SlideShare a Scribd company logo
1 of 22
MODULE 2  -  NETWORK SECURITY E - COMMERCE ,[object Object],[object Object],PRESENTED BY  -  SREERAG GOPINATH P.C SEMESTER VIII COMPUTER SCIENCE & ENGG. SJCET, PALAI
SECURITY THREATS A  Security threat  is a circumstance, condition, or event with the potential to cause  economic hardship to data or network resources  in the form of -  destruction,  -  disclosure,  -  modification of data, -  denial of service, and / or  -  fraud, waste or abuse. Confidence, reliability and protection  of information against security threats is a crucial prerequisite for the functioning of e-commerce.
SECURITY CONCERNS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CLIENT SERVER NETWORK SECURITY Client  server  Network security ,[object Object],[object Object],[object Object],[object Object],B A L A N C I N G   & SYSTEM ADMINISTRATORS HAVE A HARD TIME
WHY PAY ATTENTION TO SECURITY? INTERNET 10000 networks-  Unlimited number of hackers? CORPORATE LAN OR WAN SUBNET CORPORATE NETWORK
CLIENT SERVER SECURITY PROBLEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REDUCING CLIENT SECURITY THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROTECTION METHODS ,[object Object],[object Object],[object Object],[object Object]
TRUST BASED SECURITY ,[object Object],[object Object],[object Object],[object Object]
SECURITY THROUGH OBSCURITY (STO) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PASSWORD SCHEMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BIOMETRIC SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EMERGING CLIENT - SERVER SECURITY THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOFTWARE AGENTS & MALICIOUS CODE THREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MALICIOUS CODE ,[object Object],[object Object],[object Object],[object Object]
MALICIOUS CODE - EXAMPLES
THREATS TO SERVERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DENIAL OF SERVICE ATTACKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SERVICE OVERLOADING ,[object Object],[object Object],[object Object],[object Object],[object Object]
MESSAGE FLOODING ,[object Object],[object Object],[object Object],[object Object]
COUNTERING SERVER THREATS - FIREWALLS INTERNET CORPORATE LAN OR WAN CORPORATE NETWORK STOP
THANK YOU !!!

More Related Content

What's hot

Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayKevin Lim
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Data Security
Data SecurityData Security
Data Securitybackdoor
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeNithilan1
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and AbuseAlbrecht Jones
 
Website security
Website securityWebsite security
Website securityRIPPER95
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacksijdmtaiir
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWAREWhiteHats
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 

What's hot (20)

Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Network security
Network securityNetwork security
Network security
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Security communication
Security communicationSecurity communication
Security communication
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Data Security
Data SecurityData Security
Data Security
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
Attack types
Attack typesAttack types
Attack types
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
Website security
Website securityWebsite security
Website security
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
 
Firewall
FirewallFirewall
Firewall
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 

Viewers also liked

Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Alfredo Caicedo
 
INFORMATICA ETIQUETAS
INFORMATICA ETIQUETASINFORMATICA ETIQUETAS
INFORMATICA ETIQUETASdiosadelsol
 
Serbia Training
Serbia TrainingSerbia Training
Serbia Trainingemmotive
 
Tech Class Slideshow
Tech Class SlideshowTech Class Slideshow
Tech Class Slideshowninagusta
 
EPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdEPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdSafarah Asmadi
 
A Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers TogetherA Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers Togetherashkamodi
 
International Student Presentation By Tamerlan
International Student Presentation By TamerlanInternational Student Presentation By Tamerlan
International Student Presentation By TamerlanTamerlan Rajabov
 
Saye 3 June 2009 For Linklaters
Saye 3 June 2009 For LinklatersSaye 3 June 2009 For Linklaters
Saye 3 June 2009 For Linklatersgstopp
 
வாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேவாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேguestcf7c6c5
 
Petunjuk Singkat Ta Pa
Petunjuk Singkat Ta PaPetunjuk Singkat Ta Pa
Petunjuk Singkat Ta Paagus franky
 
Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5briancarnell
 
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Université de Sherbrooke
 

Viewers also liked (20)

Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009Influencia Del Proyecto Ura 2009
Influencia Del Proyecto Ura 2009
 
