SlideShare a Scribd company logo
THE NEED FOR
NETWORK SECURITY
By Lahiru Ratnayake
( MBA(My), BSc(UK), DNIIT(in), IPICT, Dip. Network Eng. )
The Need for Web Security 2
PRESENTATION OBJECTIVES
 Understand information security services
 Be aware of vulnerabilities and threats
 Realize why network security is necessary
 What are the elements of a comprehensive
security program
The Need for Web Security 3
TRENDS FOR INFORMATION
 More information is being created, stored, processed and
communicated using computers and networks
 Computers are increasingly interconnected, creating new
pathways to information assets
 The threats to information are becoming more widespread
and more sophisticated
 Productivity, competitiveness, are tied to the first two trends
 Third trend makes it inevitable that we are increasingly vulnerable
to the corruption or exploitation of information
INFORMATION IS THE MOST VALUABLE ASSET
The Need for Web Security 4
Information Security Services
 Confidentiality
 Integrity
 Authentication
 Nonrepudiation
 Access Control
 Availability
The Need for Web Security 5
Information Security Services
 Confidentiality
 Maintaining the privacy of data
 Integrity
 Detecting that the data is not tampered with
 Authentication
 Establishing proof of identity
 Nonrepudiation
 Ability to prove that the sender actually sent the data
 Access Control
 Access to information resources are regulated
 Availability
 Computer assets are available to authorized parties when needed
The Need for Web Security 6
 Collection of networks that communicate
 with a common set of protocols (TCP/IP)
 Collection of networks with
 no central control
 no central authority
 no common legal oversight or
regulations
 no standard acceptable use policy
 “wild west” atmosphere
What Is The Internet?
The Need for Web Security 7
Why Is Internet Security a
Problem?
 Security not a design
consideration
 Implementing change is
difficult
 Openness makes
machines easy targets
 Increasing complexity
The Need for Web Security 8
Common Network Security
Problems
 Network eavesdropping
 Malicious Data Modification
 Address spoofing (impersonation)
 ‘Man in the Middle’ (interception)
 Denial of Service attacks
 Application layer attacks
The Need for Web Security 9
Security Incidents are Increasing
Sophistication
of Hacker Tools
1990
1980
Technical
Knowledge
Required
High
Low 2000 -from Cisco Systems
The Need for Web Security 10
HACKED WWW HOMEPAGES
11/29/96
CIA
HOMEPAGE
DOJ
HOMEPAGE
USAF HOMEPAGE
The Need for Web Security 11
Problem is Worsening
60000
50000
40000
30000
20000
10000
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
Jerusalem
Tequila
Michelangelo
Good Times
Melissa &
ILOVEYOU
Anna Kournikova
Code Red
Nimda
Badtrans
Source: CERT®
Coordination Center
Carnegie Mellon
The Need for Web Security 13
VIRUSES
Risk Threat Discovered Protection
TROJ_SIRCAM.A New !! Latest DAT
W32.Navidad 11/03/2000 11/06/2000
W95.MTX 8/17/2000 8/28/2000
W32.HLLW.QAZ.A 7/16/2000 7/18/2000
VBS.Stages.A 6/16/2000 6/16/2000
VBS.LoveLetter 5/04/2000 5/05/2000
VBS.Network 2/18/2000 2/18/2000
Wscript.KakWorm 12/27/1999 12/27/1999
W32.Funlove.4099 11/08/1999 11/11/1999
PrettyPark.Worm 6/04/1999 6/04/1999
Happy99.Worm 1/28/1999 1/28/1999
The Need for Web Security 14
Consider that…
 90% of companies detected computer
security breaches in the last 12 months
 59% cited the Internet as the most
frequent origin of attack
 74% acknowledged financial losses
due to computer breaches
 85% detected computer viruses
Source: Computer Security Institute
The Need for Web Security 15
WHO ARE THE OPPONENTS?
 49% are inside employees on
the internal network
 17% come from dial-up (still
inside people)
 34% are from Internet or an
external connection to another
company of some sort
HACKERS
The Need for Web Security 16
HACKER MOTIVATIONS
 Money, profit
 Access to additional resources
 Experimentation and desire to
learn
 “Gang” mentality
 Psychological needs
 Self-gratification
 Personal vengeance
 Emotional issues
 Desire to embarrass the target
The Need for Web Security 17
Internet Security?
Spoofing
Replay Attack
The Need for Web Security 18
What Do People Do When They
Hear All These?
 Take the risks!
 But there are solutions
 Ignoring the situation is not
one of them
The Need for Web Security 19
THE MOST COMMON EXCUSES
 So many people are on the
Internet, I'm just a face in
the crowd. No one would
pick me out.
 I'm busy. I can't become a
security expert--I don't have
time, and it's not important
enough
 No one could possibly be interested in my information
 Anti-virus software slows down my processor speed
too much.
 I don't use anti-virus software because I never open
viruses or e-mail attachments from people I don't
know.
The Need for Web Security 20
SANS Five Worst Security Mistakes
End Users Make
1. Opening unsolicited e-mail attachments without
verifying their source and checking their content
first.
2. Failing to install security patches-especially for
Microsoft Office, Microsoft Internet Explorer, and
Netscape.
3. Installing screen savers or games from unknown
sources.
4. Not making and testing backups.
5. Using a modem while connected through a local
area network.
The Need for Web Security 21
SECURITY COUNTERMEASURES
THREE PHASE APPROACH
PROTECTION
DETECTION
RESPONSE
The Need for Web Security 22
ELEMENTS OF A COMPREHENSIVE
SECURITY PROGRAM
 Have Good Passwords
 Use Good Antiviral Products
 Use Good Cryptography
 Have Good Firewalls
 Have a Backup System
 Audit and Monitor Systems and Networks
 Have Training and Awareness Programs
 Test Your Security Frequently
The Need for Web Security 23
CRYPTOGRAPHY
Necessity is the mother of invention, and
computer networks are the mother of modern
cryptography.
Ronald L. Rivest
 Symmetric Key Cryptography
 Public Key Cryptography
 Digital Signatures
The Need for Web Security 24
Firewall
Visible
IP
Address
Internal
Network
PC Servers
Host
A system or group of systems that enforces an access control
policy between two networks.
The Need for Web Security 25
The Need for Web Security 26
THANK YOU
I have questions…

