SlideShare a Scribd company logo
1 of 29
Prepared by :
Mohammed Adnan Abu Ward 120081704
Main Points
 Introduction
 Computer Security Attributes
 Statistics
 Types of Attacks
 Technology for Internet Security
 Conclusion
 References
Introduction
 The public Internet is a worldwide collection of
connected computer networks that are accessible by
individual variety of ways using a particular set of
communication protocols which is known as TCP/IP.

 Today millions of end systems use the Internet
regardless of national or geographic boundaries or
time.
Computer Security Attributes
 Understanding the security attributes is critical in
  order to conduct risk analysis and find the suitable
  control for each attribute.
 There are four main computer security attributes :
 Confidentiality : Unauthorized persons should
  not gain access to others data.


 Integrity : involves accuracy of data.
Computer Security Attributes…
 Privacy : the ability and/or right to protect your
  personal secrets.

 Availability : computer assets should be available for
  and accessible to authorized persons when they need
  them and should not be interrupted
.
Numbers of Users of the Internet
                                        % WORLD
         DATE   NUMBER OF USERS
                                       POPULATION
 June, 2010          1,966 millions             28.7 %

 Sept, 2010           1,971 millions            28.8 %

 Mar, 2011           2,095 millions             30.2 %

 Jun, 2011            2,110 millions            30.4 %

 Sept, 2011           2,180 millions            31.5 %

 Dec, 2011           2,267 millions             32.7 %

 Mar, 2012            2,336 millions            33.3 %

 June, 2012          2,405 millions             34.3 %
Vulnerable applications targeted by malicious users
Distribution of Attack Techniques
Types of Attacks
1-Viruses
 Viruses are self-replicating programs that infect and
   propagate through files.
 Viruses often have additional properties, beyond being
  an infector or macro virus, A virus may also be
  multi-partite, stealth, encrypted or polymorphic.
 A virus using encryption will know how to decrypt
   itself to run, As the bulk of the virus is encrypted, it is
    harder to detect and analyze.
2-System and Boot Record Infectors
 System and Boot record infectors were the most
  common type of virus until the mid 1990s.
 These types of viruses infect system areas of a
  computer such as the Master Boot Record (MBR) on
  hard disks.
 By installing itself into boot records, the virus can run
  itself every time the computer is booted up.
 with the introduction of more modern operating
  systems, and virus checks being enabled in the Basic
  Input Output System (BIOS), The risk of these viruses
  disappear.
3-Eavesdropping
 Eavesdropping involves interception or gaining access
   to communications by unauthorized party.
There are two types of Eavesdropping
 Passive : when an unauthorized person listens
  secretly to the networked messages.
 Active : intruder not only listens to but also injects
  something into the communication to distort or create
  bogus .
4-Hacking
 Hackers can be people who are career criminal. They
   are competent and highly skilled at using computers.

 Once they analyze and discover a leak point in the
  target system, they will find ways to access and attack
  the system.

 They can also break through Web servers to access or
 steal information.
5- Worms
 A worm is a self-replicating program that propagates
  over a network in some way.

 Unlike viruses, worms do not require an infected file to
 propagate.

 Worms classified into two types :
   mass-mailing worms : Email worms.
   network-aware worms : SQL Slammer.
6- Trojans
 Name story


 Today’s Trojans work in a very
  similar way. They will appear to be benign programs to
  the user, but will actually have some malicious
   purpose.
7-IP Spoofing Attacks
 The basic protocol for sending data over the Internet
  network and many other computer networks is the Internet
  Protocol

 The header of each IP packet contains, among other things,
  the numerical source and destination address of the
  packet.

 By forging the header so it contains a different address, an
  attacker can make it appear that the packet was sent by a
  different machine. The machine that receives spoofed
  packets will send a response back to the forged source
  address.
8-Denial of Service
 Is an attempt to make a machine or network
  resource unavailable to its intended users.

 It generally consists of the efforts of one or more
  people to temporarily or indefinitely interrupt or
  suspend services of a host connected to
  the Internet.
9-Email Bombing and Spamming
 Email bombing is the intentional sending of large
  volumes of messages to a target address.
 The overloading of the target email address can render
  it unusable and can even cause the mail server to
  crash.
 Email Spamming : is the practice of sending unwanted
  email messages, frequently with commercial content,
  in large quantities to an indiscriminate set of
  recipients.
10-Phishing
 phishing is the act of attempting to acquire
  information such as usernames, passwords, and credit
  card details .
 Phishing emails may contain links to websites that are
  infected with malware.
 Phishing is typically carried out by e-mail
  spoofing or instant messaging, and it often directs
  users to enter details at a fake website whose look and
  feel are almost identical to the legitimate one.
Technology for Internet Security
 With the rapid growth of interest in the Internet,
 network security has become a major concern to
 companies throughout the world.

