SlideShare a Scribd company logo
1 of 18
Network Security
Internet security is the protection of private resources and
information on the internet. The information transmitted over
the internet has a high degree of security risks . There is no
central administrators on the internet . The data sent on the
internet travels different computers . Every computer reads
the data . Many people have access to internet the
unauthorized person can access data and misuse it .
 Different risks on the internet are as follows :
Unauthorized access :
Unauthorized access is the most common security risk on the internet .
Hacker is a person who gains unauthorized access to the computer system for
malicious purpose over the internet.
Crackers also gains unauthorized access to computer for malicious purpose .
 A cracker may steal important data from computer or copy a virus
program in system . The unauthorized person connects to computer
through internet to perfume illegal activities .
 ONLINE PREDATORS :
 Online predators are the very critical risk on the internet . The online
predators exist on website and chatrooms with harmful or inappropriate
material .They use the internet to talk with young peoples and to meet
them ,and to exchange photos etc. Children should not have
unmonitored access to the internet . Organizations are managing child
access to internet often use a proxy system . The proxy systems URL
check to block inappropriate websites .
 Information theft is another is another critical security risk over the internet.it is a
process of stealing personal or confidential information without permission . The
stolen information can be further used for illegal activities.
 EXAMPLE :
 Someone may steal the credit card numbers of another person and can use it for
inline shopping or for other purposes .
The following measures can be used for protection from
internet security risks :
 A firewall is a set combination of hardware and software that prevents system from
unauthorized access . It works between an organization’s internal network and the
internet . It protects data ,media and all of a system from unauthorized access .
 Encryption :
 It is a process of encoding data so that only authorized users may understand and use
it . If an unauthorized person get access to the data he can’t understand
 It is generated automatically and shared between two computers that communicates
with each other . This key is used to convert message into unreadable form. The
message can’t be read by it.
 THIS METHOD IS OF TWO KEYS:
 Secret key :
 It is a private key , in this method both consumer use the same encryption key .
 Public key encryption:
 A public key encryption is used by all authorized users . While secret key is used by
both sender and receiver .
 Keep hostage – keep off your files .
 Avoid fake websites.
 Spot scan emails.
 Fire wall your data .
 Take a look inside.
Fire wall
Anti- spam
Real site
Wi-Fi inspector
 Access privileges ;
 Some internet providers allow the parents to specify each children access privileges .
 Blocking software :
 Parents can protect children from immoral or vulgar websites by using these software
.
 Child monitoring :
 The computer used by children must be places at public area . The children should
not use the internet in their bedrooms .
Definition
 Network security is a level of guarantee that all the machines in the network are
working optimally and users of these machines only possess the rights that were only
guaranteed to them.
 THIS CAN INCLUDE:
 Preventing unauthorized people from acting on the system maliciously .
 Preventing users from performing involuntary operations that are capable of harming
the system .
 Securing data from anticipating failure.
 Guaranteeing that the services are nit interrupted.
 Internet security has been a issue since the internet rose to international phenomenon
.
 By 1996 the internet already connected 13 million computers , so early security
protocols were required .
 Wi-fi protected access:
 WPA encrypts the information and checks to make sure that the network security has
not been modified.
 WPA also authorized authenticates users to help ensure that only authorized people
can access the network .
 Wired equivalent policy :
 WEP is an older network security method that is still available to support older
devices but it is no longer recommended .
 Network security helps in protecting personal data of clients existing on network.
 Network security facilities protecting of information that is shared between computers
on network .
 Although this evaluation is in direct response to the changing business needs ,in
many cases security has ben an after cases .
 Purchasing network cabling and file server can be expensive.
 Managing a large network is complicated , requires training and a network manager
usually needs to be employed .
 Viruses can spread to other computers throughout a computer network.
 There is a danger of hacking ,particularly with wide area network . Security
procedures are needed to prevent to such abuse ,eg a firewall.
Internet security

More Related Content

What's hot

What's hot (20)

