SlideShare a Scribd company logo
1 of 22
MODULE 2  -  NETWORK SECURITY E - COMMERCE ,[object Object],[object Object],PRESENTED BY  -  SREERAG GOPINATH P.C SEMESTER VIII COMPUTER SCIENCE & ENGG. SJCET, PALAI
SECURITY THREATS A  Security threat  is a circumstance, condition, or event with the potential to cause  economic hardship to data or network resources  in the form of -  destruction,  -  disclosure,  -  modification of data, -  denial of service, and / or  -  fraud, waste or abuse. Confidence, reliability and protection  of information against security threats is a crucial prerequisite for the functioning of e-commerce.
SECURITY CONCERNS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CLIENT SERVER NETWORK SECURITY Client  server  Network security ,[object Object],[object Object],[object Object],[object Object],B A L A N C I N G   & SYSTEM ADMINISTRATORS HAVE A HARD TIME
WHY PAY ATTENTION TO SECURITY? INTERNET 10000 networks-  Unlimited number of hackers? CORPORATE LAN OR WAN SUBNET CORPORATE NETWORK
CLIENT SERVER SECURITY PROBLEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REDUCING CLIENT SECURITY THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROTECTION METHODS ,[object Object],[object Object],[object Object],[object Object]
TRUST BASED SECURITY ,[object Object],[object Object],[object Object],[object Object]
SECURITY THROUGH OBSCURITY (STO) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PASSWORD SCHEMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BIOMETRIC SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EMERGING CLIENT - SERVER SECURITY THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOFTWARE AGENTS & MALICIOUS CODE THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MALICIOUS CODE ,[object Object],[object Object],[object Object],[object Object]
MALICIOUS CODE - EXAMPLES
THREATS TO SERVERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DENIAL OF SERVICE ATTACKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SERVICE OVERLOADING ,[object Object],[object Object],[object Object],[object Object],[object Object]
MESSAGE FLOODING ,[object Object],[object Object],[object Object],[object Object]
COUNTERING SERVER THREATS - FIREWALLS INTERNET CORPORATE LAN OR WAN CORPORATE NETWORK STOP
THANK YOU !!!

More Related Content

What's hot

Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayKevin Lim
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Data Security
Data SecurityData Security
Data Securitybackdoor
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeNithilan1
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and AbuseAlbrecht Jones
 
Website security
Website securityWebsite security
Website securityRIPPER95
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacksijdmtaiir
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWAREWhiteHats
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 

What's hot (20)

Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Network security
Network securityNetwork security
Network security
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Security communication
Security communicationSecurity communication
Security communication
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Data Security
Data SecurityData Security
Data Security
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
Attack types
Attack typesAttack types
Attack types
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
Website security
Website securityWebsite security
Website security
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
 
Firewall
FirewallFirewall
Firewall
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 

Viewers also liked

Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Alfredo Caicedo
 
INFORMATICA ETIQUETAS
INFORMATICA ETIQUETASINFORMATICA ETIQUETAS
INFORMATICA ETIQUETASdiosadelsol
 
Serbia Training
Serbia TrainingSerbia Training
Serbia Trainingemmotive
 
Tech Class Slideshow
Tech Class SlideshowTech Class Slideshow
Tech Class Slideshowninagusta
 
EPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdEPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdSafarah Asmadi
 
A Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers TogetherA Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers Togetherashkamodi
 
International Student Presentation By Tamerlan
International Student Presentation By TamerlanInternational Student Presentation By Tamerlan
International Student Presentation By TamerlanTamerlan Rajabov
 
Saye 3 June 2009 For Linklaters
Saye 3 June 2009 For LinklatersSaye 3 June 2009 For Linklaters
Saye 3 June 2009 For Linklatersgstopp
 
வாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேவாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேguestcf7c6c5
 
Petunjuk Singkat Ta Pa
Petunjuk Singkat Ta PaPetunjuk Singkat Ta Pa
Petunjuk Singkat Ta Paagus franky
 
Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5briancarnell
 
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Université de Sherbrooke
 

Viewers also liked (20)

Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009
 
INFORMATICA ETIQUETAS
INFORMATICA ETIQUETASINFORMATICA ETIQUETAS
INFORMATICA ETIQUETAS
 
Serbia Training
Serbia TrainingSerbia Training
Serbia Training
 
Tech Class Slideshow
Tech Class SlideshowTech Class Slideshow
Tech Class Slideshow
 
EPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdEPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherd
 
A Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers TogetherA Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers Together
 
International Student Presentation By Tamerlan
International Student Presentation By TamerlanInternational Student Presentation By Tamerlan
International Student Presentation By Tamerlan
 
Saye 3 June 2009 For Linklaters
Saye 3 June 2009 For LinklatersSaye 3 June 2009 For Linklaters
Saye 3 June 2009 For Linklaters
 
The Myst Story
The Myst StoryThe Myst Story
The Myst Story
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Welcome To Math III
Welcome To Math IIIWelcome To Math III
Welcome To Math III
 
வாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேவாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கே
 
Petunjuk Singkat Ta Pa
Petunjuk Singkat Ta PaPetunjuk Singkat Ta Pa
Petunjuk Singkat Ta Pa
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5
 
Kilit SüResi
Kilit SüResiKilit SüResi
Kilit SüResi
 
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
 
Reflexology
ReflexologyReflexology
Reflexology
 
Bureaupresentatie
BureaupresentatieBureaupresentatie
Bureaupresentatie
 
Tuahiwi.Ppt4
Tuahiwi.Ppt4Tuahiwi.Ppt4
Tuahiwi.Ppt4
 

Similar to Sreerag cs network security

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptxRRamyaDevi
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxDebmalyaSingha
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxhealdkathaleen
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 

Similar to Sreerag cs network security (20)

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
Computing safety
Computing safetyComputing safety
Computing safety
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from Sreerag Gopinath

Sreerag web services - universal data access
Sreerag web services - universal data accessSreerag web services - universal data access
Sreerag web services - universal data accessSreerag Gopinath
 
Sreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag Gopinath
 
Sreerag what is a web service
Sreerag   what is a web serviceSreerag   what is a web service
Sreerag what is a web serviceSreerag Gopinath
 
Sreerag parallel programming
Sreerag   parallel programmingSreerag   parallel programming
Sreerag parallel programmingSreerag Gopinath
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architectureSreerag Gopinath
 

More from Sreerag Gopinath (6)

Sreerag web services - universal data access
Sreerag web services - universal data accessSreerag web services - universal data access
Sreerag web services - universal data access
 
Sreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networks
 
Sreerag what is a web service
Sreerag   what is a web serviceSreerag   what is a web service
Sreerag what is a web service
 
Sreerag parallel programming
Sreerag   parallel programmingSreerag   parallel programming
Sreerag parallel programming
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architecture
 
Sreerag dot net vs j2ee
Sreerag   dot net vs j2eeSreerag   dot net vs j2ee
Sreerag dot net vs j2ee
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Sreerag cs network security

  • 1.
  • 2. SECURITY THREATS A Security threat is a circumstance, condition, or event with the potential to cause economic hardship to data or network resources in the form of - destruction, - disclosure, - modification of data, - denial of service, and / or - fraud, waste or abuse. Confidence, reliability and protection of information against security threats is a crucial prerequisite for the functioning of e-commerce.
  • 3.
  • 4.
  • 5. WHY PAY ATTENTION TO SECURITY? INTERNET 10000 networks- Unlimited number of hackers? CORPORATE LAN OR WAN SUBNET CORPORATE NETWORK
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. MALICIOUS CODE - EXAMPLES
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. COUNTERING SERVER THREATS - FIREWALLS INTERNET CORPORATE LAN OR WAN CORPORATE NETWORK STOP