 Internet security tools typically provide
 authentication, encryption, identify attacks, and
 block and filter packets
1-Cryptographic systems
Cryptography originally denotes the art of keeping
information secret by the use of codes and ciphers.
2- Firewall
 A firewall can either be software-based or hardware-
 based and is used to help keep a network secure.

 Its primary objective is to control the incoming and
 outgoing network traffic by analyzing the data packets
 and determining whether it should be allowed through
 or not, based on a predetermined rule set.
3- Intrusion Detection Systems
 An intrusion detection system (IDS) is a device
  or software application that monitors network or
  system activities for malicious activities or policy
  violations and produces reports to a management
  station.
 Everything from a simple port scan to a full attack
  against your Web server can be detected by the IDS
  system.
4- Anti-Malware Software and scanners
 Viruses, worms and Trojan horses are all examples
  of malicious software, or Malware for short.

 anti-Malware tools are used to detect them and
  cure an infected system.

 The most common type of anti-Malware software
  is virus scanners. These tools often consist of two
  different but related parts
  • Scanner
  • Disinfector.
5-Internet Protocol Security (IPSec)
 Internet Protocol Security (IPsec) is a protocol
  suite for securing Internet Protocol communications
  by authenticating and encrypting each IP packet of a
  communication session.
 IPsec is an end-to-end security scheme operating in
  the Internet Layer of the Internet Protocol Suite. It
  can be used in protecting data flows between a pair of
  hosts (host-to-host), between a pair of security
  gateways (network-to-network), or between a security
  gateway and a host (network-to-host).
Secure Socket Layer (SSL)
 The Secure Socket Layer (SSL) is a suite of protocols
  that actually uses many different standards of key
   exchange, authentication and encryption.
 The server typically provides regular web service http
 on port 80, and SSL-encrypted web traffic https over
 port 443.

 SSL is a standard way to achieve a good level of
  security between a web browser and a website.
Conclusion
 Internet threats will continue to be a major issue in
  the global world as long as information is
  accessible and transferred across the Internet.

 Security is critical and
   must be ensured so that Internet users can have
   confidence engaging in activities on the Internet.
References
 http://en.wikipedia.org/wiki/Network_security


 http://www.cert.org/encyc_article/tocencyc.html#WhyVul


 http://www.referenceforbusiness.com/small/Inc-
 Mail/Internet-Security.html

 http://royal.pingdom.com/2013/01/16/internet-2012-in-
 numbers/
The End

More Related Content

What's hot

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesFaizan Shaikh
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a reviewINFOGAIN PUBLICATION
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 

What's hot (20)

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a review
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 

Viewers also liked

Different types of attacks
Different types of attacksDifferent types of attacks
Different types of attacksRohan Bharadwaj
 
Internet security
Internet securityInternet security
Internet securitygohel
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet securityhoshmand kareem
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (14)

Different types of attacks
Different types of attacksDifferent types of attacks
Different types of attacks
 
Internet security
Internet securityInternet security
Internet security
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Internet security

Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSKatie Robinson
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 

Similar to Internet security (20)

Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Mitppt
MitpptMitppt
Mitppt
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

