• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Internet security

Internet security






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Internet security Internet security Presentation Transcript

    • Internet Security
      Grade 12
    • A 21st Century Society
      We live in a Society today that..
    • The problem though is two fold:
      1. A medium never designed to be safe and trustworthy.
      2. E-Communication is largely anonymous...
      The results?
      Let’s look at ways that security can be breached...
    • Security Threats
      To access, steal or tamper with data and information.
      To steal your “electronic identity” and pose as you.
      To attack your computer systems from your account or computer.
      The most common dangers are:
    • Protecting your data...
      Use protective hardware...
      Make Backups...
      Save regularly...
      Use password protection...
      Social Engineering?
      Protect your computer...
      • Update software
      • Install malware detection and removal tools
      • Use a firewall
      • Use your network operating system
      • Don’t trust e-mails with attachments or discs from foreign sources
      • Use digital signature and certificates
    • Lets revise...
      Basic Communications Concepts:
      Port – no not the physical connection
      While you’re surfing the net – you’re computer is multitasking.
      The question – how does it know which packet goes to which program?
      The answer – Every packet sent over the internet knows not only the IP address of the computer it must reach, but also the port number to tell the computer which program must handle it.
      The example – HTTP browsers generally use Port 80. Received e-mail (POP3) uses Port 110 and SMTP uses Port 25.
      In case you’re wondering – your computer has ports form 0 – 65535.
    • So what is a protocol?
      Very simply – a set of rules governing communications.
    • Firewalls?
      A firewall is either hardware or software or both that protects a network from :
      Being accessed by external users/ software that are not authorised.
      Having software running inside the network communicate with computers outside the network.
      Having software communicate using ports that are not authorised.
    • So how does it work?
      Imagine a school...
    • Encryption
      Is simply a way of scrambling data or text into a new format using a specified set of rules/ protocol.
      “When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.”
      “When cryptography is outlawed, only Akash will be gay.”
    • SSL – Secure Sockets Layer
      The problem with encryption...
      SSL – is a anencryption protocol which encodes data that is sent ver the intenet. SSL uses Pubic Key Encryption!
      Public Key Encryption uses some pretty weird maths to make it possible for a message to have two keys (or passwords).
      One key is used to encrypt the message and the other is used to – you guessed it: decrypt it! The secrect being that you cannot decrypt the message using the key that was used to encrypt it!