Security Technologies

  • Uploaded by: api-19509336
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Security Technologies as PDF for free.

More details

  • Words: 542
  • Pages: 16
Security Technologies

why the Internet is Insecure? ► Internet

is Insecure because of you ► Early days – academics and researchers used (non-profit users) ► Digital age- no restriction ► By the end of 2005 it is estimated identity fraud will cause up to 5 trillion dollars world wide. We, the users of the internet must keep ourselves safe, secure and pay attention to those security warnings

Contd.. ► Get

rid of the internet explorer( opera) ► Protect your Connection (Firewalls) ► Don't share those files your IP address (Eg. Primedius ) ► Check those certificates (https secure email) ► Kill the spy ware (zone alarm) ► Hide

Risks ► Long

Distance Telephone Calling card accounts along with PINs ► In early 1995, 20,000 credit card numbers and information stolen ► Intruders always take disadvantages of Internet

It’s the Protocols ► 7-layered

protocol ► Level one – physical connection, higher levelactual application ► Link Layer-handles the connection b/w systems communicating across a LAN or other link ► Internet Layer- handles connection b/w systems communicating across the internetwork ► Transport Layer-handles connection b/w the processes running on communicating systems

Physical & Link Layer ► Internet

Function involves connection across the LAN ► Actual signals that pass along the wire (or Wireless) link ► Link or N/W layer may be an Ethernet cable LAN installed in office or a telephone link b/w a home PC and ISP

Internet Layer ► Connection

b/w computers were handled using Internet Protocol (gives the guarantee of delivery to the higher levels) ► IP addresses identify a particular computer in the n/w uniquely ► Direct connection (LAN) else via router

Transport Layer ► Handling

the connection b/w the actual programs running on the source and destination systems ► Two different protocols :UDP (User Datagram Protocol) and TCP (Transport Control Protocol) ► TCP – support direct interaction and ensure that the information sent is received (Eg. ftp, telnet) ► UDP- don’t support direct interation

Application Layer ► Higher

level ► Security and reliability both can be built ► Collects information from the end user or the network resource, wraps it (encapsulation), addresses it to the destination resource and passes to the transport layer

Total Working of Layers ► Application

Layer- get the info from user or from network device and encapsulate it to destination resource ► Transport Layer- wraps the data up and addresses it to the target program on the destination system ► Internet Layer- wraps the data up to the particular system in a particular network ► Network Layer- Same network (direct passing of data), if not, to the appropriate router until reached to destination

At Last… ► N/W

layer S/W - moves chunks of data to its destination on the same ► Internet layer S/W- moves chunks of data b/w 2-specific computers connected to the Internet ► Transport layer S/W – moves chunks of data b/w two programs ► Application layer S/W – moves data chunks b/w a user and a resource

Where the Risks are? ► Interception

by the third party

► Forgery ► Modifications

Internet Security holes

A Bigger Risk ► Password

strength ► Revealing of password ► Changes are always constant

Fighting Back



What it all means?

Remember... it is up to you!

Related Documents

Security Technologies
June 2020 6
Technologies
June 2020 16
Security
November 2019 45
Security
May 2020 24