SlideShare ist ein Scribd-Unternehmen logo
1 von 18
> > >
Security
• Modern computer security involves the
protection of electronic communications and
the maintenance of network security. A
successful, secure transaction must meet
four fundamental requirements: Privacy,
integrity, authentication and non repudiation.
• The privacy issue is: How do you ensure that
the information you transmit over the Internet
has not been captured or passed on to a third
party without your knowledge?
• The integrity issue is: How do you ensure
that the information you send or receive
has not been compromised or altered?
• The authentication issue is: How do the
sender and recipient of a message verify
their identities?
• The non repudiation issue is: How do you legally
prove that a message was sent or received? In
addition to these requirements, network security
addresses the issue of availability: How do we
ensure that the network and the computer systems
to which it connects will remain in operation
continuously?
• In the next several sections, we will explore
Internet security and the technologies and
protocols used to secure e-commerce transactions
and communications
• Cryptography transforms data by using a
cipher, or cryptosystem (a mathematical
algorithm for the encryption of messages).
• An algorithm is a computer science term
for “procedure.” A key (a string of digits
that acts as a password in the cipher)
makes the data incomprehensible to all
but the sender and intended recipients.
• Unencrypted data is known as plain text,
whereas encrypted data is called ciphertext.
Only the intended recipients should possess
the corresponding key to decrypt the
ciphertext into plaintext.
• Each party in a transaction has both a public
key and a private key.
• To transmit a message securely, the sender
uses the recipient’s public key to encrypt the
message. The recipient then decrypts the
message using his or her unique private key
• Digital signatures, the electronic equivalent of
written signatures, are used in publickey
cryptography to solve authentication and
integrity problems
• A digital signature authenticates the sender’s
identity, and, like a written signature, it is
difficult to forge. To create a digital signature,
a sender first runs a plaintext message
through a hash function, which is a
mathematical calculation that gives the
message a hash value.
• The Secure Sockets Layer (SSL) protocol,
developed by Netscape Communications, is a
non-proprietary protocol commonly used to secure
communications between two computers on the
Internet and the Web.
• SSL is built into many Web browsers, including
Netscape Communicator and Microsoft Internet
Explorer, as well as numerous other software
• products. Although SSL is not designed
specifically to secure online transactions, most e-
businesses use the technology for this purpose.
• Wireless Transport Layer Security (WTLS) is
the security protocol for the Wireless
Application
• Protocol (WAP). WAP is a standard used for
wireless communications on mobile phones
and other wireless devices. WTLS secures
connections between wireless devices and
application servers. It provides wireless
technology with data integrity, privacy,
authentication and denial-of-service security.
• Organizations are taking advantage of the
existing Internet infrastructure to create
Virtual Private Networks (VPNs), which link
multiple networks, wireless users, customers
and other remote users.
• A VPN is created by establishing a “secure
tunnel” between multiple networks.
• Internet Protocol Security (IPSec) is one of
the technologies used to secure the “tunnel”
through which the data passes
> > >
Security Attacks
• Recent cyberattacks on e-businesses have
made the front-pages of newspapers
worldwide.
• Denial-of-service attacks (DoS), viruses and
worms have cost companies billions of
dollars.
• Typically, a denial-of-service attack occurs
when a network or server is flooded with data
packets.
• The influx of data greatly increases the traffic
on the network, overwhelming the servers
and making it impossible for legitimate users
to download information
• A distributed denial-of-service attack
occurs when an unauthorized user gains
illegitimate control of a network of
computers (usually by installing viruses on
the computers) and then uses all the
computers simultaneously to attack. These
attacks cause networked computers to
crash or disconnect from the network,
making services unavailable for legitimate
users.
• Viruses are computer programs—often
sent as e-mail attachments or disguised as
audio clips, video clips and games—that
attach to, or overwrite other programs in
efforts to replicate themselves. Viruses
can corrupt files or even wipe out a hard
drive. The spread of a virus occurs
through sharing “infected” files embedded
in e-mail attachments, documents or
programs.
• worms are similar to viruses, a worm can spread
and infect files on its own over a network; worms
do not need to be attached to another program to
spread.
• One of the most famous viruses to date is the
ILOVEYOU virus which hit in May 2000, costing
organizations and individuals billions of dollars.
Viruses and worms are not limited to computers.
• In June 2000, a worm named Timofonica that was
propagated through e-mail quickly made its way
into the cell-phone network in Spain, sending
prank calls and leaving text messages on
subscribers’ phones
• Who is responsible for viruses and denial-of-service
attacks? Most often the responsible parties are
referred to as hackers or crackers. Hackers and
crackers are usually skilled programmers.
• According to some, hackers break into systems just for
the thrill of it, without causing harm to the
compromised systems, whereas crackers have
malicious intent. However, regardless of an attack’s
consequences, hackers and crackers break the law by
accessing or damaging private information and
computers.
• Many vendors offer antivirus utilities that help protect
computers against viruses and other threats
• The goal of network security is to allow
authorized users access to information
and services while preventing
unauthorized users from gaining access
to, and possibly corrupting, the network.
• A basic tool used in network security is the
firewall, which protects a local area
network (LAN) from intruders outside the
network.
END

