Академический Документы
Профессиональный Документы
Культура Документы
Presented By
R.Vijayashanthi V.Kalavani Kumararaja G.Deepika
PRESENTATION OBJECTIVES
Understand information security services
Be aware of vulnerabilities and threats
More information is being created, stored, processed and communicated using computers and networks Computers are increasingly interconnected, creating new pathways to information assets The threats to information are becoming more widespread and more sophisticated
Integrity
Detecting that the data is not tampered with
Authentication
Establishing proof of identity
Nonrepudiation
Ability to prove that the sender actually sent the data
Access Control
Access to information resources are regulated
Availability
Computer assets are available to authorized parties when needed
The Need for Network Security 5
2000
CIA HOMEPAGE
DOJ HOMEPAGE
USAF
The Need for Web Security
HOMEPAGE
10
11/29/96
VIRUSES
Risk Threat TROJ_SIRCAM.A W32.Navidad W95.MTX W32.HLLW.QAZ.A VBS.Stages.A VBS.LoveLetter VBS.Network Wscript.KakWorm W32.Funlove.4099 PrettyPark.Worm Happy99.Worm Discovered New !! 11/03/2000 8/17/2000 7/16/2000 6/16/2000 5/04/2000 2/18/2000 12/27/1999 11/08/1999 6/04/1999 1/28/1999
The Need for Web Security
Protection Latest DAT 11/06/2000 8/28/2000 7/18/2000 6/16/2000 5/05/2000 2/18/2000 12/27/1999 11/11/1999 6/04/1999 1/28/1999
11
Consider that
90% of companies detected computer security breaches in the last 12 months 59% cited the Internet as the most frequent origin of attack
12
34% are from Internet or an external connection to another company of some sort
HACKERS
The Need for Web Security 13
HACKER MOTIVATIONS
Money, profit Access to additional resources Experimentation and desire to learn Gang mentality Psychological needs Self-gratification Personal vengeance Emotional issues Desire to embarrass the target
The Need for Web Security 14
Internet Security?
Replay Attack
Spoofing
The Need for Web Security 15
3.
4. 5.
SECURITY COUNTERMEASURES
THREE PHASE APPROACH PROTECTION
DETECTION RESPONSE
The Need for Web Security 19
CRYPTOGRAPHY
Necessity is the mother of invention, and computer networks are the mother of modern cryptography.
Ronald L. Rivest
Firewall
A system or group of systems that enforces an access control policy between two networks.
PC Servers
Visible IP Address
Internal Network
Host
22
23
THANK YOU
I have questions
24