More Related Content

Similar to need for NS.ppt

network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
KellyIsaac3
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
NavanathDarwante1
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
AboutSSL
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
NitishChoudhary23
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
alinainglis
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Cyber security
Cyber securityCyber security
Cyber security
Krishanu Ghosh
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
MijanurSepai1
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
ME1923SoumyaSouravNa
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
 
Forensics
ForensicsForensics
Forensics
Laura Aviles
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Network security ppt
Network security pptNetwork security ppt
Cyber security
Cyber securityCyber security
Cyber security
MurugesanMurugesan12
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
188
188188
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
ssuser719d6b
 

Similar to need for NS.ppt (20)

network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Cyber security
Cyber securityCyber security
Cyber security
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Hamza
HamzaHamza
Hamza
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Forensics
ForensicsForensics
Forensics
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
188
188188
188
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 

Recently uploaded

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 

Recently uploaded (20)

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 

need for NS.ppt

  • 1. THE NEED FOR NETWORK SECURITY By Lahiru Ratnayake ( MBA(My), BSc(UK), DNIIT(in), IPICT, Dip. Network Eng. )
  • 2. The Need for Web Security 2 PRESENTATION OBJECTIVES  Understand information security services  Be aware of vulnerabilities and threats  Realize why network security is necessary  What are the elements of a comprehensive security program
  • 3. The Need for Web Security 3 TRENDS FOR INFORMATION  More information is being created, stored, processed and communicated using computers and networks  Computers are increasingly interconnected, creating new pathways to information assets  The threats to information are becoming more widespread and more sophisticated  Productivity, competitiveness, are tied to the first two trends  Third trend makes it inevitable that we are increasingly vulnerable to the corruption or exploitation of information INFORMATION IS THE MOST VALUABLE ASSET
  • 4. The Need for Web Security 4 Information Security Services  Confidentiality  Integrity  Authentication  Nonrepudiation  Access Control  Availability
  • 5. The Need for Web Security 5 Information Security Services  Confidentiality  Maintaining the privacy of data  Integrity  Detecting that the data is not tampered with  Authentication  Establishing proof of identity  Nonrepudiation  Ability to prove that the sender actually sent the data  Access Control  Access to information resources are regulated  Availability  Computer assets are available to authorized parties when needed
  • 6. The Need for Web Security 6  Collection of networks that communicate  with a common set of protocols (TCP/IP)  Collection of networks with  no central control  no central authority  no common legal oversight or regulations  no standard acceptable use policy  “wild west” atmosphere What Is The Internet?
  • 7. The Need for Web Security 7 Why Is Internet Security a Problem?  Security not a design consideration  Implementing change is difficult  Openness makes machines easy targets  Increasing complexity
  • 8. The Need for Web Security 8 Common Network Security Problems  Network eavesdropping  Malicious Data Modification  Address spoofing (impersonation)  ‘Man in the Middle’ (interception)  Denial of Service attacks  Application layer attacks