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhanAhmed Sleem
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityS.M. Towhidul Islam
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyKiran Patil
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 

Was ist angesagt? (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Hacking
HackingHacking
Hacking
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Network security
Network securityNetwork security
Network security
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
E secuity
E secuityE secuity
E secuity
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 

Andere mochten auch

Andere mochten auch (13)

Normal distribution and hypothesis testing
Normal distribution and hypothesis testingNormal distribution and hypothesis testing
Normal distribution and hypothesis testing
 
Obras analisadas: EVT
Obras analisadas: EVTObras analisadas: EVT
Obras analisadas: EVT
 
8 天使之笔 – part 3
8 天使之笔 – part 38 天使之笔 – part 3
8 天使之笔 – part 3
 
D6.1 -ship-structure_-_final
D6.1  -ship-structure_-_finalD6.1  -ship-structure_-_final
D6.1 -ship-structure_-_final
 
prezentare engleza 2
prezentare engleza 2prezentare engleza 2
prezentare engleza 2
 
Sarah and frances vocab
Sarah and frances vocabSarah and frances vocab
Sarah and frances vocab
 
解构主义设计
解构主义设计解构主义设计
解构主义设计
 
Challenges in global warming
Challenges in global warmingChallenges in global warming
Challenges in global warming
 
N.Saravanan
N.SaravananN.Saravanan
N.Saravanan
 
Piccola storia di provincia
Piccola storia di provinciaPiccola storia di provincia
Piccola storia di provincia
 
Abraham maslow
Abraham maslowAbraham maslow
Abraham maslow
 
Social Branding - Gerd Leonhard (Media Futures Group) at #CSMM
Social Branding - Gerd Leonhard (Media Futures Group) at #CSMMSocial Branding - Gerd Leonhard (Media Futures Group) at #CSMM
Social Branding - Gerd Leonhard (Media Futures Group) at #CSMM
 
Presentation1
Presentation1Presentation1
Presentation1
 

Ähnlich wie 6 security

презентация1
презентация1презентация1
презентация1sagidullaa01
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Amit Fogla
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
ITFT - Web security
ITFT - Web securityITFT - Web security
ITFT - Web securityBlossom Sood
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxNune SrinivasRao
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 

Ähnlich wie 6 security (20)

презентация1
презентация1презентация1
презентация1
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
ITFT - Web security
ITFT - Web securityITFT - Web security
ITFT - Web security
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Computer security
Computer securityComputer security
Computer security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 

Kürzlich hochgeladen

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 

Kürzlich hochgeladen (20)

