SlideShare une entreprise Scribd logo
1  sur  32
ITC 241
Introduction to Internet Security
Computer Security Defined by
NIST - National Institute of Standards and Technology
http://csrc.nist.gov/
“The protection afforded to an automated
information system in order to attain the applicable
objectives of preserving the integrity, availability,
and confidentiality of information system resources
(includes hardware, software, firmware,
information/data, and telecommunications).”
●Confidentiality –
information access and
disclosure
●Integrity – modification
or destruction of
information
●Availability – timely,
reliable access
Impact Considerations
● Performance
● Organizational assets
● Financial loss
● Harm to Individuals
http://www.youtube.com/watch?v=d-d5TDHa8jw
Confidentiality
● Personal privacy
● Proprietary information
● Secret Info should remain secret
The unauthorized disclosure
(access) of information
Confidentiality
● Mechanisms of
Protection
● Cryptography
● Access Controls
● Examples of Threats
● Malware
● Intruders
● Social engineering
● Insecure networks
● Poorly administered
systems
How does Anonymous do this?
What's the Impact Level of the following real world cases?
http://www.cnn.com/2013/08/21/us/bradley-manning-sentencing
http://www.cnn.com/2013/08/21/us/bradley-manning-sentencing
http://www.forbes.com/sites/ruchikatulshyan/2013/08/23/is-your-spouse-your-biggest-online-security-risk/
http://www.databreaches.net/university-of-north-carolina-servers-hacked-3500-employees-data-accessed/
Integrity
● Trustworthiness
● Origin
● Completeness
● Correctness
unauthorized modification or
destruction of information
Integrity
● Protective
Mechanism
● Access controls to
prevent modification
● Detective
Mechanisms
● identify when
modifications occur
when protective
mechanisms fail
● Integrity Controls
● Principles of least
privilege
● Separation
● Rotation of duties
http://www.cultofmac.com/183063/apple-responds-to-journalist-victim-of-icloud-hack/
This all happened because the hackers were
able to get a hold of Honan’s email address,
his billing address and the last four digits of a
credit card he has on file. Once the hacker
had this info, he or she called Apple, asked
for a reset to the iCloud account in Honan’s
name, and was given a temporary password.
Availability – disruption of access
to or use of information or an
information system.
Confidentiality and Integrity matter
not if the system is not available!
Availability
Threats
● Attacks against
Availability = DoS
● Natural Disasters
● Manmade Disasters
Protective
Mechanisms
● Business continuity
● Disaster Recovery
Planning
● regular/reliable
backups to minimize
loss
How does Anonymous do this?
Identification – scope, locality,
uniqueness of IDs
Authentication – prove to be the
person you say you claim to be!
Identify-authenticate-authorize
login – password – permissions
Methods of Authentication
● What you know (low strength)
● Passwords, passphrases, secret codes,
PINs (low cost)
● What you have (low strength)
● Keys, smart cards, tokens
● (in possession of = higher cost)
● What you are (potential high strength)
● Biometrics
Authorization
● Role Privileges, Rights, Permissions
● Guest
● Participant
● Admin
permissions to view, insert, delete, modify, admin
How does anybody do this?
http://live.wsj.com/video/news-hub-google-gmail-hit-with-china-based-scam/D
Accountability – who sent
what where?
Ability to trace actions back to a
person, place and time, back to a
system and what processes were
performed on it!
Provided by logs and audit trails.
Accountability
System/Application
Logs
● Ordered list of:
● Events
● Actions
● Must have integrity
● Time Stamped across
entire system
● High Level Actions
(email, web page served)
Audit Trail
● Ordered list of:
● Events
● Actions
● Open files
● Writing to files
● Sending packets
across network
http://www.theguardian.com/money/2011/aug/05/beware-hackers-take-over-gmail-account
Privacy = do you really have any?
Organizations should take necessary precautions
to protect the confidentiality and integrity of
personal information they collect, store and
process.
Some Things to Ponder:
What are the types of threats?
Who is conducting these?
Why?
Internet Security - Lecture I
Internet Security - Lecture I

Contenu connexe

Tendances

IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
Benjamin D. Brooks, CISSP
 
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
EC-Council
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
GFI Software
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
sabtolinux
 

Tendances (18)

IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Intrusion in computing
Intrusion in computingIntrusion in computing
Intrusion in computing
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101
 
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean B...
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .
 