INFORMATICA ETIQUETAS
INFORMATICA ETIQUETASINFORMATICA ETIQUETAS
INFORMATICA ETIQUETAS
 
Serbia Training
Serbia TrainingSerbia Training
Serbia Training
 
Tech Class Slideshow
Tech Class SlideshowTech Class Slideshow
Tech Class Slideshow
 
EPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherdEPM Assignment 2-the way of the shepherd
EPM Assignment 2-the way of the shepherd
 
A Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers TogetherA Rare Picture Of 20 Tigers Together
A Rare Picture Of 20 Tigers Together
 
International Student Presentation By Tamerlan
International Student Presentation By TamerlanInternational Student Presentation By Tamerlan
International Student Presentation By Tamerlan
 
Saye 3 June 2009 For Linklaters
Saye 3 June 2009 For LinklatersSaye 3 June 2009 For Linklaters
Saye 3 June 2009 For Linklaters
 
The Myst Story
The Myst StoryThe Myst Story
The Myst Story
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Welcome To Math III
Welcome To Math IIIWelcome To Math III
Welcome To Math III
 
வாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கேவாழ்க்கை வாழ்வதற்க்கே
வாழ்க்கை வாழ்வதற்க்கே
 
Petunjuk Singkat Ta Pa
Petunjuk Singkat Ta PaPetunjuk Singkat Ta Pa
Petunjuk Singkat Ta Pa
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5Teresa Modeling Flash Demo 5
Teresa Modeling Flash Demo 5
 
Kilit SüResi
Kilit SüResiKilit SüResi
Kilit SüResi
 
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...Effects of an Online Teacher Training Course Entailing Examples of Practice o...
Effects of an Online Teacher Training Course Entailing Examples of Practice o...
 
Reflexology
ReflexologyReflexology
Reflexology
 
Bureaupresentatie
BureaupresentatieBureaupresentatie
Bureaupresentatie
 
Tuahiwi.Ppt4
Tuahiwi.Ppt4Tuahiwi.Ppt4
Tuahiwi.Ppt4
 

Similar to Sreerag cs network security

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptxRRamyaDevi
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxDebmalyaSingha
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxhealdkathaleen
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 

Similar to Sreerag cs network security (20)

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
Computing safety
Computing safetyComputing safety
Computing safety
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from Sreerag Gopinath

Sreerag web services - universal data access
Sreerag web services - universal data accessSreerag web services - universal data access
Sreerag web services - universal data accessSreerag Gopinath
 
Sreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag Gopinath
 
Sreerag what is a web service
Sreerag   what is a web serviceSreerag   what is a web service
Sreerag what is a web serviceSreerag Gopinath
 
Sreerag parallel programming
Sreerag   parallel programmingSreerag   parallel programming
Sreerag parallel programmingSreerag Gopinath
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architectureSreerag Gopinath
 

More from Sreerag Gopinath (6)

Sreerag web services - universal data access
Sreerag web services - universal data accessSreerag web services - universal data access
Sreerag web services - universal data access
 
Sreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networksSreerag functional structures of multiprocessors and interconnection networks
Sreerag functional structures of multiprocessors and interconnection networks
 
Sreerag what is a web service
Sreerag   what is a web serviceSreerag   what is a web service
Sreerag what is a web service
 
Sreerag parallel programming
Sreerag   parallel programmingSreerag   parallel programming
Sreerag parallel programming
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architecture
 
Sreerag dot net vs j2ee
Sreerag   dot net vs j2eeSreerag   dot net vs j2ee
Sreerag dot net vs j2ee
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Sreerag cs network security

  • 1.
  • 2. SECURITY THREATS A Security threat is a circumstance, condition, or event with the potential to cause economic hardship to data or network resources in the form of - destruction, - disclosure, - modification of data, - denial of service, and / or - fraud, waste or abuse. Confidence, reliability and protection of information against security threats is a crucial prerequisite for the functioning of e-commerce.
  • 3.
  • 4.
  • 5. WHY PAY ATTENTION TO SECURITY? INTERNET 10000 networks- Unlimited number of hackers? CORPORATE LAN OR WAN SUBNET CORPORATE NETWORK
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. MALICIOUS CODE - EXAMPLES
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. COUNTERING SERVER THREATS - FIREWALLS INTERNET CORPORATE LAN OR WAN CORPORATE NETWORK STOP