Internet Security Gary Akehurst
<ul><li>Security of web sites is an important consideration  </li></ul><ul><li>Important for an organisation, hosting serv...
User’s browser Individual PC firewall System Firewall Business Network server Blocks cybercriminal’s virus, worm, pornogra...
<ul><li>A firewall stops information being changed or stolen </li></ul><ul><li>It limits entry into a network to authorise...
<ul><li>We are seeing increasing development of  virtual private networks  (VPN) </li></ul><ul><li>A VPN can connect two b...
<ul><li>Consumers and businesses need to feel safe to engage in business activities online </li></ul><ul><li>Because of th...
<ul><li>Security risks: </li></ul><ul><li>Transaction or credit card details stolen in transit </li></ul><ul><li>A supplie...
<ul><li>Security systems require: </li></ul><ul><li>Authentication  (are transaction parties who they claim to be?) </li><...
<ul><li>Use of digital certificates: </li></ul><ul><ul><li>Secret key (symmetric) encryption (both parties have an identic...
<ul><li>Digital certificates may include: </li></ul><ul><li>User identification data </li></ul><ul><li>Issuing authority i...
<ul><li>Secure sockets layer protocol (SSL) </li></ul><ul><li>Supported by all browsers </li></ul><ul><li>When enter a sec...
<ul><li>Reassuring the customer </li></ul><ul><li>Use of guarantees to safeguard the customer </li></ul><ul><li>Explanatio...
Upcoming SlideShare
Loading in...5
×

Internet security Slides

2,389

Published on

1 Comment
0 Likes
Statistics
Notes
  • internet security slides
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
2,389
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
109
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Internet security Slides

  1. 1. Internet Security Gary Akehurst
  2. 2. <ul><li>Security of web sites is an important consideration </li></ul><ul><li>Important for an organisation, hosting services and individual web users </li></ul><ul><li>Firewalls are essential to prevent hackers gaining access to a server and web site </li></ul><ul><li>Access to an e-commerce site or intranet is particularly serious </li></ul>
  3. 3. User’s browser Individual PC firewall System Firewall Business Network server Blocks cybercriminal’s virus, worm, pornography, spam etc Cybercriminal sends virus, worm, pornography, spam etc Blocks cybercriminal’s virus, worm, pornography, spam etc Internet backbone
  4. 4. <ul><li>A firewall stops information being changed or stolen </li></ul><ul><li>It limits entry into a network to authorised users and content </li></ul><ul><li>Entry can then be controlled by registration and password </li></ul><ul><li>But employees represent the biggest single threat to networks </li></ul><ul><li>Employees have access to security procedures and know where important data is stored </li></ul>
  5. 5. <ul><li>We are seeing increasing development of virtual private networks (VPN) </li></ul><ul><li>A VPN can connect two businesses such as a division and HQ </li></ul><ul><li>A VPN can use a dedicated line connected to an internet service provider (ISP) </li></ul><ul><li>The ISPs then use the internet for long-distance communication encrypting all data packets </li></ul>
  6. 6. <ul><li>Consumers and businesses need to feel safe to engage in business activities online </li></ul><ul><li>Because of the low cost of entry, ease of web transactions and ability to do business across national borders the internet is a prime target for cybercrime </li></ul><ul><li>Cybercrime: direct attacks on internet infrastructure (hacking and viruses) </li></ul><ul><li>Distributed denial of service attacks have affected Amazon.com, CNN.com, eBay and others </li></ul>
  7. 7. <ul><li>Security risks: </li></ul><ul><li>Transaction or credit card details stolen in transit </li></ul><ul><li>A supplier or merchant is not who they claim to be </li></ul><ul><li>Customer credit card or bank account details stolen from a supplier’s server </li></ul><ul><li>Phishing attacks </li></ul>
  8. 8. <ul><li>Security systems require: </li></ul><ul><li>Authentication (are transaction parties who they claim to be?) </li></ul><ul><li>Privacy and confidentiality (transactions data protected?, traces of transactions removed from public systems?) </li></ul><ul><li>Integrity (message checked for completeness and not corrupted) </li></ul><ul><li>Non-repudiability (sender cannot deny sending a message) </li></ul><ul><li>Availability (eliminating threats to system performance and continuity) </li></ul>
  9. 9. <ul><li>Use of digital certificates: </li></ul><ul><ul><li>Secret key (symmetric) encryption (both parties have an identical key known only to them, but not a safe method) </li></ul></ul><ul><ul><li>Public key (asymmetric) encryption (keys used by sender and receiver are different but related by a numerical code </li></ul></ul><ul><li>Digital signatures used to create commercial systems using public key encryption often using trusted third parties to send owner identification and copy of public key </li></ul>
  10. 10. <ul><li>Digital certificates may include: </li></ul><ul><li>User identification data </li></ul><ul><li>Issuing authority identification and digital signature </li></ul><ul><li>User’s public key </li></ul><ul><li>Expiry date of certificate </li></ul><ul><li>Class of certificate </li></ul><ul><li>Digital identification code for the certificate </li></ul>
  11. 11. <ul><li>Secure sockets layer protocol (SSL) </li></ul><ul><li>Supported by all browsers </li></ul><ul><li>When enter a secure checkout area there is a security prompt, the web address changes from http:// to https:// and a yellow padlock appears in the bottom window </li></ul><ul><li>SSL enables a private link between customer and merchant which is encrypted </li></ul>
  12. 12. <ul><li>Reassuring the customer </li></ul><ul><li>Use of guarantees to safeguard the customer </li></ul><ul><li>Explanation of SSL security measures </li></ul><ul><li>Rarity of frauds </li></ul><ul><li>Use of phone or fax as alternative ordering mechanisms </li></ul><ul><li>Prominence of information to reassure customers </li></ul><ul><li>Use of trusted third parties such as Verisign, PayPal, Comodo Verification Engine and RUSTe </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×