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 

Similar to Internet security

Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
AschalewAyele2
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 

Similar to Internet security (20)

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

Recently uploaded

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Recently uploaded (20)

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 

Internet security

  • 2. Internet security is the protection of private resources and information on the internet. The information transmitted over the internet has a high degree of security risks . There is no central administrators on the internet . The data sent on the internet travels different computers . Every computer reads the data . Many people have access to internet the unauthorized person can access data and misuse it .
  • 3.  Different risks on the internet are as follows : Unauthorized access : Unauthorized access is the most common security risk on the internet . Hacker is a person who gains unauthorized access to the computer system for malicious purpose over the internet. Crackers also gains unauthorized access to computer for malicious purpose .
  • 4.  A cracker may steal important data from computer or copy a virus program in system . The unauthorized person connects to computer through internet to perfume illegal activities .  ONLINE PREDATORS :  Online predators are the very critical risk on the internet . The online predators exist on website and chatrooms with harmful or inappropriate material .They use the internet to talk with young peoples and to meet them ,and to exchange photos etc. Children should not have unmonitored access to the internet . Organizations are managing child access to internet often use a proxy system . The proxy systems URL check to block inappropriate websites .
  • 5.  Information theft is another is another critical security risk over the internet.it is a process of stealing personal or confidential information without permission . The stolen information can be further used for illegal activities.  EXAMPLE :  Someone may steal the credit card numbers of another person and can use it for inline shopping or for other purposes .
  • 6. The following measures can be used for protection from internet security risks :
  • 7.  A firewall is a set combination of hardware and software that prevents system from unauthorized access . It works between an organization’s internal network and the internet . It protects data ,media and all of a system from unauthorized access .  Encryption :  It is a process of encoding data so that only authorized users may understand and use it . If an unauthorized person get access to the data he can’t understand
  • 8.  It is generated automatically and shared between two computers that communicates with each other . This key is used to convert message into unreadable form. The message can’t be read by it.  THIS METHOD IS OF TWO KEYS:  Secret key :  It is a private key , in this method both consumer use the same encryption key .  Public key encryption:  A public key encryption is used by all authorized users . While secret key is used by both sender and receiver .
  • 9.  Keep hostage – keep off your files .  Avoid fake websites.  Spot scan emails.  Fire wall your data .  Take a look inside.
  • 10. Fire wall Anti- spam Real site Wi-Fi inspector
  • 11.  Access privileges ;  Some internet providers allow the parents to specify each children access privileges .  Blocking software :  Parents can protect children from immoral or vulgar websites by using these software .  Child monitoring :  The computer used by children must be places at public area . The children should not use the internet in their bedrooms .
  • 13.  Network security is a level of guarantee that all the machines in the network are working optimally and users of these machines only possess the rights that were only guaranteed to them.  THIS CAN INCLUDE:  Preventing unauthorized people from acting on the system maliciously .  Preventing users from performing involuntary operations that are capable of harming the system .  Securing data from anticipating failure.  Guaranteeing that the services are nit interrupted.
  • 14.  Internet security has been a issue since the internet rose to international phenomenon .  By 1996 the internet already connected 13 million computers , so early security protocols were required .
  • 15.  Wi-fi protected access:  WPA encrypts the information and checks to make sure that the network security has not been modified.  WPA also authorized authenticates users to help ensure that only authorized people can access the network .  Wired equivalent policy :  WEP is an older network security method that is still available to support older devices but it is no longer recommended .
  • 16.  Network security helps in protecting personal data of clients existing on network.  Network security facilities protecting of information that is shared between computers on network .  Although this evaluation is in direct response to the changing business needs ,in many cases security has ben an after cases .
  • 17.  Purchasing network cabling and file server can be expensive.  Managing a large network is complicated , requires training and a network manager usually needs to be employed .  Viruses can spread to other computers throughout a computer network.  There is a danger of hacking ,particularly with wide area network . Security procedures are needed to prevent to such abuse ,eg a firewall.