SlideShare a Scribd company logo
Network Security
Internet security is the protection of private resources and
information on the internet. The information transmitted over
the internet has a high degree of security risks . There is no
central administrators on the internet . The data sent on the
internet travels different computers . Every computer reads
the data . Many people have access to internet the
unauthorized person can access data and misuse it .
 Different risks on the internet are as follows :
Unauthorized access :
Unauthorized access is the most common security risk on the internet .
Hacker is a person who gains unauthorized access to the computer system for
malicious purpose over the internet.
Crackers also gains unauthorized access to computer for malicious purpose .
 A cracker may steal important data from computer or copy a virus
program in system . The unauthorized person connects to computer
through internet to perfume illegal activities .
 ONLINE PREDATORS :
 Online predators are the very critical risk on the internet . The online
predators exist on website and chatrooms with harmful or inappropriate
material .They use the internet to talk with young peoples and to meet
them ,and to exchange photos etc. Children should not have
unmonitored access to the internet . Organizations are managing child
access to internet often use a proxy system . The proxy systems URL
check to block inappropriate websites .
 Information theft is another is another critical security risk over the internet.it is a
process of stealing personal or confidential information without permission . The
stolen information can be further used for illegal activities.
 EXAMPLE :
 Someone may steal the credit card numbers of another person and can use it for
inline shopping or for other purposes .
The following measures can be used for protection from
internet security risks :
 A firewall is a set combination of hardware and software that prevents system from
unauthorized access . It works between an organization’s internal network and the
internet . It protects data ,media and all of a system from unauthorized access .
 Encryption :
 It is a process of encoding data so that only authorized users may understand and use
it . If an unauthorized person get access to the data he can’t understand
 It is generated automatically and shared between two computers that communicates
with each other . This key is used to convert message into unreadable form. The
message can’t be read by it.
 THIS METHOD IS OF TWO KEYS:
 Secret key :
 It is a private key , in this method both consumer use the same encryption key .
 Public key encryption:
 A public key encryption is used by all authorized users . While secret key is used by
both sender and receiver .
 Keep hostage – keep off your files .
 Avoid fake websites.
 Spot scan emails.
 Fire wall your data .
 Take a look inside.
Fire wall
Anti- spam
Real site
Wi-Fi inspector
 Access privileges ;
 Some internet providers allow the parents to specify each children access privileges .
 Blocking software :
 Parents can protect children from immoral or vulgar websites by using these software
.
 Child monitoring :
 The computer used by children must be places at public area . The children should
not use the internet in their bedrooms .
Definition
 Network security is a level of guarantee that all the machines in the network are
working optimally and users of these machines only possess the rights that were only
guaranteed to them.
 THIS CAN INCLUDE:
 Preventing unauthorized people from acting on the system maliciously .
 Preventing users from performing involuntary operations that are capable of harming
the system .
 Securing data from anticipating failure.
 Guaranteeing that the services are nit interrupted.
 Internet security has been a issue since the internet rose to international phenomenon
.
 By 1996 the internet already connected 13 million computers , so early security
protocols were required .
 Wi-fi protected access:
 WPA encrypts the information and checks to make sure that the network security has
not been modified.
 WPA also authorized authenticates users to help ensure that only authorized people
can access the network .
 Wired equivalent policy :
 WEP is an older network security method that is still available to support older
devices but it is no longer recommended .
 Network security helps in protecting personal data of clients existing on network.
 Network security facilities protecting of information that is shared between computers
on network .
 Although this evaluation is in direct response to the changing business needs ,in
many cases security has ben an after cases .
 Purchasing network cabling and file server can be expensive.
 Managing a large network is complicated , requires training and a network manager
usually needs to be employed .
 Viruses can spread to other computers throughout a computer network.
 There is a danger of hacking ,particularly with wide area network . Security
procedures are needed to prevent to such abuse ,eg a firewall.
Internet security

More Related Content

What's hot

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
sajeena81
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Happiest Minds Technologies
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
Bavijesh Thaliyil
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
Deepak Kumar
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Cyber security
Cyber securityCyber security
Cyber security
PawanKalyanAmbati
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Yasmin Ismail
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Web Security
Web SecurityWeb Security
Web Security
Tripad M
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Arnav Chowdhury
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 

