1
Types of securities
Attack From Internet
Security products
Conclution
2
 The Internet is a global system of
interconnected computer networks that use the
standard Internet protocol suite to link several billion
devices worldwide.
What’s internet security
Internet security is a branch of computer
security specifically related to the Internet, often
involving browser security
3
TYPES OF SECURITIES
Network layer security
Internet Protocol Security
Security token
Electronic mail security
4
NETWORK LAYER
SECURITY
The network layer, commonly referred to as the physical
interface between the host system and the network
hardware.
 It defines how data packets are to be formatted for
transmission and routings
Network layer can be made secure with the help of
cryptographic methods and protocols developed for
securing communications on the Internet.
5
INTERNET PROTOCOL
SECURITY
Internet Protocol Security is a protocol for
securing Internet Protocol communications
by authenticating and encrypting the data.
IPsec can be used in protecting data flows between a
pair of hosts or between a pair of security gateways or
between a security gateway and a host
6
SECURITY TOKEN
A security token is a physical device that an authorized
user of computer services is given to
ease authentication.
Security tokens are used to prove one's identity
electronically.
The token acts like an electronic key to access
something.
7
ELECTRONIC MAIL
SECURITY
The protection of email from unauthorized access and
inspection is known as email security .
This email security is used to prevent an cracker to
acess.
8
ATTACK FROM INTERNET
Denial-of-service attack
Buffer overflow attacks
Malicious software
9
DENIAL-OF-SERVICE ATTACK
DoS attack is an attempt to make a machine or
network resource unavailable to its original users.
It generally consists of efforts to temporarily or
indefinitely interrupt or suspend services of a host
connected to the Internet.
Buffer overflow attacks
In computer security and programming, a buffer
overflow, is an Software bug where a program, while
writing data to a buffer, overruns the buffer's boundary
and overwrites adjacent memory.
10
MAMALICIOUS
SOFTWAREOUS
SOFTWARE
Malicious software is software used to disrupt
computer operation, or gather sensitive information, or
gain access to private computer systems
Main Types of Malicious software
Viruses
Worms
Trojan horse 11
VIRUSES
 A computer virus is a type of malicious software that, when
executed, replicates by inserting copies of itself into other program.
Worms
A computer worm is a malware program that replicates itself, across a network
to other computers.
Trojan horse
A Trojan horse in computing is a non-self-replicating type
of malware program containing malicious code that, when executed in a slower
process.
12
INTERNET
products
13
Firewalls
Antivirus
14
FIREWALLS
Firewall is a technological barrier designed to prevent
unauthorizition between computer networks or hosts.
A firewall controls access between networks. It
generally consists of gateways and filters.
Firewalls also screen network traffic and are able to
block traffic that is dangerous.
15
ANTIVIRUS
Antivirus, is computer software used to prevent, detect
and remove malicious computer viruses.
Antivirus software blocks known malicious web sites
that attempt to install malware
16
Internet securities main objective is to establish
rules and measures to use against attacks over the
Internet.
17
18
19

internet security

  • 1.
  • 2.
    Types of securities AttackFrom Internet Security products Conclution 2
  • 3.
     The Internetis a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide. What’s internet security Internet security is a branch of computer security specifically related to the Internet, often involving browser security 3
  • 4.
    TYPES OF SECURITIES Networklayer security Internet Protocol Security Security token Electronic mail security 4
  • 5.
    NETWORK LAYER SECURITY The networklayer, commonly referred to as the physical interface between the host system and the network hardware.  It defines how data packets are to be formatted for transmission and routings Network layer can be made secure with the help of cryptographic methods and protocols developed for securing communications on the Internet. 5
  • 6.
    INTERNET PROTOCOL SECURITY Internet ProtocolSecurity is a protocol for securing Internet Protocol communications by authenticating and encrypting the data. IPsec can be used in protecting data flows between a pair of hosts or between a pair of security gateways or between a security gateway and a host 6
  • 7.
    SECURITY TOKEN A securitytoken is a physical device that an authorized user of computer services is given to ease authentication. Security tokens are used to prove one's identity electronically. The token acts like an electronic key to access something. 7
  • 8.
    ELECTRONIC MAIL SECURITY The protectionof email from unauthorized access and inspection is known as email security . This email security is used to prevent an cracker to acess. 8
  • 9.
    ATTACK FROM INTERNET Denial-of-serviceattack Buffer overflow attacks Malicious software 9
  • 10.
    DENIAL-OF-SERVICE ATTACK DoS attackis an attempt to make a machine or network resource unavailable to its original users. It generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Buffer overflow attacks In computer security and programming, a buffer overflow, is an Software bug where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. 10
  • 11.
    MAMALICIOUS SOFTWAREOUS SOFTWARE Malicious software issoftware used to disrupt computer operation, or gather sensitive information, or gain access to private computer systems Main Types of Malicious software Viruses Worms Trojan horse 11
  • 12.
    VIRUSES  A computervirus is a type of malicious software that, when executed, replicates by inserting copies of itself into other program. Worms A computer worm is a malware program that replicates itself, across a network to other computers. Trojan horse A Trojan horse in computing is a non-self-replicating type of malware program containing malicious code that, when executed in a slower process. 12
  • 13.
  • 14.
  • 15.
    FIREWALLS Firewall is atechnological barrier designed to prevent unauthorizition between computer networks or hosts. A firewall controls access between networks. It generally consists of gateways and filters. Firewalls also screen network traffic and are able to block traffic that is dangerous. 15
  • 16.
    ANTIVIRUS Antivirus, is computersoftware used to prevent, detect and remove malicious computer viruses. Antivirus software blocks known malicious web sites that attempt to install malware 16
  • 17.
    Internet securities mainobjective is to establish rules and measures to use against attacks over the Internet. 17
  • 18.
  • 19.

Editor's Notes