Internet Security: BY K.MOHANAKRISHNA-09C21A0435
Internet Security: BY K.MOHANAKRISHNA-09C21A0435
BY K.MOHANAKRISHNA-09C21A0435
are also some disadvantages. All financial dealings are made over the internet, it is estimated that billions of dollars are being exchanged online everyday. This has spawned a new generation of criminals. These cyber criminals develop software called spyware that invades our personal computer and starts gathering information such as our financial or personal details and sends it back to the person who developed the software.
and financial information without you knowing about it can definitely make you cringe in fear. Armed with this information, the cyber criminals may be able to steal money from you. This is why it is very important for you to secure yourself from these crimes not just in the real world, but also in the cyber world as well.
TYPES OF SECURITY
SECURITY
IPSec Protocol
PGP
MIME
S/MIME
PGP for email, and IPsec for the network layer security.
IPSEC PROTOCOL
This protocol is designed to protect communication in
a secure manner using TCP/IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP). These two protocols provide data integrity, data origin authentication, and anti-replay service.
architecture are described in terms of the following functionalities: Security association for policy management and traffic processing Manual and automatic key management for the internet key exchange (IKE) Algorithms for authentication and encryption Security protocols for AH and ESP
a multiple step process, which starts with the message's composition. When the user finishes composing the message and sends it, the message is transformed into a standard format: an RFC 2822 formatted message. Afterwards, the message can be transmitted. Using a network connection, the mail client, referred to as a mail user agent (MUA), connects to a mail transfer agent (MTA) operating on the mail server.
algorithm such 3DES or CAST-128. Email messages can be protected by using cryptography in the following ways: Signing an email message to ensure its integrity and confirm the identity of its sender. Encrypting the communications between mail servers to protect the confidentiality of both the message body and message header.
to Network Virtual Terminal (NVT) ASCII data and delivers it to client's Simple Mail Transfer Protocol(SMTP) to be sent through the Internet. The server SMTP at the receiver's side receives the NVT ASCII data and delivers it to MIME to be transformed back to the original non-ASCII data.
and receive MIME data. S/MIME is not only limited to email but can be used with any transport mechanism that carries MIME data, such Hypertext Transfer Protocol (HTTP).
method that uses a secret key to encrypt a message. This method outputs a MAC value that can be decrypted by the receiver, using the same secret key used by the sender. The Message Authentication Code protects both a message's data integrity as well as its authenticity.
VULNERABILITIES
In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. To be vulnerable, an attacker must have at least one applicable tool or technique that can connect to a system weakness
constant vigilance
auditing
PHISHING
In
the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
PHISHING TECHNIQUES
Phishing techniques
Link manipulation
Filter evasion
Phone phishing
LINK MANIPULATION
Most methods of phishing use some form of technical deception
designed to make a link in an e-mail (and the spoofed website it leads to) appear to belong to the spoofed organization
The following example link, http://en.wikipedia.org/wiki/Genuine,
appears to take you to an article entitled "Genuine"; clicking on it will in fact take you to the article entitled "Deception"
FILTER EVASION
Phishers have used images instead of text to make it harder
PHONE PHISHING
Not all phishing attacks require a fake website
Messages that claimed to be from a bank told users to dial a phone
number regarding problems with their bank accounts Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
refer to other types of malware, including but not limited to adware and spyware programs that do not have the
reproductive ability
HACKING
In common usage, a hacker is a stereotypical person who breaks into
computers and computer networks, either for profit or motivated by the challenge.
HACKING TECHNIQUES
Vulnerability scanner
TECHNIQES
internet We shouldnt accept every file, when we talk our friends such as msn messenger
one firewall to another Firewalls act as the intermediate server between SMTP and HTTP connections
outgoing packets to and from private networks. All the traffic, whether incoming or outgoing, must pass through the firewall; only authorized traffic is allowed to pass through it.
Firewalls create checkpoints between an internal
private network and the public Internet, also known as choke points. Firewalls can create choke points based on IP source and TCP port number.
TYPES OF FIREWALLS
FIREWALLS
Packet Filters
Circuit-Level Gateways
Application-Level Gateways
PACKET FILTERS
Packet filters are one of several different types of
firewalls that process network traffic on a packet-bypacket basis. Their main job is to filter traffic from a remote IP host, so a router is needed to connect the internal network to the Internet. The router is known as a screening router, which screens packets leaving and entering the network.
CIRCUIT-LEVEL GATEWAYS
The circuit-level gateway is a proxy server that
statically defines what traffic will be allowed.This gateway operates at the network level of an OSI model. The main advantage of a proxy server is its ability to provide Network Address Translation (NAT), which can hide the user's IP address from the Internet, effectively protecting all internal information from the Internet.
APPLICATION-LEVEL GATEWAYS
An application-level gateway is a proxy server
operating at the TCP/IP application level. A packet is forwarded only if a connection is established using a known protocol. Application-level gateways are notable for analyzing entire messages rather than individual packets of data when the data are being sent or received
REFERENCES
Gralla, Preston (2007). How the Internet Works.
Que Pub, Indianapolis. ISBN 0-7897-2132-5. http://itcd.hq.nasa.gov/networking-vpn.html Virtual Private Network TCP/IP protocols fourth edition by mc-craw hill companies. www.google.co.in
THANK YOU
QUERIES ??