INTERNET
INTERNET
INTERNET SECURITY
NAME : G . ANUDEEP
HALL TICKET NO : 21X01A0516
Under the Guidance of
DR . P. Dileep Kumar Reddy Ph.D
professor & Dean-IPR
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
NARSIMHA REDDY ENGINEERING COLLEGE(UGG-AUTONOMOUS)
(Approved by AICTE Affiliaited to JNTUH, Accredited by NBA & NCC With A Grade)
Maisammaguda (V),Kompally,Secendrabad,Telengana-500100
2024-2025
INTERNET
SECURITY
SOURCE OF INFORMATION
CONTENTS
• Introduction
The average user will create passwords to fool human hackers. This used to be a smart way
to fight data theft. A criminal would use any information they could find about you and use
common patterns in passwords to guess yours. You used to be able to just switch up the
characters in your passwords and “Tr1Ck” your way into security. But hackers took notice
To protect yourself against the newest hacking methods, you'll need powerful passwords.
If you're wondering. "how strong is my password?" here are some tips to help you create a
strong password:
Is it hard to guess? You should avoid sequences (“12345” “qwerty”) because these can
be brute force hacked in seconds. Also, avoid common words (“password1”) for the same
reason.
TWO FACTOR AUTHENTICATION
Implementing two-factor authentication (2FA)
adds an extra layer of security. By requiring a
second form of verification, such as a text
message or authentication app, users can better
protect their accounts from breaches and
unauthorized access
There are several ways in which someone can be authenticated using more than one authentication
method. Currently, most authentication methods rely on knowledge factors, such as a traditional password,
while two-factor authentication methods add either a possession factor or an inherence factor.
Authentication factors are:
Emerging technologies like AI and machine learning are transforming internet security.
These technologies can analyze vast amounts of data to detect anomalies and potential
threats, providing organizations with advanced tools to enhance their security posture.
IOT devices are becoming more prevalent in homes and businesses, and they are
often vulnerable to cyberattacks. IoT security technologies include encryption, access
controls, and monitoring to protect IoT devices and the data they collect.
The primary types of internet security
includes:
• email security
• Firewalls
• browser selection
• URL filtering
n Web Application Security Project (OWASP). (n.d.). OWASP Top Ten. Retrieved from
://owasp.org/www-project-top-ten/
THANK YOU
ANY QUERIES