it pptttttt - copy

Upload: lulughosh

Post on 04-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 It Pptttttt - Copy

    1/30

  • 8/13/2019 It Pptttttt - Copy

    2/30

  • 8/13/2019 It Pptttttt - Copy

    3/30

    Confidentiality

    Integrity

    Availability

    Authenticity

    Non-repudiation

  • 8/13/2019 It Pptttttt - Copy

    4/30

    ADWARE

  • 8/13/2019 It Pptttttt - Copy

    5/30

    Adware is software that displays

    advertisements on your computer.

    It becomes a problem if it:

    - installs itself

    - hijacks your web browser and gathersdata on your web browsing

    difficult to uninstall connection

    slow down your pc and internet connection

  • 8/13/2019 It Pptttttt - Copy

    6/30

    Backdoor Trojans

  • 8/13/2019 It Pptttttt - Copy

    7/30

  • 8/13/2019 It Pptttttt - Copy

    8/30

    BLUEJACKING

  • 8/13/2019 It Pptttttt - Copy

    9/30

    Blue jacking is sending anonymous,

    unwanted messages to other users with

    Bluetooth-enabled mobile phones or

    laptops.

    Blue jacking is essentially harmless

  • 8/13/2019 It Pptttttt - Copy

    10/30

    BLUESNARFING

    Bluesnarfing is the theft of data from aBluetooth phone.

    Bluesnarfing depends on the ability ofBluetooth-enabled devices to detect andcontact others nearby

    mobile phones serial number can also bedownloaded and used to clone thephone.

  • 8/13/2019 It Pptttttt - Copy

    11/30

  • 8/13/2019 It Pptttttt - Copy

    12/30

    Create copies of themselves

    Spread via internet

    Use communication between computers to spread.

  • 8/13/2019 It Pptttttt - Copy

    13/30

    PAGE-JACKING

    Replicas of reputable web pages

    Offensive materials

    Reduces websites revenue

    Search engines less useful.

    Used in phishing attacks.

  • 8/13/2019 It Pptttttt - Copy

    14/30

    Use of bogus emails and websites to trick you into supplying

    confidential or personal information.

  • 8/13/2019 It Pptttttt - Copy

    15/30

  • 8/13/2019 It Pptttttt - Copy

    16/30

    BROWSER HIJACKERS

    Redirect computer users to bogus websites to deploy the

    computer malware.

    Default home and search pages changes

    Changes browser settings without users permission.

  • 8/13/2019 It Pptttttt - Copy

    17/30

    CRYPTOGRAPHY

  • 8/13/2019 It Pptttttt - Copy

    18/30

    Components

    Sender

    Encryption

    Receiver

    Decryption

  • 8/13/2019 It Pptttttt - Copy

    19/30

    key

    A number or a set of

    numbers

    150 ,300 or more

    Cipher operates on it

    Symmetric keySame secret key

    symmetric keySender: public key

    Receiver: private key

  • 8/13/2019 It Pptttttt - Copy

    20/30

    Message uthenticity

    Digital Signature

    electronic Non - repudiation

  • 8/13/2019 It Pptttttt - Copy

    21/30

  • 8/13/2019 It Pptttttt - Copy

    22/30

    Characteristics

    Inclusion

    Verification

    Relationship

    Duplicity

  • 8/13/2019 It Pptttttt - Copy

    23/30

    Captcha"Automated Turing Tests"

    graphic images

    deciphered by people

    Create an account

  • 8/13/2019 It Pptttttt - Copy

    24/30

    FIREW LLDevice between

    internal network and

    internet

    Forward & filter packets

  • 8/13/2019 It Pptttttt - Copy

    25/30

    Packet ilter irewall Proxy irewall

    Based onsource,

    destination address

    Uses filtering table to

    decide which packets

    must be discarded.

    Filter message based on

    information inside

    A proxy computer

    between client &

    corporation computer

  • 8/13/2019 It Pptttttt - Copy

    26/30

    Anti Virus

    Software

    Protect computer against viruses

    Keeps your computer healthy

    Update your antivirus software regularly

  • 8/13/2019 It Pptttttt - Copy

    27/30

    How Antivirus software works

    Code characteristic of the virus

    Blocks the execution of code and alerts the user

    Virus is then isolated and destroyed

    Regularly update your antivirus

    Automatic update set it and forget it

  • 8/13/2019 It Pptttttt - Copy

    28/30

    Top anti viruses

    Shield deluxeAntivirus protection

    Trend micro antivirus internet security

    Bit defender antivirus Norton antivirus

    McAfee virus scan

    Zone Alarm antivirus Kaspersky Antivirus

  • 8/13/2019 It Pptttttt - Copy

    29/30

    Steps to help remove a virus

    Visit Microsoft update and install the latest

    updates.

    Update your software and perform a thorough

    scan of your system.

    Download, install and run the malicious

    software removal tool.

  • 8/13/2019 It Pptttttt - Copy

    30/30

    References

    Data Communications and Networking ;

    Behrouz A. Forousan

    www.whatsthelatest.net

    www.itsecurity.com

    www.searchsecurity.techtarget.com