SlideShare a Scribd company logo
1 of 17
INTERNET AND GLOBAL
CONNECTIVITY –
SECURITY CONCERNS
WOW CHALLENGE-1
Name Roll No.
Anish singh
Aishwarya 06
Amika Bhagat 09
Kajal 20
Kamala Pati Singhaniyan 21
Mohammad Soffiyan 27
Rajat Bandhu 41
Pragya
Shanshu Kumar
• The world is becoming more interconnected with the internet
and new networking technology.
• Network security has become more important to personal
computer users, organization and military.
• The internet structure itself allowed for many threats to occur.
• The architecture of internet, when modified can reduce the
possible attacks that can be sent across the networks.
• Knowing the attack methods , allows for the appropriate
security to emerge
INTRODUCTION
NETWORK SECURITY
• Security is crucial to networks and application. With the
connectivity comes security.
• Securities issues are like
• Threats
• Viruses
• Cyber Attacks
• Easily accessible to anyone,
• Drain your bank account
• Hacked your account and profile
• Scam-Fraud, Predators and fake friends
COMMON INTERNET ATTACK
METHODS
Common internet attacks methods are broken down into
categories. Some attacks gain system knowledge or personal
information.
• Eavesdropping
• Viruses
• Worms
• Trojans
• Phishing
• IP Spoofing Attacks
• Denial of Service
EAVESDROPPING
• Interception of communications by an
unauthorized party is called
eavesdropping.
• Passive eavesdropping is when the
person only secretly listens to the
networked messages.
• On the other hand, active
eavesdropping is when the intruder
listens and inserts something into the
communication stream.
• Police department uses this method to
trace suspected phone calls,where
attackers usee to trace private and
confedential calls.
VIRUSES
• Viruses are self‐replication programs that use files to infect and propagate.
• Once a file is opened, the virus will activate within the system.
RED CODE VIRUS
WORMS
• A worm is similar to a virus because they both are self‐replicating, but the worm does
not require a file to allow it to propagate.
• There are two main types of worms, mass‐mailing worms and network aware worms.
• Mass mailing worms use email as a means to infect other computer.
PHISHING
• Phishing is an attempt to obtain
confidential information from an
• individual, group, or organization .
• Phishers trick users into disclosing
personal data, such as credit card
numbers, online banking
credentials, and other sensitive
information.
• Example :- Russians hacked in
DNS influencing the election in
favour of Donald Trump.
• Fake Images can be displayed on
screen that may divert/misguide
you.
IP SPOOFING ATTACKS
• Spoofing means to have the address of the computer mirror
the address of a trusted computer in order to gain access to
other computers. The identity of the intruder is hidden by
different means making detection and prevention difficult.
• Computers in government offices can be accessed through
this method which may leak highly confedential information
between two nations.
TECHNOLOGY FOR INTERNET
SECURITY
Internet threats will continue to be a major issue in the global
world as long as information is accessible and transferred across
the Internet. Different defense and detection mechanisms were
developed to deal with these attacks. Such as
• Firewall
• Intrusion Detection Systems
• Anti‐Malware Software and scanners
• Secure Socket Layer (SSL)
FIREWALL
• A firewall is a typical border control
mechanism or perimeter defense.
• The purpose of a firewall is to block traffic
from the outside, but it could also be used to
block traffic from the inside.
• A firewall is the front line defense mechanism
against intruders.
• It is a system designed to prevent unauthorized
access to or from a private network.
• Firewalls can be implemented in both
hardware and software, or a combination of
both.
INTRUSION DETECTION
SYSTEMS
• An Intrusion Detection System (IDS) is an additiona
lprotection measure that helps ward off computer
intrusions.
• IDS systems can be software and hardware devices used to
detect an attack.
• IDS products are used to monitor connection in
determining whether attacks are been launched.
• Some IDS systems just monitor and alert of an attack,
whereas others try to block the attack.
SECURE SOCKET LAYER (SSL)
• The Secure Socket Layer (SSL) is a suite of protocols that
is a standard way to achieve a good level of security
between a web browser and a website.
• SSL is designed to create a secure channel, or tunnel,
between a web browser and the web server, so that any
information exchanged is protected with in the secured
tunnel.
• SSL provides authentication of clients to server through
the use of certificates.
• Clients present a certificate to the server to prove their
identity.
ATTACK METHODS AND SECURITY
TECHNOLOGY
Computer Security
attributes
Attack Methods Technology for internet
security
Confidential Eavesdropping,
Hacking, Phishing,DoS
and IP Spoofing
IDS, Firewall,
Cryptographic System.
IP Sec and SSL
Integrity Viruses , Worms,
Trojans,
Eavesdropping, Dos
and IP Spoofing.
IDS, Firewall,Anti-
Maleware Software,
IPsec and SSL
Privacy Email Bombing,
Spamming, Hacking,
Dos and Cookies
IDS, Firewall, Anti-
Maleware Software,
IPSec and SSL
Availability Dos, Email Bombing,
Spamming and System
Boot
IDS, Anti-Maleware
Software and Firewall.
ADVANTAGES
Regular connectivity with
• Social Media - Facebook, twitter
• Business world - Different location across different
countries
• Media – to circulate information all over the world from
anywhere and at anytime
DISADVANTAGES
• Business-related security issues
• Personal security issues
CONCLUSION
• Network security is an important field that is increasingly
gaining attention as the internet expands.
• The Attack Methods and Internet Security were analyzed
to determine the necessary security technology. The
security technology is mostly software based, but many
common hardware devices are used.
.
THANK YOU

