internet security

21
INTERNET SECURITY

Upload: deepak-gupta

Post on 24-Jan-2016

2 views

Category:

Documents


0 download

DESCRIPTION

A project on internet security...

TRANSCRIPT

Page 1: Internet Security

INTERNET SECURITY

Page 2: Internet Security

Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications.  Different methods have been used to protect the transfer of data, including encryption.

INTERNET SECURITY

Page 3: Internet Security

Encryption Cryptosystems

Page 4: Internet Security

Data◦ Information we keep on computers (product

design, financial records, personnel data)◦ Lost time, lost sales, lost confidence

Resources◦ Unauthorized use of computer time & space

Reputation◦ Misrepresentation, forgery, negative publicity

What do we Need to Protect?

Page 5: Internet Security

All internet traffic routed via proxy server Acts as an internet gateway Once proxy is secure, so is network Can filter content Can cache content Often used with a firewall in a corporate

environment

Proxy servers

Page 6: Internet Security

Users are often the weakest link in security

Email attachments containing trojan horses

Account stealing (via key logging) Scams (‘I have $10 million to import’,

‘You have just won the lottery’, …)

Tricking the user

Page 7: Internet Security

Spyware is a software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or control over a computer without the consumer's knowledge.

Spyware

Page 8: Internet Security

Virus: self-replicating program that attaches itself to files and is spread when they are transferred

Worm: self-replicating program that pro-actively spreads itself

Trojan horse: a program that appears legitimate but is in fact malicious

Viruses,Worms,TrojansTypes of Spyware:-

Page 9: Internet Security

ProfitA challengeMaliceBusiness

Why do people make Spyware?

Page 10: Internet Security

Computer is running slower than normal Popups (on or off the internet) New toolbars Home page changes Search results look different Error messages when accessing the web

How do I know if I’ve got Spyware?

Page 11: Internet Security

What does Spyware look like?

Page 12: Internet Security

What does Spyware look like?

Page 13: Internet Security

Use a legitimate spyware removal programWe suggest Spybot Search and Destroy in

combination with Microsoft Antispyware (now called Defender)

Ad-aware is a good program and is free for home use but is no longer free for educational use.

How do I get rid of Spyware?

Page 14: Internet Security

1. Reboot2. Run a Spybot Scan3. Run a Microsoft Antispyware Scan4. If still having problems manually

remove registry and startup entries (Do NOT do this yourself)

Steps in Spyware Removal

Page 15: Internet Security

Keep up to date with patches (Windows update, Software update)

Use anti-virus software and keep it up to date

Filter email for spam and suspicious messages

Be aware of ‘fake alerts’

Protecting your system

Page 16: Internet Security

Should be: Long (8 characters or more) Not obvious or from a dictionary Contain capitals, numerals and non-

alphanumeric characters (!&^*$@.,’[]{}? …)

Transmitted in encrypted form only…

Passwords

Page 17: Internet Security

Definition - hardware &/or software components that restrict access between a restricted network & the Internet or between networks◦ Restricts people to entering at a controlled

point◦ Prevents attackers from getting close to other

defenses (host controls)

Firewall Solutions

Page 18: Internet Security

Focus security decisions - single point to leverage control

Enforce security policy - minimize exceptions

Limit exposure - separate sensitive areas of one network from another or outside world

Firewall Capabilities

Page 19: Internet Security

Simple traffic logging systems ◦ audit log file of files accessed (HTTPD)◦ site usage/demand hours/links/browsers used

Hardened Firewall Host (hardware)◦ Halts unauthorized users◦ Concentrates security, hides internal system

names, centralizes & simplifies net management Proxy Server (software)

◦ Deals with external server requests on behalf of internal clients

◦ May limit certain HTTP methods (CGI or Java applets)

Types of Firewalls

Page 20: Internet Security

Can’t protect against

◦malicious insiders◦connections that don’t go through it◦new threats◦viruses scans for source & destination

addresses & port numbers, not details of data

Firewall Limitations

Page 21: Internet Security