1 / 10

Presented By

Presented By. Jaydeepsinh R. Solanki MCA-IV Email:meet_dear_jaydeep@yahoo.com. Jatin M.Shah MCA-IV Email:jatin_shah4u@yahoo.com Mobile: ( 9825789300 ). C.U.Shah College of Engg. & Tech. Nr. Kothariya village, Wadhwan city, Surendranagar. -: Introduction :-.

eithne
Download Presentation

Presented By

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presented By Jaydeepsinh R. Solanki MCA-IV Email:meet_dear_jaydeep@yahoo.com Jatin M.Shah MCA-IV Email:jatin_shah4u@yahoo.com Mobile: ( 9825789300 ) C.U.Shah College of Engg. & Tech. Nr. Kothariya village, Wadhwan city, Surendranagar.

  2. -: Introduction:- "Everything should be made as simple as possible, but not simpler"(Albert Einstein) For the most tragic reasons imaginable, security issues now sit atop the corporate agenda. Electronic security is already a major problem for business according to the 2001 annual Computer Security Institute study, conducted by the U.S. FBI, computer viruses plagued 94% of more than 500 US companies surveyed, up from 85% in 2000, and more than 60% of the companies surveyed reported a financial loss due to a security breach, at an average cost of $2m. The recent wave of redundancies has left employees concerned over their own job security and ex-employees with a motive for malicious damage, theft and fraud.

  3. What is e-security Electronic security is much, much more than just Internet security. E-security encompasses the protection of any electronic data, whether or not it travels on the Web. Authentication tools such as PKI, or public key infrastructure, validate or authenticate the identity of participants in an electronic conversation or transaction. Firewalls authorize only certain visitors to access the computer Today, computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce. “E-security is just to keep out malicious attacks.”

  4. AsymmetricEncryption Certification Authority (CA). Decryption Digital signature Digital Certificate. Encryption Firewall.

  5. Internet access from company’s computer Company Computers Internet Access between DMZ and company’s computers. DMZ access from internet firewall DMZ

  6. -: Steps for creating e-security :- Approach security as a system. Establish policy. Implement a "layered" security model. Use secure message digest. Use advanced encryption. Manage encryption keys. Destroy data when no longer needed. Look for new developments. Monitor compliance.

  7. -: Obstacles of e-security :-

  8. -: E-security very poor in India :- We respect individual brilliance, but we are poor at harnessing a team of average people to achieve overall high quality by employing systems and processes. Our culture accepts mediocrity, a trait made famous by the phrase "chalta hai", which captures this mindset. Security systems, like insurance, are a cost centre until they are needed to protect your assets. We have this attitude of "jab hoga tab dekha jaiga" towards all these issues. However, security is not just implementing a firewall. A comprehensive internet/Intranet security blanket would also include a set of processes, systems, and practices that have to be followed. It also includes security audits, risk management and analysis, a disaster recovery plan and lots more. Unfortunately in India, Indian companies have not as yet begun to allocate resources for adequate network security. It is still not priority number one.

  9. -: conclusion:- Protection is an internal problem. Security must consider both the computer system & the environment-people, building, businesses, valuable objects and threats-within which the system is used.  The data stored in the computer system must be protected from unauthorized access, malicious destruction or alternation and accidental introduction of inconsistency. Virus and worms are self-perpetuating, sometimes infecting thousands of computer. There are several methods of prevention or detection of security incidents instruction –detection system, auditing and logging of system events, monitoring of system software changes, and system-call monitoring . Cryptography

More Related