Anzeige

Computer , Internet and physical security.

SAP BI/BW/BO Developer at Sopra Steria Group um Sopra Steria
24. Jul 2014
Anzeige

Más contenido relacionado

Anzeige
Anzeige

Computer , Internet and physical security.

  1. Computer Security Internet Security Physical Security
  2. Computer Security
  3. Computer Security
  4. Computer Security • It refers to protection of a computer and the information stored in it, from the unauthorised users.
  5. Computer Security • It refers to protection of a computer and the information stored in it, from the unauthorised users. • Computer security is a branch of computer technology known as information security as applied to computers and networks.
  6. Security Threats
  7. Security Threats 1 Malicious Code and Software 2 Hackers and Crackers
  8. Malicious Code and Software
  9. Malicious Code and Software • It is a software program that generates threats to the computers and data stored on it.
  10. Malicious Code and Software • It is a software program that generates threats to the computers and data stored on it. • This code can be in the form of worms ,logic bombs, viruses, Trojan horses and other type of software.
  11. Malicious Code and Software
  12. Hackers and Crackers
  13. Hackers and Cracker
  14. Hackers and Cracker
  15. Hackers and Cracker • A hacker is a person who breaks into computers without authorisation. He is actively involved in computer security and are non professional or programmers without formal training.
  16. Malicious Program
  17. Malicious Program • Any computer program or code that is designed to do harm, can be termed a malicious program. Ex – Virus , Worms , Trojan horse , Logic bomb , Spyware etc.
  18. Virus
  19. Virus • It is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. Virus has the ability to infect different parts of the computer.
  20. Worms
  21. Worms
  22. Worms • A computer worm is a self-replicating computer designed to destroy data. Worm program often use network connections to spread from one computer to another computer system. Thus, worms attack systems that are linked through communication lines.
  23. Logic Bomb
  24. Logic Bomb
  25. Logic Bomb • This is one of the oldest types of programs and it embeds its code into legitimate programs. Like a bomb it explodes all the data when certain conditions are met. This could be either destroying or deletion of certain files on a particular time, and so on. It reacts as a time bomb.
  26. Trojan Horses
  27. Trojan Horses
  28. Trojan Horses
  29. Trojan Horses • Trojan appears to perform a desirable function but in fact, performs undisclosed, malicious function. These programs enter into a computer through an e-mail or free programs that are download from the internet.
  30. Trojan Horses • Trojan appears to perform a desirable function but in fact, performs undisclosed, malicious function. These programs enter into a computer through an e-mail or free programs that are download from the internet. • Once they safely pass into the computer, they may lie inactive from months before they activated or complete control of the computer is given to a hacker.
  31. • It allows unauthorised access to the host machine, giving them ability to save their files on the user’s computer or even to watch the user’s screen and to control the computer.
  32. Antivirus
  33. Antivirus • It is a software utility which mainly prevents and removes computer viruses, including worms and Trojan horses. It scan the hard disk for viruses and tries to removes them, if found.
  34. Antivirus
  35. Antivirus Protection
  36. Security techniques from hacker and crackers
  37. Security techniques from hacker and crackers • Cryptography • Captcha
  38. Cryptography
  39. Cryptography • Cryptography is the process of alternating the original massages to hide their meaning from opponents who might intercept them.
  40. Cryptography • Cryptography is the process of alternating the original massages to hide their meaning from opponents who might intercept them. • Cryptography relies upon to basic components an algorithm and key. • Some of the algorithm are given here. 1 Secret Key Cryptography 2 Public Key cryptography 3 Hash Function 4 Digital Signature
  41. Secret Key Cryptography
  42. Secret Key Cryptography • A single key is used in SKC for both encryption and decryption of data. In this form of cryptography the key must be known the sender and receiver.
  43. Public Key Cryptography
  44. Public Key Cryptography • Each person in this techniques gets known as the public and private key. Each person’s public key is publicly known and private key kept secret. • The sender uses the receiver’s public key to encrypt the message and when receiver receives the encrypted massage , he uses his private key to decrypt the massage.
  45. Hash Function
  46. Hash function • It is also called massage digests and it is a one way encryption algorithm that does not use any key to encrypt or decrypt the massage. • It uses a digital fingerprint of a file’s contents, in order to ensure that the file has not been changed by an intruder or any type of virus.
  47. Digital Signature
  48. Digital Signature • Digital signature uses the public key cryptography technique. It uses two different keys in an algorithm but these are mathematically related to each other. One is for digital signature creation and another key for verifying a digital signature.
  49. Captcha • It’s full name is “Completely Automated Public Turing test to tell Computers and Humans Apart”. • In modern computers, a robot or an automated program generates undesired information in the web pages and websites. • A Captcha is a type of test in computing to make sure that the response is not generated by a computer. • A Captcha is a program that generates
  50. Internet Security
  51. Internet Security • Internet Security is a branch of information technology known as information security as applied to computers and networks.
  52. OSI Reference Model • Its full name is Open System Interconnection. • The International Standards Organization developed in the early 1980 to promote interoperability of network devices. • It has seven layer.
  53. Seven layer of OSI model • Application Layer • Presentation Layer • Session Layer • Transport Layer • Network Layer • Data Link Layer • Physical Layer
  54. Security for the OSI Model
  55. Security for the OSI Model • Authentication • Access Control • Logging and Monitoring • Data Integrity • Data Confidentiality
  56. TCP/IP Reference Model
  57. TCP/IP Reference Model • TCP/IP is based a four layer reference model. • It is proposed by ISO(International Standards Organization). • Layers of TCP/IP model Application Layer Transport Layer Internet Layer Network Interface layer
  58. Security for TCP/IP Model
  59. Security for TCP/IP Model • Routers :- A router is a network traffic management device designed to forward the packets. It consists of hardware and software to implement the task for forwarding the packets. • Firewall :- Firewall is a system has been designed to prevent the unauthorized access to or from a private network.
  60. Physical Security
  61. Physical Security • The connection between physical system and logical systems ensure that, in order to protect logical systems, the hardware which is alive at that time must be physically secured. • It involves protecting sites from natural and man-made physical threats.
  62. Physical Security Threats
  63. Physical Security Threats • Weather : floods, fire, snow, ice, heat, cold • Earth movement : earthquakes, mudslides • Structural Failure : building collapse • Fire/chemical : explosions, smoke • Energy : loss of power, radiation, magnetic wave infrastructure • Biological : virus, infections of animal and insects
  64. Educating Personal • An organization can educate its staff members on the importance of their physical security through the use of self- paced or formal instructions, security education bulletins , posters, training films and tape or awareness data that drive home the importance of constant vigilence.
  65. Administrative Access Control • This is an important category of physical access control. It addresses the procedural application of physical controls. There exist different type of physical control devices that make a site more secure.
  66. Physical Security Controls • This is the next category of the physical access control which includes mechanical and electronic access controls such as gates, doors, keys and combination locks. By physical security, most people understand these types of access control because these devices are the least complicated and expensive.
  67. Technical Controls • The next category of physical security control is the use of computer hardware and software. Some of the technical security measures are discussed here. A smart card, which is similar to regular payment card, access card, the smart card has many purpose, such as medical identification, travel ticketing identifiction and builiding access control.
  68. The End (Follow me for more updates)
Anzeige