Internet security

  • 1. Prepared by : Mohammed Adnan Abu Ward 120081704
  • 2. Main Points  Introduction  Computer Security Attributes  Statistics  Types of Attacks  Technology for Internet Security  Conclusion  References
  • 3. Introduction  The public Internet is a worldwide collection of connected computer networks that are accessible by individual variety of ways using a particular set of communication protocols which is known as TCP/IP.  Today millions of end systems use the Internet regardless of national or geographic boundaries or time.
  • 4. Computer Security Attributes  Understanding the security attributes is critical in order to conduct risk analysis and find the suitable control for each attribute.  There are four main computer security attributes :  Confidentiality : Unauthorized persons should not gain access to others data.  Integrity : involves accuracy of data.
  • 5. Computer Security Attributes…  Privacy : the ability and/or right to protect your personal secrets.  Availability : computer assets should be available for and accessible to authorized persons when they need them and should not be interrupted .
  • 6. Numbers of Users of the Internet % WORLD DATE NUMBER OF USERS POPULATION June, 2010 1,966 millions 28.7 % Sept, 2010 1,971 millions 28.8 % Mar, 2011 2,095 millions 30.2 % Jun, 2011 2,110 millions 30.4 % Sept, 2011 2,180 millions 31.5 % Dec, 2011 2,267 millions 32.7 % Mar, 2012 2,336 millions 33.3 % June, 2012 2,405 millions 34.3 %
  • 7. Vulnerable applications targeted by malicious users
  • 10. 1-Viruses  Viruses are self-replicating programs that infect and propagate through files.  Viruses often have additional properties, beyond being an infector or macro virus, A virus may also be multi-partite, stealth, encrypted or polymorphic.  A virus using encryption will know how to decrypt itself to run, As the bulk of the virus is encrypted, it is harder to detect and analyze.
  • 11. 2-System and Boot Record Infectors  System and Boot record infectors were the most common type of virus until the mid 1990s.  These types of viruses infect system areas of a computer such as the Master Boot Record (MBR) on hard disks.  By installing itself into boot records, the virus can run itself every time the computer is booted up.  with the introduction of more modern operating systems, and virus checks being enabled in the Basic Input Output System (BIOS), The risk of these viruses disappear.
  • 12. 3-Eavesdropping  Eavesdropping involves interception or gaining access to communications by unauthorized party. There are two types of Eavesdropping  Passive : when an unauthorized person listens secretly to the networked messages.  Active : intruder not only listens to but also injects something into the communication to distort or create bogus .
  • 13. 4-Hacking  Hackers can be people who are career criminal. They are competent and highly skilled at using computers.  Once they analyze and discover a leak point in the target system, they will find ways to access and attack the system.  They can also break through Web servers to access or steal information.
  • 14. 5- Worms  A worm is a self-replicating program that propagates over a network in some way.  Unlike viruses, worms do not require an infected file to propagate.  Worms classified into two types :  mass-mailing worms : Email worms.  network-aware worms : SQL Slammer.
  • 15. 6- Trojans  Name story  Today’s Trojans work in a very similar way. They will appear to be benign programs to the user, but will actually have some malicious purpose.
  • 16. 7-IP Spoofing Attacks  The basic protocol for sending data over the Internet network and many other computer networks is the Internet Protocol  The header of each IP packet contains, among other things, the numerical source and destination address of the packet.  By forging the header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine. The machine that receives spoofed packets will send a response back to the forged source address.
  • 17. 8-Denial of Service  Is an attempt to make a machine or network resource unavailable to its intended users.  It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
  • 18. 9-Email Bombing and Spamming  Email bombing is the intentional sending of large volumes of messages to a target address.  The overloading of the target email address can render it unusable and can even cause the mail server to crash.  Email Spamming : is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
  • 19. 10-Phishing  phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details .  Phishing emails may contain links to websites that are infected with malware.  Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
  • 20. Technology for Internet Security  With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world.  Internet security tools typically provide authentication, encryption, identify attacks, and block and filter packets
  • 21. 1-Cryptographic systems Cryptography originally denotes the art of keeping information secret by the use of codes and ciphers.
  • 22. 2- Firewall  A firewall can either be software-based or hardware- based and is used to help keep a network secure.  Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set.
  • 23. 3- Intrusion Detection Systems  An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.  Everything from a simple port scan to a full attack against your Web server can be detected by the IDS system.
  • 24. 4- Anti-Malware Software and scanners  Viruses, worms and Trojan horses are all examples of malicious software, or Malware for short.  anti-Malware tools are used to detect them and cure an infected system.  The most common type of anti-Malware software is virus scanners. These tools often consist of two different but related parts • Scanner • Disinfector.
  • 25. 5-Internet Protocol Security (IPSec)  Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol communications by authenticating and encrypting each IP packet of a communication session.  IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite. It can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host).
  • 26. Secure Socket Layer (SSL)  The Secure Socket Layer (SSL) is a suite of protocols that actually uses many different standards of key exchange, authentication and encryption.  The server typically provides regular web service http on port 80, and SSL-encrypted web traffic https over port 443.  SSL is a standard way to achieve a good level of security between a web browser and a website.
  • 27. Conclusion  Internet threats will continue to be a major issue in the global world as long as information is accessible and transferred across the Internet.  Security is critical and must be ensured so that Internet users can have confidence engaging in activities on the Internet.
  • 28. References  http://en.wikipedia.org/wiki/Network_security  http://www.cert.org/encyc_article/tocencyc.html#WhyVul  http://www.referenceforbusiness.com/small/Inc- Mail/Internet-Security.html  http://royal.pingdom.com/2013/01/16/internet-2012-in- numbers/

Editor's Notes

  1. 75000 victim in 10 min5, 2003.the program did not use the SQL language; it exploited a buffer overflow bug in Microsoft's flagship SQL Server and Desktop Engine database products
  2. الاغريق والجيش اليوناني
  3. The basic protocol for sending data over the Internet network and many other computer networks is the Internet Protocol ("IP"). The header of each IP packet contains, among other things, the numerical source and destination address of the packet. The source address is normally the address that the packet was sent from. By forging the header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine. The machine that receives spoofed packets will send a response back to the forged source address, which means that this technique is mainly used when the attacker does not care about the response or the attacker has some way of guessing the response.In certain cases, it might be possible for the attacker to see or redirect the response to his own machine. The most usual case is when the attacker is spoofing an address on the same LAN orWAN.