1 / 21

Network Security & Web Services

Learn about network security and web services, including common network threats like intrusion and denial-of-service attacks. Discover how to protect yourself with active protection and preventive measures.

bakerthomas
Download Presentation

Network Security & Web Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security & Web Services Mr. Anil Kumar PGT (CS) KV No.1 Madurai

  2. Background • What is a Network? • “A computer network consists of two or more connected autonomous computers.”

  3. Introduction • What is Network Security? • “Network Security is a process of providing security at the boundaries of an organizational network by keeping out unauthorized access.”

  4. Introduction • Some common Network threats are- • Intrusion / Access Attack • Denial of Service (DoS) attack • Malicious Program (Virus, Worm, Trojon Horses)

  5. Intrusion Problem • In this type of threat, an un authorized user attempts to gain access to sensitive information. 1. Snooping • It refers to unauthorized access of someone else data. It may comprises Monitoring of Keystrokes pressed, Capturing of passwords and login information and interception of emails and other private information.

  6. Intrusion Problem 2. Eavesdropping • It refers to unauthorized access of someone else data while the data is on its way on the network. • It the act of secretly listening/ interpreting someone else’s private communication or information.

  7. Intrusion Problem 3. Spamming • Spamming refers to the sending of bulk-mail by an identified or unidentified sources. 4. Phising • Phishing is a process of attempting to acquire sensitive information such as User name and password, credit card number, bank account details etc. using a trap-mail in which user discloses their private information.

  8. Denial of Service (DoS) Attack • DoS attack are those attacks that prevent the legitimate users from accessing or using the resources and information. • Different types of DoS attack are- • Denial of Access to Information • Denial of Access to Applications • Denial of Access to Systems • Denial of Access to Communication

  9. Malicious Program • Virus: • Virus attaches itself to a program or  executable file enabling it to spread from one computer to another, leaving infections as it travels. • it actually cannot infect your computer unless you run or open the malicious program. • Worm: • It is self replicating program which eats entire disk space or memory. It copies itself until all the disk space or memory is filled. • Trojan Horse: • It is a program that appears harmless (like utility program) but actually performs malicious functions such as deleting/ damaging files.

  10. Malicious Program • Spyware: • Spyware is a program designed to spy on your activities and report this data to people willing to pay it either legal or illegal purposes. • It is get installed in your system without your consent as a file or gets downloaded from Websites on Internet. • Adware: • Adware are the programs that deliver unwanted ads to your computer (in Pop-up form). They consume network bandwidth. It is similar to Spyware, but it may installed with your consent.

  11. How to protect yourself .. • “It refers to all activity undertaken to protect computer and data on the network from attack” • Steps to secure a network.. • Active Protection: • Installation of Programs and Firewall for protection against Viruses, Spyware and PC Intrusion. • Preventive Measures: • You should opt some preventive measures to avoid such happenings.

  12. Active Protection • Login-Password • User Authorization is done by a valid Login Id • User is Authenticated by a valid password • Firewall • It is a System (H/w or S/w) which acts like a gatekeeper to protect computer network from un authorized access as per rules defined by network administrator. It examine each requests and block those that do not meet the security criteria .

  13. Active Protection • Antivirus Software • These are the program which prevent the system from various malicious programs like Virus, Worms, Spywares and Trojan horses etc. • File Access Permission • File and folders stored on the computer may have limited access permission like read, modify, create and execute permission as per need of the end user in the network.

  14. Preventive Measures • Install a reliable Antivirus and Anti-Spyware program. • Keep your Anti-virus program update. • Think twice before downloading anything from Internet. (Down load from trusted sites) • Be careful while opening e-mails. • Use proper File access permissions when it is being shared among users. • Keep your e-mail address, passwords etc. private.

  15. Legal Authority against Cyber Crime? • CYBER LAW: • It provides legal support to the computer user against cyber crime such as theft, fraud etc.. • It refer to the legal and regulatory aspects of internet and world wide web.

  16. Important Question? • Explain the term Firewall and Cyber Law? (CBSE 2017 Delhi) • How is ‘Denial of service’ attack threat to Network Security? (CBSE 2016 Delhi) • List 2 measures to secure a network? (CBSE 2015 Delhi) • Name 2 threats to security in a network. What is the role of Firewall in Network security?(CBSE 2015 outside)

  17. Internet & its Services • Overview of Internet : • Internet is a network of networks that consists of millions ofprivate, public, academic, business, and government networks, thatare linked by various wired, wireless, and optical networkingTechnologies. • The Internet carries an extensive range of information resourcesand services, such as the inter-linked hypertext documents of theWorld Wide Web (WWW), the communicational infrastructure tosupport e-mail, chat and transfer of Text, Images, Audio, Video etc.

  18. Internet & its Services • Internet Applications : • Electronic Mail : E-Mail allows you to send text messages as wellas files as anattachment. Web-based e-mail service is offered freeof cost through various portals like Gmail, RediffMail or Hotmail etc. • Instant Messaging (Chat): It is similar to e-mail, except thatmessage is sent immediately to recipient. It facilitates user to typeand send messages to make conversation. It is also called LiveChat. • WWW: Word Wide Web (WWW) or Web is a collection of Hyper-linked pages accessed through Web Browser program usingHypertext Transfer Protocol (HTTP). A web page may containsinformation in form of text, images, audio, video orAnimation.

  19. Internet & its Services • SMS & MMS: Short Message Service or SMS is small text which canbe sent to any mobile phone. Generally, this service isused by individuals or any organization to send Bulk-Message topromote a product, advertisement or greeting messages. Someservice providers allows Multimedia Messages (MMS) which maycontains pictures or small video along with text. • Video Conferencing : It is an application which allow two or morepeople at different locations to communicate by simultaneous two-way video and audio transmissions. Videoconferencing differs fromvideophone calls in that it is designed to serve a conference ingroup of people at multiple locations rather than individuals.

  20. Internet & its Services • Voicemail : It is also known as voice message. It is acomputerbased system that allows users to exchange personal voicemessages or deliver voice information relating to individuals,organizations, products and services, using an ordinary telephone. • The term is also used more broadly to denote anysystem ofconveying a stored telecommunications voice messages, includingusing an answering machine. Most cell phone services offer voice-mail as a basic feature. • Voice Over Internet Protocol (VoIP): It is technology whichallows communication between PC and Mobile or Telephone usingInternet at very little cost. • Internet Protocol television (IPTV) allowsuser to listen music or see video films on PC using Internet.

  21. THANKS

More Related