SlideShare a Scribd company logo
1 of 22
MODULE 2  -  NETWORK SECURITY E - COMMERCE ,[object Object],[object Object],PRESENTED BY  -  SREERAG GOPINATH P.C SEMESTER VIII COMPUTER SCIENCE & ENGG. SJCET, PALAI
SECURITY THREATS A  Security threat  is a circumstance, condition, or event with the potential to cause  economic hardship to data or network resources  in the form of -  destruction,  -  disclosure,  -  modification of data, -  denial of service, and / or  -  fraud, waste or abuse. Confidence, reliability and protection  of information against security threats is a crucial prerequisite for the functioning of e-commerce.
SECURITY CONCERNS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CLIENT SERVER NETWORK SECURITY Client  server  Network security ,[object Object],[object Object],[object Object],[object Object],B A L A N C I N G   & SYSTEM ADMINISTRATORS HAVE A HARD TIME
WHY PAY ATTENTION TO SECURITY? INTERNET 10000 networks-  Unlimited number of hackers? CORPORATE LAN OR WAN SUBNET CORPORATE NETWORK
CLIENT SERVER SECURITY PROBLEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REDUCING CLIENT SECURITY THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROTECTION METHODS ,[object Object],[object Object],[object Object],[object Object]
TRUST BASED SECURITY ,[object Object],[object Object],[object Object],[object Object]
SECURITY THROUGH OBSCURITY (STO) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PASSWORD SCHEMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BIOMETRIC SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EMERGING CLIENT - SERVER SECURITY THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOFTWARE AGENTS & MALICIOUS CODE THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MALICIOUS CODE ,[object Object],[object Object],[object Object],[object Object]
MALICIOUS CODE - EXAMPLES
THREATS TO SERVERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DENIAL OF SERVICE ATTACKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SERVICE OVERLOADING ,[object Object],[object Object],[object Object],[object Object],[object Object]
MESSAGE FLOODING ,[object Object],[object Object],[object Object],[object Object]
COUNTERING SERVER THREATS - FIREWALLS INTERNET CORPORATE LAN OR WAN CORPORATE NETWORK STOP
THANK YOU !!!

More Related Content

What's hot

Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayKevin Lim
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Data Security
Data SecurityData Security
Data Securitybackdoor
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeNithilan1
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and AbuseAlbrecht Jones
 
Website security
Website securityWebsite security
Website securityRIPPER95
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacksijdmtaiir
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWAREWhiteHats
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 

What's hot (20)

Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Network security
Network securityNetwork security
Network security
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Security communication
Security communicationSecurity communication
Security communication
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Data Security
Data SecurityData Security
Data Security
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
Attack types
Attack typesAttack types
Attack types
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
Website security
Website securityWebsite security
Website security
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
 
Firewall
FirewallFirewall
Firewall
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 

Viewers also liked

Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Alfredo Caicedo
 
INFORMATICA ETIQUETAS
INFORMATICA ETIQUETASINFORMATICA ETIQUETAS
INFORMATICA ETIQUETASdiosadelsol
 
Serbia Training
Serbia TrainingSerbia Training
Serbia Trainingemmotive
 
Tech Class Slideshow
Tech Class SlideshowTech Class Slideshow
Tech Class Slideshowninagusta
 
EPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdEPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdSafarah Asmadi
 
A Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers TogetherA Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers Togetherashkamodi
 
International Student Presentation By Tamerlan
International Student Presentation By TamerlanInternational Student Presentation By Tamerlan
International Student Presentation By TamerlanTamerlan Rajabov
 
Saye 3 June 2009 For Linklaters
Saye 3 June 2009 For LinklatersSaye 3 June 2009 For Linklaters
Saye 3 June 2009 For Linklatersgstopp
 
வாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேவாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேguestcf7c6c5
 
Petunjuk Singkat Ta Pa
Petunjuk Singkat Ta PaPetunjuk Singkat Ta Pa
Petunjuk Singkat Ta Paagus franky
 
Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5briancarnell
 
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Université de Sherbrooke
 

Viewers also liked (20)

Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009
 
INFORMATICA ETIQUETAS
INFORMATICA ETIQUETASINFORMATICA ETIQUETAS
INFORMATICA ETIQUETAS
 
Serbia Training
Serbia TrainingSerbia Training
Serbia Training
 
Tech Class Slideshow
Tech Class SlideshowTech Class Slideshow
Tech Class Slideshow
 
EPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdEPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherd
 
A Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers TogetherA Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers Together
 
International Student Presentation By Tamerlan
International Student Presentation By TamerlanInternational Student Presentation By Tamerlan
International Student Presentation By Tamerlan
 
Saye 3 June 2009 For Linklaters
Saye 3 June 2009 For LinklatersSaye 3 June 2009 For Linklaters
Saye 3 June 2009 For Linklaters
 
The Myst Story
The Myst StoryThe Myst Story
The Myst Story
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Welcome To Math III
Welcome To Math IIIWelcome To Math III
Welcome To Math III
 
வாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேவாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கே
 
Petunjuk Singkat Ta Pa
Petunjuk Singkat Ta PaPetunjuk Singkat Ta Pa
Petunjuk Singkat Ta Pa
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5
 
Kilit SüResi
Kilit SüResiKilit SüResi
Kilit SüResi
 
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
 
Reflexology
ReflexologyReflexology
Reflexology
 
Bureaupresentatie
BureaupresentatieBureaupresentatie
Bureaupresentatie
 
Tuahiwi.Ppt4
Tuahiwi.Ppt4Tuahiwi.Ppt4
Tuahiwi.Ppt4
 

Similar to Sreerag cs network security

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptxRRamyaDevi
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxDebmalyaSingha
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxhealdkathaleen
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 

Similar to Sreerag cs network security (20)

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
Computing safety
Computing safetyComputing safety
Computing safety
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from Sreerag Gopinath

Sreerag web services - universal data access
Sreerag web services - universal data accessSreerag web services - universal data access
Sreerag web services - universal data accessSreerag Gopinath
 
Sreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag Gopinath
 
Sreerag what is a web service
Sreerag   what is a web serviceSreerag   what is a web service
Sreerag what is a web serviceSreerag Gopinath
 
Sreerag parallel programming
Sreerag   parallel programmingSreerag   parallel programming
Sreerag parallel programmingSreerag Gopinath
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architectureSreerag Gopinath
 

More from Sreerag Gopinath (6)

Sreerag web services - universal data access
Sreerag web services - universal data accessSreerag web services - universal data access
Sreerag web services - universal data access
 
Sreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networks
 
Sreerag what is a web service
Sreerag   what is a web serviceSreerag   what is a web service
Sreerag what is a web service
 
Sreerag parallel programming
Sreerag   parallel programmingSreerag   parallel programming
Sreerag parallel programming
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architecture
 
Sreerag dot net vs j2ee
Sreerag   dot net vs j2eeSreerag   dot net vs j2ee
Sreerag dot net vs j2ee
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Sreerag cs network security

  • 1.
  • 2. SECURITY THREATS A Security threat is a circumstance, condition, or event with the potential to cause economic hardship to data or network resources in the form of - destruction, - disclosure, - modification of data, - denial of service, and / or - fraud, waste or abuse. Confidence, reliability and protection of information against security threats is a crucial prerequisite for the functioning of e-commerce.
  • 3.
  • 4.
  • 5. WHY PAY ATTENTION TO SECURITY? INTERNET 10000 networks- Unlimited number of hackers? CORPORATE LAN OR WAN SUBNET CORPORATE NETWORK
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. MALICIOUS CODE - EXAMPLES
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. COUNTERING SERVER THREATS - FIREWALLS INTERNET CORPORATE LAN OR WAN CORPORATE NETWORK STOP