More Related Content

What's hot (20)

What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
E secuity
E secuityE secuity
E secuity
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Information security
Information securityInformation security
Information security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 

Viewers also liked

P & G marketing strategy
P & G marketing strategyP & G marketing strategy
P & G marketing strategyAkshay Jain
 
Вимоги до мультимедійної презентації
Вимоги до мультимедійної презентаціїВимоги до мультимедійної презентації
Вимоги до мультимедійної презентаціїdtamara123
 
How to fight against “full scratch disease”
How to fight against  “full scratch disease”How to fight against  “full scratch disease”
How to fight against “full scratch disease”Yoichi Toyota
 
Insurance general knowledge
Insurance general knowledgeInsurance general knowledge
Insurance general knowledgeAsim Nazir
 
Adjudication camp brief
Adjudication camp briefAdjudication camp brief
Adjudication camp briefFardeen Ameen
 
Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)
Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)
Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)THL
 
Model debate adj camp
Model debate adj campModel debate adj camp
Model debate adj campFardeen Ameen
 
Statistical Significance | Statistics
Statistical Significance | StatisticsStatistical Significance | Statistics
Statistical Significance | StatisticsTransweb Global Inc
 
Economic and accounting education
Economic and accounting educationEconomic and accounting education
Economic and accounting educationwanayuss
 

Viewers also liked (13)

P & G marketing strategy
P & G marketing strategyP & G marketing strategy
P & G marketing strategy
 
Вимоги до мультимедійної презентації
Вимоги до мультимедійної презентаціїВимоги до мультимедійної презентації
Вимоги до мультимедійної презентації
 
How to fight against “full scratch disease”
How to fight against  “full scratch disease”How to fight against  “full scratch disease”
How to fight against “full scratch disease”
 
Insurance general knowledge
Insurance general knowledgeInsurance general knowledge
Insurance general knowledge
 
Adjudication camp brief
Adjudication camp briefAdjudication camp brief
Adjudication camp brief
 
Kolkata settlement
Kolkata settlementKolkata settlement
Kolkata settlement
 
Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)
Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)
Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)
 
Model debate adj camp
Model debate adj campModel debate adj camp
Model debate adj camp
 
Statistical Significance | Statistics
Statistical Significance | StatisticsStatistical Significance | Statistics
Statistical Significance | Statistics
 
Density Function | Statistics
Density Function | StatisticsDensity Function | Statistics
Density Function | Statistics
 
Hero mindmine
Hero mindmineHero mindmine
Hero mindmine
 
Economic and accounting education
Economic and accounting educationEconomic and accounting education
Economic and accounting education
 
03-19-17
03-19-17 03-19-17
03-19-17
 

Similar to Internet and Global Connectivity – Security Concerns

Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptxAreeb60
 
Network security
Network securityNetwork security
Network securityhajra azam
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 

