SlideShare a Scribd company logo
WHAT IS INTERNET SECURITY ?
Internaet Security is a branch of computer
security specifically related to not only Internet,
often involving browser security and the World
Wide Web (WWW) , but also network security as
it applies to other applications or operating
systems as a whole .
Its objective is to establish rules and measures
to use against attacks over the Internet . The
Internet represents an insecure channelfor
exchanging information , which leads to a high
risk of intrusion or fraud , such as phishing ,
Slow Connections:
The slow and sluggish behaviour of you computer network is
perhaps the most common sign that indicates that your IT system
is under attack.
Unexpected Popups:
Your computer is surely compromised when windows the user
clicking anything on the screen.
Mysterious Computer Behaviour :
Strange behaviour of the computer system must be taken as a red
flag and a sign of trouble.
Inability to download updates :
The presence of malicious programs in the computer also
prohibits users from downloading important updates that will
make their operating system more secure.
Unfamiliar programs running in Task Manager:
***************************************************************************
I) MALICIOUS SOFTWARE :
 An internet user can be tricked or forced into downloading software
that is of malicious intent onto a computer, such software comes in
many forms, such as viruses, trojan horses, spyware and worms.
 Malware, short for malicious software, is any software used to disrupt
computer operation, gather sensitive information, or gain access to
private computer systems.
 A botnet is a network of zombie computers that have been taken over
by a robot or bot that performs large-scale malicious acts for the
creator of botnet.
 Computer viruses are programs that can replicate
their structures or effects by infecting other
files or structures on a computer to steal data.
 Computer worms are programs that can replicate
themselves throughout a computer network,
performing a malicious tasks throughout.
 Ransomware is a type of malware which restricts access to the
computer system that it infects , and demands a ransom paid to the
creator(s) of the malware in order for restriction to be removed.
 Scareware is scam software of usually limited or no benefit, containing
malicious payloads, that is sold to consumers via certain unethical
marketing practices.
Spyware refers to programs that surreptitiously
monitor activity on a computer system and
report that information to others without
the user’s consent.
One particular kind of spyware is key logging
malware. Keystroke logging, often referred to
as key logging or keyboard capturing , is the
action of recording (logging) the keys struck on a keyboard.
A trojan horse, commonly known as a trojan, is a general term for
malicious software that pretends to be harmless, so that a user will be
convinced to download it onto the computer.
*************************************
******************************
II) Denial-of- Service (DoS) attacks :
 A denial-of-service attack (DoS attack) or distributed denial-of-service
attack (DDoS attack) is an attempt to make a computer resource unavailable to
its intended users.
 According to a business who participated in an international business security
survey, 25% of respondents experienced a DoS
attack in 2007 and 16.8% experienced one in 2010.
 Dos attacks often use bots (or a botnet) to carry
out the attack.
III) Phishing :
 Phishing is an attack which targets online users
for extraction of their sensitive information such
as username, password and credit card information.
 It occurs when the attacker pretends to be a
trustworthy entity, either via email or web page.
 Victims are directed to fake web pages, which are dressed to look legitimate,
via spoof emails, instant messenger/social media or other avenues.
 Insurance group RSA said that phishing accounted for worldwide losses of $
10.8 billion in 2016.
III) Application Vulnerabilities :
 Applications used to access Internet resources may contain
security vulnerabilities such as memory safety bugs or flawed
authentication checks.
 The most severe of these bugs can give network attackers
full control over the computer.
 Most security applications and suites are incapable of
adequate defence against these kinds of attacks.
 A very widespread web-browser application vulnerability is the so- called
CROSS-ORIGIN RESOURCE SHARING (CORS) vulnerability for maximum
security and privacy.
 Security Suites ;
They contain a suite of firewalls, anti-virus, anti-spyware
and more. They also offer protection, portable storage
device safety check, private internet browsing, cloud
anti-spam, a file shredder or make security-related
decisions and several are free of charge.
Network layer security ;
TCP/IP protocols may be secured with cryptographic
methods and security protocols. These include SECURE
SOCKETS LAYER (SSL), succeeded by TRANSPORT LAYER
SECURITY (TSL) for web traffic, PRETTY GOOD PRIVACY
(PGP) for email and IPsec for the network layer security.
 Multi-factor authentication :
Multi-factor authentication (MFA) is a method of computer
access control in which a user
is granted access only after
successfully presenting several
separate pieces of evidence to
an authentication mechanism.
Internet resources, such as
websites and email, may be secured sing multi-factor
authentication .
 Security Token :
Some online sites offer customers the ability to use a six-digit code
which randomly changes after 30-60 seconds on a security token .The
keys on the security token have
built in mathematical
computations and manipulate
numbers based on the current
time built into the device.
This means that every 30 seconds there is only a certain array of
numbers possible which would be correct to validate access to the
online account.
__________________________________________________________
Some more tips to be secured online :-
Use good antivirus, internet security suite
Encrypt the hard drive(s)
Use a secured Wi-Fi connection(s)
Stay safe from tech support scams
Use a safe browser etc.
INTERNET SECURITY.pptx

