3. The Internet is a global system of
interconnected computer networks that use the
standard Internet protocol suite to link several billion
devices worldwide.
What’s internet security
Internet security is a branch of computer
security specifically related to the Internet, often
involving browser security
3
4. TYPES OF SECURITIES
Network layer security
Internet Protocol Security
Security token
Electronic mail security
4
5. NETWORK LAYER
SECURITY
The network layer, commonly referred to as the physical
interface between the host system and the network
hardware.
It defines how data packets are to be formatted for
transmission and routings
Network layer can be made secure with the help of
cryptographic methods and protocols developed for
securing communications on the Internet.
5
6. INTERNET PROTOCOL
SECURITY
Internet Protocol Security is a protocol for
securing Internet Protocol communications
by authenticating and encrypting the data.
IPsec can be used in protecting data flows between a
pair of hosts or between a pair of security gateways or
between a security gateway and a host
6
7. SECURITY TOKEN
A security token is a physical device that an authorized
user of computer services is given to
ease authentication.
Security tokens are used to prove one's identity
electronically.
The token acts like an electronic key to access
something.
7
8. ELECTRONIC MAIL
SECURITY
The protection of email from unauthorized access and
inspection is known as email security .
This email security is used to prevent an cracker to
acess.
8
10. DENIAL-OF-SERVICE ATTACK
DoS attack is an attempt to make a machine or
network resource unavailable to its original users.
It generally consists of efforts to temporarily or
indefinitely interrupt or suspend services of a host
connected to the Internet.
Buffer overflow attacks
In computer security and programming, a buffer
overflow, is an Software bug where a program, while
writing data to a buffer, overruns the buffer's boundary
and overwrites adjacent memory.
10
11. MAMALICIOUS
SOFTWAREOUS
SOFTWARE
Malicious software is software used to disrupt
computer operation, or gather sensitive information, or
gain access to private computer systems
Main Types of Malicious software
Viruses
Worms
Trojan horse 11
12. VIRUSES
A computer virus is a type of malicious software that, when
executed, replicates by inserting copies of itself into other program.
Worms
A computer worm is a malware program that replicates itself, across a network
to other computers.
Trojan horse
A Trojan horse in computing is a non-self-replicating type
of malware program containing malicious code that, when executed in a slower
process.
12
15. FIREWALLS
Firewall is a technological barrier designed to prevent
unauthorizition between computer networks or hosts.
A firewall controls access between networks. It
generally consists of gateways and filters.
Firewalls also screen network traffic and are able to
block traffic that is dangerous.
15
16. ANTIVIRUS
Antivirus, is computer software used to prevent, detect
and remove malicious computer viruses.
Antivirus software blocks known malicious web sites
that attempt to install malware
16
17. Internet securities main objective is to establish
rules and measures to use against attacks over the
Internet.
17