Professional Documents
Culture Documents
SUBMITTED BY : Abhishek Mitra Joohee Pandey Shilpa Gupta Ankit Shubham Saqib Iqbal
www.microsoft.com/protect
www.microsoft.com/protect
Internet security
Internet security is a branch of computer security specifically related to the Internet . Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.
Types of security
Network layer security IPSec Protocol Electronic mail security (E-mail)
Security Objectives
Identification Authentication Authorization Access Control Data Integrity Confidentiality Non-repudiation
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.
More information is being created, stored, processed and communicated using computers and networks Computers are increasingly interconnected, creating new pathways to information assets The threats to information are becoming more widespread and more sophisticated
Productivity, competitiveness, are tied to the first two trends Third trend makes it inevitable that we are increasingly vulnerable to the corruption or exploitation of information
34% are from Internet or an external connection to another company of some sort
HACKERS
10
So many people are on the Internet, I'm just a face in the crowd. No one would pick me out. I'm busy. I can't become a security expert--I don't have time, and it's not important enough
11
3.
4.
12
Security Threats
Natural Disasters
Floods Fires Earthquakes Hurricanes, etc.
Human Disasters
MALICIOUS THREATS : consist of inside attacks by disgruntled or malicious employees and outside attacks by non-malicious employees just looking to harm and disrupt an organization. People often refer to these individuals as "crackers" or "hackers." The definition of "hacker" has changed over the years. This individual was respected as a source of information for local computer users, someone referred to as a "guru" or "wizard."
NON-MALICIOUS THREATS :
Usually come from employees who are untrained in computers and are unaware of security threats and vulnerabilities. Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems
VIRUS
A small piece of software that piggybacks on real programs.
Why do they do it !!
Thrill of watching things blow up. Bragging Rights
E Mail Virus
Worms
A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer time and network bandwidth when they replicate, and often carry payloads that do considerable damage.
TROJANS
Firewalls
Computer security borrows this term from firefighting.
A firewall, working closely with a router program, filtering each network packet to determine whether to forward it toward its destination.
Firewalls are customizable. Filters :- 1. IP address 2. Domain Names 3. Protocols (IP -Internet Protocol, TCP -Transmission Control Protocol, )
Phishing
E - FENCING
Complexity Familiarity Connectivity Password management flaws Fundamental operating system Internet Website Browsing Software bugs Unchecked user input
Cyber attacks on India cyber attack led to IGI airport's technical problems in June Cyber attacks cost India Inc Rs 58 lakh China mounts cyber attack on india