More Related Content

Similar to INTERNET SECURITY.pptx

Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
John Steensen, MBA/TM, CISA, CRISC
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 
Cyber security
Cyber securityCyber security
Cyber security
Nimesh Gajjar
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
VIRAJDEY1
 
Network security
Network securityNetwork security
Network security
nafisarayhana1
 
Information security
Information securityInformation security
Information security
IshaRana14
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
Haley Johnson
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
Muhammad FAHAD
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 

Similar to INTERNET SECURITY.pptx (20)

Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
 
Network security
Network securityNetwork security
Network security
 
Information security
Information securityInformation security
Information security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
computer security
computer securitycomputer security
computer security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

Recently uploaded

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 

Recently uploaded (16)

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 

INTERNET SECURITY.pptx

  • 1.
  • 2. WHAT IS INTERNET SECURITY ? Internaet Security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web (WWW) , but also network security as it applies to other applications or operating systems as a whole . Its objective is to establish rules and measures to use against attacks over the Internet . The Internet represents an insecure channelfor exchanging information , which leads to a high risk of intrusion or fraud , such as phishing ,
  • 3. Slow Connections: The slow and sluggish behaviour of you computer network is perhaps the most common sign that indicates that your IT system is under attack. Unexpected Popups: Your computer is surely compromised when windows the user clicking anything on the screen. Mysterious Computer Behaviour : Strange behaviour of the computer system must be taken as a red flag and a sign of trouble. Inability to download updates : The presence of malicious programs in the computer also prohibits users from downloading important updates that will make their operating system more secure. Unfamiliar programs running in Task Manager: ***************************************************************************
  • 4. I) MALICIOUS SOFTWARE :  An internet user can be tricked or forced into downloading software that is of malicious intent onto a computer, such software comes in many forms, such as viruses, trojan horses, spyware and worms.  Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.  A botnet is a network of zombie computers that have been taken over by a robot or bot that performs large-scale malicious acts for the creator of botnet.  Computer viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer to steal data.  Computer worms are programs that can replicate themselves throughout a computer network, performing a malicious tasks throughout.
  • 5.  Ransomware is a type of malware which restricts access to the computer system that it infects , and demands a ransom paid to the creator(s) of the malware in order for restriction to be removed.  Scareware is scam software of usually limited or no benefit, containing malicious payloads, that is sold to consumers via certain unethical marketing practices. Spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user’s consent. One particular kind of spyware is key logging malware. Keystroke logging, often referred to as key logging or keyboard capturing , is the action of recording (logging) the keys struck on a keyboard. A trojan horse, commonly known as a trojan, is a general term for malicious software that pretends to be harmless, so that a user will be convinced to download it onto the computer. ************************************* ******************************
  • 6. II) Denial-of- Service (DoS) attacks :  A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.  According to a business who participated in an international business security survey, 25% of respondents experienced a DoS attack in 2007 and 16.8% experienced one in 2010.  Dos attacks often use bots (or a botnet) to carry out the attack. III) Phishing :  Phishing is an attack which targets online users for extraction of their sensitive information such as username, password and credit card information.  It occurs when the attacker pretends to be a trustworthy entity, either via email or web page.  Victims are directed to fake web pages, which are dressed to look legitimate, via spoof emails, instant messenger/social media or other avenues.  Insurance group RSA said that phishing accounted for worldwide losses of $ 10.8 billion in 2016.
  • 7. III) Application Vulnerabilities :  Applications used to access Internet resources may contain security vulnerabilities such as memory safety bugs or flawed authentication checks.  The most severe of these bugs can give network attackers full control over the computer.  Most security applications and suites are incapable of adequate defence against these kinds of attacks.  A very widespread web-browser application vulnerability is the so- called CROSS-ORIGIN RESOURCE SHARING (CORS) vulnerability for maximum security and privacy.  Security Suites ; They contain a suite of firewalls, anti-virus, anti-spyware and more. They also offer protection, portable storage device safety check, private internet browsing, cloud anti-spam, a file shredder or make security-related decisions and several are free of charge.
  • 8. Network layer security ; TCP/IP protocols may be secured with cryptographic methods and security protocols. These include SECURE SOCKETS LAYER (SSL), succeeded by TRANSPORT LAYER SECURITY (TSL) for web traffic, PRETTY GOOD PRIVACY (PGP) for email and IPsec for the network layer security.  Multi-factor authentication : Multi-factor authentication (MFA) is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism. Internet resources, such as websites and email, may be secured sing multi-factor authentication .
  • 9.  Security Token : Some online sites offer customers the ability to use a six-digit code which randomly changes after 30-60 seconds on a security token .The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every 30 seconds there is only a certain array of numbers possible which would be correct to validate access to the online account. __________________________________________________________ Some more tips to be secured online :- Use good antivirus, internet security suite Encrypt the hard drive(s) Use a secured Wi-Fi connection(s) Stay safe from tech support scams Use a safe browser etc.