You are on page 1of 16

Security Technologies

why the Internet is Insecure?


► Internet is Insecure because of you
► Early days – academics and researchers
used (non-profit users)
► Digital age- no restriction
► By the end of 2005 it is estimated identity
fraud will cause up to 5 trillion dollars world
wide. We, the users of the internet must
keep ourselves safe, secure and pay
attention to those security warnings
Contd..
► Get rid of the internet explorer( opera)
► Protect your Connection (Firewalls)
► Don't share those files
► Hide your IP address (Eg. Primedius )
► Check those certificates (https secure e-
mail)
► Kill the spy ware (zone alarm)
Risks
► Long Distance Telephone Calling card
accounts along with PINs
► In early 1995, 20,000 credit card numbers
and information stolen
► Intruders always take disadvantages of
Internet
It’s the Protocols
► 7-layered protocol
► Level one – physical connection, higher level-
actual application
► Link Layer-handles the connection b/w systems
communicating across a LAN or other link
► Internet Layer- handles connection b/w systems
communicating across the internetwork
► Transport Layer-handles connection b/w the
processes running on communicating systems
Physical & Link Layer

► Internet Function involves connection across


the LAN
► Actual signals that pass along the wire (or
Wireless) link
► Link or N/W layer may be an Ethernet cable
LAN installed in office or a telephone link
b/w a home PC and ISP
Internet Layer
► Connection b/w computers were handled
using Internet Protocol (gives the guarantee
of delivery to the higher levels)
► IP addresses identify a particular computer
in the n/w uniquely
► Direct connection (LAN) else via router
Transport Layer
► Handling the connection b/w the actual programs
running on the source and destination systems
► Two different protocols :UDP (User Datagram
Protocol) and TCP (Transport Control Protocol)
► TCP – support direct interaction and ensure that
the information sent is received (Eg. ftp, telnet)
► UDP- don’t support direct interation
Application Layer

► Higher level
► Security and reliability both can be built
► Collects information from the end user or
the network resource, wraps it
(encapsulation), addresses it to the
destination resource and passes to the
transport layer
Total Working of Layers
► Application Layer- get the info from user or from
network device and encapsulate it to destination
resource
► Transport Layer- wraps the data up and addresses
it to the target program on the destination system
► Internet Layer- wraps the data up to the particular
system in a particular network
► Network Layer- Same network (direct passing of
data), if not, to the appropriate router until
reached to destination
At Last…
► N/W layer S/W - moves chunks of data to
its destination on the same
► Internet layer S/W- moves chunks of data
b/w 2-specific computers connected to the
Internet
► Transport layer S/W – moves chunks of data
b/w two programs
► Application layer S/W – moves data chunks
b/w a user and a resource
Where the Risks are?
► Interception by the third party
► Forgery
► Modifications
Internet Security holes
A Bigger Risk
► Password strength
► Revealing of password
► Changes are always constant
Fighting Back

► What it all means?

Remember... it is up to you!

You might also like