Information Security
Information SecurityInformation Security
Information Security
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Computer security
Computer securityComputer security
Computer security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha Kranjac
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2
 
Avila 3 b
Avila 3 bAvila 3 b
Avila 3 b
 
Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
 
Hacking
HackingHacking
Hacking
 

En vedette

Ongoing Research -
Ongoing Research - Ongoing Research -
Ongoing Research -
Connie White
 
Indiana Public Safety Academy - Social Media in K-12 Schools
Indiana Public Safety Academy - Social Media in K-12 SchoolsIndiana Public Safety Academy - Social Media in K-12 Schools
Indiana Public Safety Academy - Social Media in K-12 Schools
Connie White
 
Photosynthesis Part Duex
Photosynthesis Part DuexPhotosynthesis Part Duex
Photosynthesis Part Duex
guest0ec0a
 
Settling North America
Settling North AmericaSettling North America
Settling North America
awltech
 
1660 S M Oper R4
1660 S M  Oper  R41660 S M  Oper  R4
1660 S M Oper R4
Fxx
 

En vedette (20)

Ongoing Research -
Ongoing Research - Ongoing Research -
Ongoing Research -
 
Indiana Public Safety Academy - Social Media in K-12 Schools
Indiana Public Safety Academy - Social Media in K-12 SchoolsIndiana Public Safety Academy - Social Media in K-12 Schools
Indiana Public Safety Academy - Social Media in K-12 Schools
 
Sahana Eden GSoC Social Media Integration
Sahana Eden GSoC Social Media IntegrationSahana Eden GSoC Social Media Integration
Sahana Eden GSoC Social Media Integration
 
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...
Technological Advances Leveraging Use of  Small Unmanned Aerial Vehicles (UAV...
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...
 
Emergency Management and Social Media in Georgia: The State of Now and The ...
Emergency Management and  Social Media in Georgia:  The State of Now and The ...Emergency Management and  Social Media in Georgia:  The State of Now and The ...
Emergency Management and Social Media in Georgia: The State of Now and The ...
 
Hope (something we all need)
Hope  (something we all need)Hope  (something we all need)
Hope (something we all need)
 
Crowdfunding - A new way of financing SMEs in Colombia - #ForosMipyme
Crowdfunding  - A new way of financing SMEs in Colombia - #ForosMipymeCrowdfunding  - A new way of financing SMEs in Colombia - #ForosMipyme
Crowdfunding - A new way of financing SMEs in Colombia - #ForosMipyme
 
Grease Monkey
Grease MonkeyGrease Monkey
Grease Monkey
 
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...
Crowdfunding voor startups - meer dan geld alleen (Leergang Entrepreneurial E...
 
Ochoa marmex
Ochoa marmexOchoa marmex
Ochoa marmex
 
Photosynthesis Part Duex
Photosynthesis Part DuexPhotosynthesis Part Duex
Photosynthesis Part Duex
 
Ochoa marmex
Ochoa marmexOchoa marmex
Ochoa marmex
 
Rabobank - Crowdfunding: De bank buitenspel?
Rabobank - Crowdfunding: De bank buitenspel?Rabobank - Crowdfunding: De bank buitenspel?
Rabobank - Crowdfunding: De bank buitenspel?
 
