Internet security


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Internet security

  1. 1. Internet Security<br />Grade 12<br />
  2. 2. A 21st Century Society<br />We live in a Society today that..<br />
  3. 3. The problem though is two fold:<br />1. A medium never designed to be safe and trustworthy.<br />2. E-Communication is largely anonymous...<br />The results?<br />Let’s look at ways that security can be breached...<br />
  4. 4. Security Threats<br />Hackers!<br />To access, steal or tamper with data and information.<br />To steal your “electronic identity” and pose as you.<br />To attack your computer systems from your account or computer.<br />The most common dangers are:<br />
  5. 5.
  6. 6. Protecting your data...<br />Discuss...<br />Use protective hardware...<br />Make Backups...<br />Save regularly... <br />Use password protection...<br />Social Engineering?<br />Protect your computer...<br /><ul><li>Update software
  7. 7. Install malware detection and removal tools
  8. 8. Use a firewall
  9. 9. Use your network operating system
  10. 10. Don’t trust e-mails with attachments or discs from foreign sources
  11. 11. Use digital signature and certificates</li></li></ul><li>Lets revise... <br />Basic Communications Concepts:<br /> Port – no not the physical connection<br />While you’re surfing the net – you’re computer is multitasking.<br />The question – how does it know which packet goes to which program? <br />The answer – Every packet sent over the internet knows not only the IP address of the computer it must reach, but also the port number to tell the computer which program must handle it.<br />The example – HTTP browsers generally use Port 80. Received e-mail (POP3) uses Port 110 and SMTP uses Port 25. <br />In case you’re wondering – your computer has ports form 0 – 65535.<br />
  12. 12. So what is a protocol?<br />Very simply – a set of rules governing communications.<br />
  13. 13. Firewalls?<br />A firewall is either hardware or software or both that protects a network from :<br />Being accessed by external users/ software that are not authorised.<br />Having software running inside the network communicate with computers outside the network.<br />Having software communicate using ports that are not authorised.<br />
  14. 14. So how does it work?<br />Imagine a school...<br />
  15. 15. Encryption<br />Is simply a way of scrambling data or text into a new format using a specified set of rules/ protocol.<br />“When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.”<br />“When cryptography is outlawed, only Akash will be gay.”<br />
  16. 16. SSL – Secure Sockets Layer<br />The problem with encryption...<br />SSL – is a anencryption protocol which encodes data that is sent ver the intenet. SSL uses Pubic Key Encryption!<br />Public Key Encryption uses some pretty weird maths to make it possible for a message to have two keys (or passwords). <br />One key is used to encrypt the message and the other is used to – you guessed it: decrypt it! The secrect being that you cannot decrypt the message using the key that was used to encrypt it!<br />