SlideShare une entreprise Scribd logo
1  sur  18
> > >
Security
• Modern computer security involves the
protection of electronic communications and
the maintenance of network security. A
successful, secure transaction must meet
four fundamental requirements: Privacy,
integrity, authentication and non repudiation.
• The privacy issue is: How do you ensure that
the information you transmit over the Internet
has not been captured or passed on to a third
party without your knowledge?
• The integrity issue is: How do you ensure
that the information you send or receive
has not been compromised or altered?
• The authentication issue is: How do the
sender and recipient of a message verify
their identities?
• The non repudiation issue is: How do you legally
prove that a message was sent or received? In
addition to these requirements, network security
addresses the issue of availability: How do we
ensure that the network and the computer systems
to which it connects will remain in operation
continuously?
• In the next several sections, we will explore
Internet security and the technologies and
protocols used to secure e-commerce transactions
and communications
• Cryptography transforms data by using a
cipher, or cryptosystem (a mathematical
algorithm for the encryption of messages).
• An algorithm is a computer science term
for “procedure.” A key (a string of digits
that acts as a password in the cipher)
makes the data incomprehensible to all
but the sender and intended recipients.
• Unencrypted data is known as plain text,
whereas encrypted data is called ciphertext.
Only the intended recipients should possess
the corresponding key to decrypt the
ciphertext into plaintext.
• Each party in a transaction has both a public
key and a private key.
• To transmit a message securely, the sender
uses the recipient’s public key to encrypt the
message. The recipient then decrypts the
message using his or her unique private key
• Digital signatures, the electronic equivalent of
written signatures, are used in publickey
cryptography to solve authentication and
integrity problems
• A digital signature authenticates the sender’s
identity, and, like a written signature, it is
difficult to forge. To create a digital signature,
a sender first runs a plaintext message
through a hash function, which is a
mathematical calculation that gives the
message a hash value.
• The Secure Sockets Layer (SSL) protocol,
developed by Netscape Communications, is a
non-proprietary protocol commonly used to secure
communications between two computers on the
Internet and the Web.
• SSL is built into many Web browsers, including
Netscape Communicator and Microsoft Internet
Explorer, as well as numerous other software
• products. Although SSL is not designed
specifically to secure online transactions, most e-
businesses use the technology for this purpose.
• Wireless Transport Layer Security (WTLS) is
the security protocol for the Wireless
Application
• Protocol (WAP). WAP is a standard used for
wireless communications on mobile phones
and other wireless devices. WTLS secures
connections between wireless devices and
application servers. It provides wireless
technology with data integrity, privacy,
authentication and denial-of-service security.
• Organizations are taking advantage of the
existing Internet infrastructure to create
Virtual Private Networks (VPNs), which link
multiple networks, wireless users, customers
and other remote users.
• A VPN is created by establishing a “secure
tunnel” between multiple networks.
• Internet Protocol Security (IPSec) is one of
the technologies used to secure the “tunnel”
through which the data passes
> > >
Security Attacks
• Recent cyberattacks on e-businesses have
made the front-pages of newspapers
worldwide.
• Denial-of-service attacks (DoS), viruses and
worms have cost companies billions of
dollars.
• Typically, a denial-of-service attack occurs
when a network or server is flooded with data
packets.
• The influx of data greatly increases the traffic
on the network, overwhelming the servers
and making it impossible for legitimate users
to download information
• A distributed denial-of-service attack
occurs when an unauthorized user gains
illegitimate control of a network of
computers (usually by installing viruses on
the computers) and then uses all the
computers simultaneously to attack. These
attacks cause networked computers to
crash or disconnect from the network,
making services unavailable for legitimate
users.
• Viruses are computer programs—often
sent as e-mail attachments or disguised as
audio clips, video clips and games—that
attach to, or overwrite other programs in
efforts to replicate themselves. Viruses
can corrupt files or even wipe out a hard
drive. The spread of a virus occurs
through sharing “infected” files embedded
in e-mail attachments, documents or
programs.
• worms are similar to viruses, a worm can spread
and infect files on its own over a network; worms
do not need to be attached to another program to
spread.
• One of the most famous viruses to date is the
ILOVEYOU virus which hit in May 2000, costing
organizations and individuals billions of dollars.
Viruses and worms are not limited to computers.
• In June 2000, a worm named Timofonica that was
propagated through e-mail quickly made its way
into the cell-phone network in Spain, sending
prank calls and leaving text messages on
subscribers’ phones
• Who is responsible for viruses and denial-of-service
attacks? Most often the responsible parties are
referred to as hackers or crackers. Hackers and
crackers are usually skilled programmers.
• According to some, hackers break into systems just for
the thrill of it, without causing harm to the
compromised systems, whereas crackers have
malicious intent. However, regardless of an attack’s
consequences, hackers and crackers break the law by
accessing or damaging private information and
computers.
• Many vendors offer antivirus utilities that help protect
computers against viruses and other threats
• The goal of network security is to allow
authorized users access to information
and services while preventing
unauthorized users from gaining access
to, and possibly corrupting, the network.
• A basic tool used in network security is the
firewall, which protects a local area
network (LAN) from intruders outside the
network.
END