Dämmen mit seegras aus der Ostsee
Dämmen mit seegras aus der OstseeDämmen mit seegras aus der Ostsee
Dämmen mit seegras aus der Ostsee
 
This is a test
This is a testThis is a test
This is a test
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
 
Settling North America
Settling North AmericaSettling North America
Settling North America
 
Wind Map
Wind MapWind Map
Wind Map
 
1660 S M Oper R4
1660 S M  Oper  R41660 S M  Oper  R4
1660 S M Oper R4
 

Similaire à Internet Security - Lecture I

Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
AfiqEfendy Zaen
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
dagiabebe267
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
Amanda Case
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
satonaka3
 

Similaire à Internet Security - Lecture I (20)

Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Secure Software Design for Data Privacy
Secure Software Design for Data PrivacySecure Software Design for Data Privacy
Secure Software Design for Data Privacy
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache Cassandra
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
IT Security & Risk
IT Security & Risk IT Security & Risk
IT Security & Risk
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Unit v
Unit vUnit v
Unit v
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 

Plus de Connie White

Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...
Connie White
 
Build a Better Mousetrap? Social Media Cultivating Emergency Management Com...
Build a Better Mousetrap?   Social Media Cultivating Emergency Management Com...Build a Better Mousetrap?   Social Media Cultivating Emergency Management Com...
Build a Better Mousetrap? Social Media Cultivating Emergency Management Com...
Connie White
 
Decision making during extreme events
Decision making during extreme eventsDecision making during extreme events
Decision making during extreme events
Connie White
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
Connie White
 
Sahana Foundation’s Response to Haiti Earthquake
Sahana Foundation’s Response to Haiti EarthquakeSahana Foundation’s Response to Haiti Earthquake
Sahana Foundation’s Response to Haiti Earthquake
Connie White
 
Web 3.0 What is it?
Web 3.0  What is it?Web 3.0  What is it?
Web 3.0 What is it?
Connie White
 

Plus de Connie White (20)

Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...
Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...
Social Media, Crisis Communication, Emergency Mgmt & Drone Technology in Heal...
 
Emergency Management Information System Support Rectifying 1st Responder Role...
Emergency Management Information System Support Rectifying 1st Responder Role...Emergency Management Information System Support Rectifying 1st Responder Role...
Emergency Management Information System Support Rectifying 1st Responder Role...
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...
 
Build a Better Mousetrap? Social Media Cultivating Emergency Management Com...
Build a Better Mousetrap?   Social Media Cultivating Emergency Management Com...Build a Better Mousetrap?   Social Media Cultivating Emergency Management Com...
Build a Better Mousetrap? Social Media Cultivating Emergency Management Com...
 
Decision making during extreme events
Decision making during extreme eventsDecision making during extreme events
Decision making during extreme events
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
 
Social Media Empowering a Global Response #IDCExpo
Social Media Empowering a Global Response #IDCExpoSocial Media Empowering a Global Response #IDCExpo
Social Media Empowering a Global Response #IDCExpo
 
EMEC Germany: Social Media for Emergency Management
EMEC Germany: Social Media for Emergency ManagementEMEC Germany: Social Media for Emergency Management
EMEC Germany: Social Media for Emergency Management
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
 
Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011
 
Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011 Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011
 
#EMAG2011 Use Social Media Now for Emergency Management
#EMAG2011 Use Social Media Now for Emergency Management#EMAG2011 Use Social Media Now for Emergency Management
#EMAG2011 Use Social Media Now for Emergency Management
 
Cherokee County Tornado Drill testing Social Media
Cherokee County Tornado Drill testing Social MediaCherokee County Tornado Drill testing Social Media
Cherokee County Tornado Drill testing Social Media
 
Sahana Foundation’s Response to Haiti Earthquake
Sahana Foundation’s Response to Haiti EarthquakeSahana Foundation’s Response to Haiti Earthquake
Sahana Foundation’s Response to Haiti Earthquake
 
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...
Italian Version: Disasters 2.0: Collaborazione in Tempo Reale: Documentazione...
 
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...
Spanish Version: Disasters 2.0 Colaboración en Tiempo Real: Documentación y M...
 
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...
Mandarin Version: Disaster 2.0: Real Time Collaboration: Documentation and Ma...
 
Disasters 2.0: Real Time Collaboration: Documentation and Mapping
Disasters 2.0: Real Time Collaboration: Documentation and MappingDisasters 2.0: Real Time Collaboration: Documentation and Mapping
Disasters 2.0: Real Time Collaboration: Documentation and Mapping
 
Web 3.0 What is it?
Web 3.0  What is it?Web 3.0  What is it?
Web 3.0 What is it?
 

Dernier

Dernier (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Internet Security - Lecture I