream of information reaches your sites web server.

7 Viruses A computer virus is a program designed to spread itself by first infecting executable files or the system areas of hard and floppy disks and then making copies of itself. A computer virus is a program designed to spread itself by first infecting executable files or the system areas of hard and floppy disks and then making copies of itself.

8 Examples of Viruses Melissa Virus (forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained ) Melissa Virus (forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained ) ILOVEYOU letter (comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book ) ILOVEYOU letter (comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book )

9 Firewall Considered a first line of defense in protecting private information. Considered a first line of defense in protecting private information.

10 Virtual Private Network (VPN) Private network that uses the Internet to connect remote sites or users together. Private network that uses the Internet to connect remote sites or users together.

11

12 Encryption Encryption is a process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Encryption is a process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Symmetric-key Symmetric-key Public-key encryption Public-key encryption

13 Intrusion detection system (IDS) Specialized software product that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees. There are two types of IDSs. Specialized software product that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees. There are two types of IDSs. Host-based IDS Host-based IDS Network-based IDS Network-based IDS


Download ppt "Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with."

Similar presentations


Ads by Google