Similar to Internet and Global Connectivity – Security Concerns (20)

Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Intrusion in computing
Intrusion in computingIntrusion in computing
Intrusion in computing
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Network security
Network securityNetwork security
Network security
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

More from Akshay Jain

The Future Trends Marketing In Reference To Technology
The Future Trends Marketing In Reference To TechnologyThe Future Trends Marketing In Reference To Technology
The Future Trends Marketing In Reference To TechnologyAkshay Jain
 
Textile Industry
Textile Industry Textile Industry
Textile Industry Akshay Jain
 
INDIAN FMCG SECTOR
INDIAN FMCG SECTORINDIAN FMCG SECTOR
INDIAN FMCG SECTORAkshay Jain
 
TELECOMMUNICATION
TELECOMMUNICATIONTELECOMMUNICATION
TELECOMMUNICATIONAkshay Jain
 
REAL ESTATE SECTOR - GODREJ PROPERTIES
REAL ESTATE SECTOR- GODREJ PROPERTIESREAL ESTATE SECTOR- GODREJ PROPERTIES
REAL ESTATE SECTOR - GODREJ PROPERTIESAkshay Jain
 
INTERNATIONAL TERRORISM
INTERNATIONAL TERRORISMINTERNATIONAL TERRORISM
INTERNATIONAL TERRORISMAkshay Jain
 
FUNCTIONS OF BANKS
FUNCTIONS OF BANKSFUNCTIONS OF BANKS
FUNCTIONS OF BANKSAkshay Jain
 
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS Akshay Jain
 

More from Akshay Jain (12)

BANKING SECTOR
BANKING SECTORBANKING SECTOR
BANKING SECTOR
 
The Future Trends Marketing In Reference To Technology
The Future Trends Marketing In Reference To TechnologyThe Future Trends Marketing In Reference To Technology
The Future Trends Marketing In Reference To Technology
 
Food Industry
Food IndustryFood Industry
Food Industry
 
Textile Industry
Textile Industry Textile Industry
Textile Industry
 
INDIAN FMCG SECTOR
INDIAN FMCG SECTORINDIAN FMCG SECTOR
INDIAN FMCG SECTOR
 
TELECOMMUNICATION
TELECOMMUNICATIONTELECOMMUNICATION
TELECOMMUNICATION
 
RETAIL INDUSTRY
RETAIL INDUSTRYRETAIL INDUSTRY
RETAIL INDUSTRY
 
REAL ESTATE SECTOR - GODREJ PROPERTIES
REAL ESTATE SECTOR- GODREJ PROPERTIESREAL ESTATE SECTOR- GODREJ PROPERTIES
REAL ESTATE SECTOR - GODREJ PROPERTIES
 
MAN TRUCKS
MAN TRUCKSMAN TRUCKS
MAN TRUCKS
 
INTERNATIONAL TERRORISM
INTERNATIONAL TERRORISMINTERNATIONAL TERRORISM
INTERNATIONAL TERRORISM
 
FUNCTIONS OF BANKS
FUNCTIONS OF BANKSFUNCTIONS OF BANKS
FUNCTIONS OF BANKS
 
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Internet and Global Connectivity – Security Concerns