Contenu connexe

Tendances

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
Anand Kater
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
Ahmed Sleem
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Kiran Patil
 

Tendances (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Hacking
HackingHacking
Hacking
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Network security
Network securityNetwork security
Network security
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
E secuity
E secuityE secuity
E secuity
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 

En vedette (13)

Normal distribution and hypothesis testing
Normal distribution and hypothesis testingNormal distribution and hypothesis testing
Normal distribution and hypothesis testing
 
Obras analisadas: EVT
Obras analisadas: EVTObras analisadas: EVT
Obras analisadas: EVT
 
8 天使之笔 – part 3
8 天使之笔 – part 38 天使之笔 – part 3
8 天使之笔 – part 3
 
D6.1 -ship-structure_-_final
D6.1  -ship-structure_-_finalD6.1  -ship-structure_-_final
D6.1 -ship-structure_-_final
 
prezentare engleza 2
prezentare engleza 2prezentare engleza 2
prezentare engleza 2
 
Sarah and frances vocab
Sarah and frances vocabSarah and frances vocab
Sarah and frances vocab
 
解构主义设计
解构主义设计解构主义设计
解构主义设计
 
Challenges in global warming
Challenges in global warmingChallenges in global warming
Challenges in global warming
 
N.Saravanan
N.SaravananN.Saravanan
N.Saravanan
 
Piccola storia di provincia
Piccola storia di provinciaPiccola storia di provincia
Piccola storia di provincia
 
Abraham maslow
Abraham maslowAbraham maslow
Abraham maslow
 
Social Branding - Gerd Leonhard (Media Futures Group) at #CSMM
Social Branding - Gerd Leonhard (Media Futures Group) at #CSMMSocial Branding - Gerd Leonhard (Media Futures Group) at #CSMM
Social Branding - Gerd Leonhard (Media Futures Group) at #CSMM
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similaire à 6 security

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11
Amit Fogla
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 

Similaire à 6 security (20)

презентация1
презентация1презентация1
презентация1
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
ITFT - Web security
ITFT - Web securityITFT - Web security
ITFT - Web security
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Computer security
Computer securityComputer security
Computer security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 

Dernier

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 

Dernier (20)