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 

6 security

  • 2. • Modern computer security involves the protection of electronic communications and the maintenance of network security. A successful, secure transaction must meet four fundamental requirements: Privacy, integrity, authentication and non repudiation. • The privacy issue is: How do you ensure that the information you transmit over the Internet has not been captured or passed on to a third party without your knowledge?
  • 3. • The integrity issue is: How do you ensure that the information you send or receive has not been compromised or altered? • The authentication issue is: How do the sender and recipient of a message verify their identities?
  • 4. • The non repudiation issue is: How do you legally prove that a message was sent or received? In addition to these requirements, network security addresses the issue of availability: How do we ensure that the network and the computer systems to which it connects will remain in operation continuously? • In the next several sections, we will explore Internet security and the technologies and protocols used to secure e-commerce transactions and communications
  • 5. • Cryptography transforms data by using a cipher, or cryptosystem (a mathematical algorithm for the encryption of messages). • An algorithm is a computer science term for “procedure.” A key (a string of digits that acts as a password in the cipher) makes the data incomprehensible to all but the sender and intended recipients.
  • 6. • Unencrypted data is known as plain text, whereas encrypted data is called ciphertext. Only the intended recipients should possess the corresponding key to decrypt the ciphertext into plaintext. • Each party in a transaction has both a public key and a private key. • To transmit a message securely, the sender uses the recipient’s public key to encrypt the message. The recipient then decrypts the message using his or her unique private key
  • 7. • Digital signatures, the electronic equivalent of written signatures, are used in publickey cryptography to solve authentication and integrity problems • A digital signature authenticates the sender’s identity, and, like a written signature, it is difficult to forge. To create a digital signature, a sender first runs a plaintext message through a hash function, which is a mathematical calculation that gives the message a hash value.
  • 8. • The Secure Sockets Layer (SSL) protocol, developed by Netscape Communications, is a non-proprietary protocol commonly used to secure communications between two computers on the Internet and the Web. • SSL is built into many Web browsers, including Netscape Communicator and Microsoft Internet Explorer, as well as numerous other software • products. Although SSL is not designed specifically to secure online transactions, most e- businesses use the technology for this purpose.
  • 9. • Wireless Transport Layer Security (WTLS) is the security protocol for the Wireless Application • Protocol (WAP). WAP is a standard used for wireless communications on mobile phones and other wireless devices. WTLS secures connections between wireless devices and application servers. It provides wireless technology with data integrity, privacy, authentication and denial-of-service security.
  • 10. • Organizations are taking advantage of the existing Internet infrastructure to create Virtual Private Networks (VPNs), which link multiple networks, wireless users, customers and other remote users. • A VPN is created by establishing a “secure tunnel” between multiple networks. • Internet Protocol Security (IPSec) is one of the technologies used to secure the “tunnel” through which the data passes
  • 11. > > > Security Attacks
  • 12. • Recent cyberattacks on e-businesses have made the front-pages of newspapers worldwide. • Denial-of-service attacks (DoS), viruses and worms have cost companies billions of dollars. • Typically, a denial-of-service attack occurs when a network or server is flooded with data packets. • The influx of data greatly increases the traffic on the network, overwhelming the servers and making it impossible for legitimate users to download information
  • 13. • A distributed denial-of-service attack occurs when an unauthorized user gains illegitimate control of a network of computers (usually by installing viruses on the computers) and then uses all the computers simultaneously to attack. These attacks cause networked computers to crash or disconnect from the network, making services unavailable for legitimate users.
  • 14. • Viruses are computer programs—often sent as e-mail attachments or disguised as audio clips, video clips and games—that attach to, or overwrite other programs in efforts to replicate themselves. Viruses can corrupt files or even wipe out a hard drive. The spread of a virus occurs through sharing “infected” files embedded in e-mail attachments, documents or programs.
  • 15. • worms are similar to viruses, a worm can spread and infect files on its own over a network; worms do not need to be attached to another program to spread. • One of the most famous viruses to date is the ILOVEYOU virus which hit in May 2000, costing organizations and individuals billions of dollars. Viruses and worms are not limited to computers. • In June 2000, a worm named Timofonica that was propagated through e-mail quickly made its way into the cell-phone network in Spain, sending prank calls and leaving text messages on subscribers’ phones
  • 16. • Who is responsible for viruses and denial-of-service attacks? Most often the responsible parties are referred to as hackers or crackers. Hackers and crackers are usually skilled programmers. • According to some, hackers break into systems just for the thrill of it, without causing harm to the compromised systems, whereas crackers have malicious intent. However, regardless of an attack’s consequences, hackers and crackers break the law by accessing or damaging private information and computers. • Many vendors offer antivirus utilities that help protect computers against viruses and other threats
  • 17. • The goal of network security is to allow authorized users access to information and services while preventing unauthorized users from gaining access to, and possibly corrupting, the network. • A basic tool used in network security is the firewall, which protects a local area network (LAN) from intruders outside the network.
  • 18. END