  • 1. INTERNET AND GLOBAL CONNECTIVITY – SECURITY CONCERNS WOW CHALLENGE-1
  • 2. Name Roll No. Anish singh Aishwarya 06 Amika Bhagat 09 Kajal 20 Kamala Pati Singhaniyan 21 Mohammad Soffiyan 27 Rajat Bandhu 41 Pragya Shanshu Kumar
  • 3. • The world is becoming more interconnected with the internet and new networking technology. • Network security has become more important to personal computer users, organization and military. • The internet structure itself allowed for many threats to occur. • The architecture of internet, when modified can reduce the possible attacks that can be sent across the networks. • Knowing the attack methods , allows for the appropriate security to emerge INTRODUCTION
  • 4. NETWORK SECURITY • Security is crucial to networks and application. With the connectivity comes security. • Securities issues are like • Threats • Viruses • Cyber Attacks • Easily accessible to anyone, • Drain your bank account • Hacked your account and profile • Scam-Fraud, Predators and fake friends
  • 5. COMMON INTERNET ATTACK METHODS Common internet attacks methods are broken down into categories. Some attacks gain system knowledge or personal information. • Eavesdropping • Viruses • Worms • Trojans • Phishing • IP Spoofing Attacks • Denial of Service
  • 6. EAVESDROPPING • Interception of communications by an unauthorized party is called eavesdropping. • Passive eavesdropping is when the person only secretly listens to the networked messages. • On the other hand, active eavesdropping is when the intruder listens and inserts something into the communication stream. • Police department uses this method to trace suspected phone calls,where attackers usee to trace private and confedential calls.
  • 7. VIRUSES • Viruses are self‐replication programs that use files to infect and propagate. • Once a file is opened, the virus will activate within the system. RED CODE VIRUS WORMS • A worm is similar to a virus because they both are self‐replicating, but the worm does not require a file to allow it to propagate. • There are two main types of worms, mass‐mailing worms and network aware worms. • Mass mailing worms use email as a means to infect other computer.
  • 8. PHISHING • Phishing is an attempt to obtain confidential information from an • individual, group, or organization . • Phishers trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information. • Example :- Russians hacked in DNS influencing the election in favour of Donald Trump. • Fake Images can be displayed on screen that may divert/misguide you.
  • 9. IP SPOOFING ATTACKS • Spoofing means to have the address of the computer mirror the address of a trusted computer in order to gain access to other computers. The identity of the intruder is hidden by different means making detection and prevention difficult. • Computers in government offices can be accessed through this method which may leak highly confedential information between two nations.
  • 10. TECHNOLOGY FOR INTERNET SECURITY Internet threats will continue to be a major issue in the global world as long as information is accessible and transferred across the Internet. Different defense and detection mechanisms were developed to deal with these attacks. Such as • Firewall • Intrusion Detection Systems • Anti‐Malware Software and scanners • Secure Socket Layer (SSL)
  • 11. FIREWALL • A firewall is a typical border control mechanism or perimeter defense. • The purpose of a firewall is to block traffic from the outside, but it could also be used to block traffic from the inside. • A firewall is the front line defense mechanism against intruders. • It is a system designed to prevent unauthorized access to or from a private network. • Firewalls can be implemented in both hardware and software, or a combination of both.
  • 12. INTRUSION DETECTION SYSTEMS • An Intrusion Detection System (IDS) is an additiona lprotection measure that helps ward off computer intrusions. • IDS systems can be software and hardware devices used to detect an attack. • IDS products are used to monitor connection in determining whether attacks are been launched. • Some IDS systems just monitor and alert of an attack, whereas others try to block the attack.
  • 13. SECURE SOCKET LAYER (SSL) • The Secure Socket Layer (SSL) is a suite of protocols that is a standard way to achieve a good level of security between a web browser and a website. • SSL is designed to create a secure channel, or tunnel, between a web browser and the web server, so that any information exchanged is protected with in the secured tunnel. • SSL provides authentication of clients to server through the use of certificates. • Clients present a certificate to the server to prove their identity.
  • 14. ATTACK METHODS AND SECURITY TECHNOLOGY Computer Security attributes Attack Methods Technology for internet security Confidential Eavesdropping, Hacking, Phishing,DoS and IP Spoofing IDS, Firewall, Cryptographic System. IP Sec and SSL Integrity Viruses , Worms, Trojans, Eavesdropping, Dos and IP Spoofing. IDS, Firewall,Anti- Maleware Software, IPsec and SSL Privacy Email Bombing, Spamming, Hacking, Dos and Cookies IDS, Firewall, Anti- Maleware Software, IPSec and SSL Availability Dos, Email Bombing, Spamming and System Boot IDS, Anti-Maleware Software and Firewall.
  • 15. ADVANTAGES Regular connectivity with • Social Media - Facebook, twitter • Business world - Different location across different countries • Media – to circulate information all over the world from anywhere and at anytime DISADVANTAGES • Business-related security issues • Personal security issues
  • 16. CONCLUSION • Network security is an important field that is increasingly gaining attention as the internet expands. • The Attack Methods and Internet Security were analyzed to determine the necessary security technology. The security technology is mostly software based, but many common hardware devices are used. .