Security Technologies
why the Internet is Insecure? ► Internet
is Insecure because of you ► Early days – academics and researchers used (non-profit users) ► Digital age- no restriction ► By the end of 2005 it is estimated identity fraud will cause up to 5 trillion dollars world wide. We, the users of the internet must keep ourselves safe, secure and pay attention to those security warnings
Contd.. ► Get
rid of the internet explorer( opera) ► Protect your Connection (Firewalls) ► Don't share those files your IP address (Eg. Primedius ) ► Check those certificates (https secure email) ► Kill the spy ware (zone alarm) ► Hide
Risks ► Long
Distance Telephone Calling card accounts along with PINs ► In early 1995, 20,000 credit card numbers and information stolen ► Intruders always take disadvantages of Internet
It’s the Protocols ► 7-layered
protocol ► Level one – physical connection, higher levelactual application ► Link Layer-handles the connection b/w systems communicating across a LAN or other link ► Internet Layer- handles connection b/w systems communicating across the internetwork ► Transport Layer-handles connection b/w the processes running on communicating systems
Physical & Link Layer ► Internet
Function involves connection across the LAN ► Actual signals that pass along the wire (or Wireless) link ► Link or N/W layer may be an Ethernet cable LAN installed in office or a telephone link b/w a home PC and ISP
Internet Layer ► Connection
b/w computers were handled using Internet Protocol (gives the guarantee of delivery to the higher levels) ► IP addresses identify a particular computer in the n/w uniquely ► Direct connection (LAN) else via router
Transport Layer ► Handling
the connection b/w the actual programs running on the source and destination systems ► Two different protocols :UDP (User Datagram Protocol) and TCP (Transport Control Protocol) ► TCP – support direct interaction and ensure that the information sent is received (Eg. ftp, telnet) ► UDP- don’t support direct interation
Application Layer ► Higher
level ► Security and reliability both can be built ► Collects information from the end user or the network resource, wraps it (encapsulation), addresses it to the destination resource and passes to the transport layer
Total Working of Layers ► Application
Layer- get the info from user or from network device and encapsulate it to destination resource ► Transport Layer- wraps the data up and addresses it to the target program on the destination system ► Internet Layer- wraps the data up to the particular system in a particular network ► Network Layer- Same network (direct passing of data), if not, to the appropriate router until reached to destination
At Last… ► N/W
layer S/W - moves chunks of data to its destination on the same ► Internet layer S/W- moves chunks of data b/w 2-specific computers connected to the Internet ► Transport layer S/W – moves chunks of data b/w two programs ► Application layer S/W – moves data chunks b/w a user and a resource
Where the Risks are? ► Interception
by the third party
► Forgery ► Modifications
Internet Security holes
A Bigger Risk ► Password
strength ► Revealing of password ► Changes are always constant
Fighting Back
►
What it all means?
Remember... it is up to you!