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 

6 security

  • 2. • Modern computer security involves the protection of electronic communications and the maintenance of network security. A successful, secure transaction must meet four fundamental requirements: Privacy, integrity, authentication and non repudiation. • The privacy issue is: How do you ensure that the information you transmit over the Internet has not been captured or passed on to a third party without your knowledge?
  • 3. • The integrity issue is: How do you ensure that the information you send or receive has not been compromised or altered? • The authentication issue is: How do the sender and recipient of a message verify their identities?
  • 4. • The non repudiation issue is: How do you legally prove that a message was sent or received? In addition to these requirements, network security addresses the issue of availability: How do we ensure that the network and the computer systems to which it connects will remain in operation continuously? • In the next several sections, we will explore Internet security and the technologies and protocols used to secure e-commerce transactions and communications
  • 5. • Cryptography transforms data by using a cipher, or cryptosystem (a mathematical algorithm for the encryption of messages). • An algorithm is a computer science term for “procedure.” A key (a string of digits that acts as a password in the cipher) makes the data incomprehensible to all but the sender and intended recipients.
  • 6. • Unencrypted data is known as plain text, whereas encrypted data is called ciphertext. Only the intended recipients should possess the corresponding key to decrypt the ciphertext into plaintext. • Each party in a transaction has both a public key and a private key. • To transmit a message securely, the sender uses the recipient’s public key to encrypt the message. The recipient then decrypts the message using his or her unique private key
  • 7. • Digital signatures, the electronic equivalent of written signatures, are used in publickey cryptography to solve authentication and integrity problems • A digital signature authenticates the sender’s identity, and, like a written signature, it is difficult to forge. To create a digital signature, a sender first runs a plaintext message through a hash function, which is a mathematical calculation that gives the message a hash value.
  • 8. • The Secure Sockets Layer (SSL) protocol, developed by Netscape Communications, is a non-proprietary protocol commonly used to secure communications between two computers on the Internet and the Web. • SSL is built into many Web browsers, including Netscape Communicator and Microsoft Internet Explorer, as well as numerous other software • products. Although SSL is not designed specifically to secure online transactions, most e- businesses use the technology for this purpose.
  • 9. • Wireless Transport Layer Security (WTLS) is the security protocol for the Wireless Application • Protocol (WAP). WAP is a standard used for wireless communications on mobile phones and other wireless devices. WTLS secures connections between wireless devices and application servers. It provides wireless technology with data integrity, privacy, authentication and denial-of-service security.
  • 10. • Organizations are taking advantage of the existing Internet infrastructure to create Virtual Private Networks (VPNs), which link multiple networks, wireless users, customers and other remote users. • A VPN is created by establishing a “secure tunnel” between multiple networks. • Internet Protocol Security (IPSec) is one of the technologies used to secure the “tunnel” through which the data passes
  • 11. > > > Security Attacks
  • 12. • Recent cyberattacks on e-businesses have made the front-pages of newspapers worldwide. • Denial-of-service attacks (DoS), viruses and worms have cost companies billions of dollars. • Typically, a denial-of-service attack occurs when a network or server is flooded with data packets. • The influx of data greatly increases the traffic on the network, overwhelming the servers and making it impossible for legitimate users to download information
  • 13. • A distributed denial-of-service attack occurs when an unauthorized user gains illegitimate control of a network of computers (usually by installing viruses on the computers) and then uses all the computers simultaneously to attack. These attacks cause networked computers to crash or disconnect from the network, making services unavailable for legitimate users.
  • 14. • Viruses are computer programs—often sent as e-mail attachments or disguised as audio clips, video clips and games—that attach to, or overwrite other programs in efforts to replicate themselves. Viruses can corrupt files or even wipe out a hard drive. The spread of a virus occurs through sharing “infected” files embedded in e-mail attachments, documents or programs.
  • 15. • worms are similar to viruses, a worm can spread and infect files on its own over a network; worms do not need to be attached to another program to spread. • One of the most famous viruses to date is the ILOVEYOU virus which hit in May 2000, costing organizations and individuals billions of dollars. Viruses and worms are not limited to computers. • In June 2000, a worm named Timofonica that was propagated through e-mail quickly made its way into the cell-phone network in Spain, sending prank calls and leaving text messages on subscribers’ phones
  • 16. • Who is responsible for viruses and denial-of-service attacks? Most often the responsible parties are referred to as hackers or crackers. Hackers and crackers are usually skilled programmers. • According to some, hackers break into systems just for the thrill of it, without causing harm to the compromised systems, whereas crackers have malicious intent. However, regardless of an attack’s consequences, hackers and crackers break the law by accessing or damaging private information and computers. • Many vendors offer antivirus utilities that help protect computers against viruses and other threats
  • 17. • The goal of network security is to allow authorized users access to information and services while preventing unauthorized users from gaining access to, and possibly corrupting, the network. • A basic tool used in network security is the firewall, which protects a local area network (LAN) from intruders outside the network.
  • 18. END