What's hot (20)

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 

Similar to Internet security

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
Network security ppt
Network security pptNetwork security ppt
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
KellyIsaac3
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
MijanurSepai1
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
ME1923SoumyaSouravNa
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
AschalewAyele2
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
Shreedevi Tharanidharan
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
Haley Johnson
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
AkilSayyad2
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 

Similar to Internet security (20)

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

Recently uploaded

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 

Recently uploaded (16)

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 

Internet security

  • 2. Internet security is the protection of private resources and information on the internet. The information transmitted over the internet has a high degree of security risks . There is no central administrators on the internet . The data sent on the internet travels different computers . Every computer reads the data . Many people have access to internet the unauthorized person can access data and misuse it .
  • 3.  Different risks on the internet are as follows : Unauthorized access : Unauthorized access is the most common security risk on the internet . Hacker is a person who gains unauthorized access to the computer system for malicious purpose over the internet. Crackers also gains unauthorized access to computer for malicious purpose .
  • 4.  A cracker may steal important data from computer or copy a virus program in system . The unauthorized person connects to computer through internet to perfume illegal activities .  ONLINE PREDATORS :  Online predators are the very critical risk on the internet . The online predators exist on website and chatrooms with harmful or inappropriate material .They use the internet to talk with young peoples and to meet them ,and to exchange photos etc. Children should not have unmonitored access to the internet . Organizations are managing child access to internet often use a proxy system . The proxy systems URL check to block inappropriate websites .
  • 5.  Information theft is another is another critical security risk over the internet.it is a process of stealing personal or confidential information without permission . The stolen information can be further used for illegal activities.  EXAMPLE :  Someone may steal the credit card numbers of another person and can use it for inline shopping or for other purposes .
  • 6. The following measures can be used for protection from internet security risks :
  • 7.  A firewall is a set combination of hardware and software that prevents system from unauthorized access . It works between an organization’s internal network and the internet . It protects data ,media and all of a system from unauthorized access .  Encryption :  It is a process of encoding data so that only authorized users may understand and use it . If an unauthorized person get access to the data he can’t understand
  • 8.  It is generated automatically and shared between two computers that communicates with each other . This key is used to convert message into unreadable form. The message can’t be read by it.  THIS METHOD IS OF TWO KEYS:  Secret key :  It is a private key , in this method both consumer use the same encryption key .  Public key encryption:  A public key encryption is used by all authorized users . While secret key is used by both sender and receiver .
  • 9.  Keep hostage – keep off your files .  Avoid fake websites.  Spot scan emails.  Fire wall your data .  Take a look inside.
  • 10. Fire wall Anti- spam Real site Wi-Fi inspector
  • 11.  Access privileges ;  Some internet providers allow the parents to specify each children access privileges .  Blocking software :  Parents can protect children from immoral or vulgar websites by using these software .  Child monitoring :  The computer used by children must be places at public area . The children should not use the internet in their bedrooms .
  • 13.  Network security is a level of guarantee that all the machines in the network are working optimally and users of these machines only possess the rights that were only guaranteed to them.  THIS CAN INCLUDE:  Preventing unauthorized people from acting on the system maliciously .  Preventing users from performing involuntary operations that are capable of harming the system .  Securing data from anticipating failure.  Guaranteeing that the services are nit interrupted.
  • 14.  Internet security has been a issue since the internet rose to international phenomenon .  By 1996 the internet already connected 13 million computers , so early security protocols were required .
  • 15.  Wi-fi protected access:  WPA encrypts the information and checks to make sure that the network security has not been modified.  WPA also authorized authenticates users to help ensure that only authorized people can access the network .  Wired equivalent policy :  WEP is an older network security method that is still available to support older devices but it is no longer recommended .
  • 16.  Network security helps in protecting personal data of clients existing on network.  Network security facilities protecting of information that is shared between computers on network .  Although this evaluation is in direct response to the changing business needs ,in many cases security has ben an after cases .
  • 17.  Purchasing network cabling and file server can be expensive.  Managing a large network is complicated , requires training and a network manager usually needs to be employed .  Viruses can spread to other computers throughout a computer network.  There is a danger of hacking ,particularly with wide area network . Security procedures are needed to prevent to such abuse ,eg a firewall.