  • 9. The Need for Web Security 9 Security Incidents are Increasing Sophistication of Hacker Tools 1990 1980 Technical Knowledge Required High Low 2000 -from Cisco Systems
  • 10. The Need for Web Security 10 HACKED WWW HOMEPAGES 11/29/96 CIA HOMEPAGE DOJ HOMEPAGE USAF HOMEPAGE
  • 11. The Need for Web Security 11 Problem is Worsening 60000 50000 40000 30000 20000 10000 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 Jerusalem Tequila Michelangelo Good Times Melissa & ILOVEYOU Anna Kournikova Code Red Nimda Badtrans Source: CERT® Coordination Center Carnegie Mellon
  • 12. The Need for Web Security 13 VIRUSES Risk Threat Discovered Protection TROJ_SIRCAM.A New !! Latest DAT W32.Navidad 11/03/2000 11/06/2000 W95.MTX 8/17/2000 8/28/2000 W32.HLLW.QAZ.A 7/16/2000 7/18/2000 VBS.Stages.A 6/16/2000 6/16/2000 VBS.LoveLetter 5/04/2000 5/05/2000 VBS.Network 2/18/2000 2/18/2000 Wscript.KakWorm 12/27/1999 12/27/1999 W32.Funlove.4099 11/08/1999 11/11/1999 PrettyPark.Worm 6/04/1999 6/04/1999 Happy99.Worm 1/28/1999 1/28/1999
  • 13. The Need for Web Security 14 Consider that…  90% of companies detected computer security breaches in the last 12 months  59% cited the Internet as the most frequent origin of attack  74% acknowledged financial losses due to computer breaches  85% detected computer viruses Source: Computer Security Institute
  • 14. The Need for Web Security 15 WHO ARE THE OPPONENTS?  49% are inside employees on the internal network  17% come from dial-up (still inside people)  34% are from Internet or an external connection to another company of some sort HACKERS
  • 15. The Need for Web Security 16 HACKER MOTIVATIONS  Money, profit  Access to additional resources  Experimentation and desire to learn  “Gang” mentality  Psychological needs  Self-gratification  Personal vengeance  Emotional issues  Desire to embarrass the target
  • 16. The Need for Web Security 17 Internet Security? Spoofing Replay Attack
  • 17. The Need for Web Security 18 What Do People Do When They Hear All These?  Take the risks!  But there are solutions  Ignoring the situation is not one of them
  • 18. The Need for Web Security 19 THE MOST COMMON EXCUSES  So many people are on the Internet, I'm just a face in the crowd. No one would pick me out.  I'm busy. I can't become a security expert--I don't have time, and it's not important enough  No one could possibly be interested in my information  Anti-virus software slows down my processor speed too much.  I don't use anti-virus software because I never open viruses or e-mail attachments from people I don't know.
  • 19. The Need for Web Security 20 SANS Five Worst Security Mistakes End Users Make 1. Opening unsolicited e-mail attachments without verifying their source and checking their content first. 2. Failing to install security patches-especially for Microsoft Office, Microsoft Internet Explorer, and Netscape. 3. Installing screen savers or games from unknown sources. 4. Not making and testing backups. 5. Using a modem while connected through a local area network.
  • 20. The Need for Web Security 21 SECURITY COUNTERMEASURES THREE PHASE APPROACH PROTECTION DETECTION RESPONSE
  • 21. The Need for Web Security 22 ELEMENTS OF A COMPREHENSIVE SECURITY PROGRAM  Have Good Passwords  Use Good Antiviral Products  Use Good Cryptography  Have Good Firewalls  Have a Backup System  Audit and Monitor Systems and Networks  Have Training and Awareness Programs  Test Your Security Frequently
  • 22. The Need for Web Security 23 CRYPTOGRAPHY Necessity is the mother of invention, and computer networks are the mother of modern cryptography. Ronald L. Rivest  Symmetric Key Cryptography  Public Key Cryptography  Digital Signatures
  • 23. The Need for Web Security 24 Firewall Visible IP Address Internal Network PC Servers Host A system or group of systems that enforces an access control policy between two networks.
  • 24. The Need for Web Security 25
  • 25. The Need for Web Security 26 THANK YOU I have questions…