Internet Security issues - PowerPoint PPT Presentation

1 / 22
About This Presentation
Title:

Internet Security issues

Description:

Share scam tips and stories with other AOL members. ... Check for digital certificate. Verify that organization is legitimate. Protecting Your Privacy ... – PowerPoint PPT presentation

Number of Views:75
Avg rating:3.0/5.0
Slides: 23
Provided by: msun7
Category:

less

Transcript and Presenter's Notes

Title: Internet Security issues


1
Internet Security issues
  • What looms in future ?
  • Malathy Sundaram
  • John Patrick Cullen

2
Firewall
  • A firewall is a component placed between computer
    and networks to help eliminate undesirable access
    by the outside
  • Privacy Versus Security
  • Security Confidentiality, integrity and
    availability of data
  • Privacy inadvertent disclosure of information
  • Usually result of security breakdown in
    confidentiality

3
Intrusions by an employer to control employee use
of the computers and internet
  • Is the email on a company computer personal and
    private Can an employer read all personal emails
    sent on the company computers?
  • Is the communication on the computer in the email
    a private protected communication or does it
    belong to the employer? Store only information we
    provide

4
Internet Security Intrusions by the government
  • Patriot Act Activities- Anti-terrorism or
    Sacrifice of Individual Civil Rights?
  • Can the FBI read all internet connected computer
    related communications at any time by issuance of
    a letter to the employer without going to a judge
    for permission?

5
Invasions for destruction by hackers
  • Viruses arrive in email. The destroyer arrives as
    a separate program. The email carries a program
    and awaits activation orders and when activated
    destroys according to its programmed plan

6
Worms as attackers of internal systems
  • Worms destroy data on the receiving computer
  • Worms can formulate so many emails to be sent out
    that it creates a zombie, a non-functioning
    computer

7
Security Tool to Combat Improper Users of the
internet
  • Radio Frequency Identification - RFID
  • Eye Pupil Analysis- Possible changes in addition
    to passwords for access to company computers

8
Protection from Intrusions ID Thefts
  • Place a firewall between your PC and hackers
    trying to steal your data
  • If you spot fraud online, file a complaint with
    the FBI
  • Share scam tips and stories with other AOL
    members.
  • Don't click a link in an e-mail message to visit
    a Web site.

9
Cookies.
  • Remembers the settings or track surfing habits
  • Third party cookies can circumvent security
  • Store only information we provide
  • Cookies leave a record of the computer sites
    visited

10
Security and E-Commerce
  • Information transferred via routing packets can
    be intercepted
  • Scams and Fraud
  • Company can track purchase
  • Always do business with SET or SSL
  • Verify that encryption is used
  • Check for digital certificate
  • Verify that organization is legitimate

11
Protecting Your Privacy
  • Avoid filling online information
  • Check with the Better Business Bureau
  • Always look for symbol Truste
  • Disable auto complete
  • Disable the cookies
  • Disable personal information

12
Top 10 common mistakes
  • Failing to understand exposure to attacks on
    information and infrastructure
  • Failing to understand and address the
    relationship between network and operating system
    security
  • Architecting a system that issues too many false
    alarms
  • Inadequately addressing the risk of security
    breaches from within own organization

13
Top 10 common mistakes contd
  • Presuming the one line of defense is adequate
  • Insufficient understanding of technology build
    security that apply the problem
  • Think enablement as opposed to disablement
  • Forgetting security is part of lifecycle
  • Over looking physical aspects of security
  • Relying on excessively weak trust or
    authentication mechanism

14
Future of Internet security
  • Attackers
  • Threats
  • Platforms
  • Solutions
  • Future, there will be a greater dependence
    control of critical infrastructure (power
    generation, communications, transportation,
    etc.). attact will in internet will be greater.

15
Future of internet security cont
  • the total number of new, documented
    vulnerabilities in 2002 was 81.5 higher than in
    2001.
  • Three blended threats (namely Klez, Bugbear, and
    Opaserv) were the source of 80 percent of
    malicious code submissions to Symantec Security
    Response over the previous six months

16
Future of Internet security contd..
  • Increasing number of threats Targeted at
    disabling security software
  • retro viruses that attack antivirus software by
    deleting virus definition tables or memory
    resident scanners
  • Windows has been the primary conduit for Internet
    security attacks
  • emerging platforms that could become targets

17
Future of Internet security contd..
  • Simple Object Access Protocol (SOAP) typically
    runs on top of HTTP can inherit any http bugs
  • IM systems lack encryption capabilities, and most
    have features to bypass traditional corporate
    firewalls
  • the possibility of an "over-the-air" Code
    Red-type threat
  • significant number of unauthorized corporate
    wireless networks will be exploited by hackers

18
Future of Internet security contd..
  • Broadband Code Red to tens of millions of home
    machines
  • Peer-to-peer networks - circumvent security by
    decentralizing security
  • Linux Slapper worm emerged and caused
    significant outbreaks
  • Grid computing - their inherent connectedness and
    distributed model
  • significant number of unauthorized corporate
    wireless networks will be exploited by hackers
  • Online gaming - "always on" like IM is more
    vulnerable to attacks

19
Tips
  • http//www.grc.com - the site will perform a
    benign probe of your PCs ports communications
    gateways to reveal whether vulnerable for attack
    or not
  • http//www.kidmail.net
  • A handy web interface lets you see the email
    before kids do

20
Suggestions
  • organizations must employ a more holistic
    strategy to incorporate the core objectives of a
    comprehensive security environment.
  • the infrastructure needs integrated security
    solutions to provide protection at all tiers
  • To maintain continuous service frameworks that
    incorporate both technology and hands-on
    expertise
  • Finally, organizations will have to bring their
    alerting, protection and response systems
    together under a central, open security
    management system to ensure both reactive and
    proactive protection .

21
references
  • Computer Privacy annoyances Dan Tynan
  • Protect yourself online Mathew Danda
  • Future source http//www.extremetech.com/artic
    le2/0,1697,1164545,00.asp
  • http//thomas.loc.gov/cgi-bin/query/F?c1031./tem
    p/c103UTyNEue4546
  • http//www.advancedimagingpro.com/article/article.
    jsp?siteSection34id2012

22
  • Thank you !
  • Have a safe surfing !
Write a Comment
User Comments (0)
About PowerShow.com