0% found this document useful (0 votes)
20 views

INTERNET

Uploaded by

elizabethkottada
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

INTERNET

Uploaded by

elizabethkottada
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

A Technical Seminar Report On

INTERNET SECURITY
NAME : G . ANUDEEP
HALL TICKET NO : 21X01A0516
Under the Guidance of
DR . P. Dileep Kumar Reddy Ph.D
professor & Dean-IPR
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
NARSIMHA REDDY ENGINEERING COLLEGE(UGG-AUTONOMOUS)
(Approved by AICTE Affiliaited to JNTUH, Accredited by NBA & NCC With A Grade)
Maisammaguda (V),Kompally,Secendrabad,Telengana-500100

2024-2025
INTERNET
SECURITY
SOURCE OF INFORMATION
CONTENTS
• Introduction

• Understanding Cyber Threats


• Importance of the strong passwords
• Two Factor Authentication
• Data Encryption Techniques
• Safe Browsing Practices
• Emerging Technologies in Security
• Conclusion
• References
Introduction to Internet Security
In today's digital age, securing our online presence is crucial.
This presentation will explore a comprehensive approach to
fortifying digital boundaries, focusing on strategies to protect
against threats and vulnerabilities. Join us as we delve into the
essential components of internet security.
Understanding Cyber Threats
 Cyber threats are evolving rapidly, with
malware, phishing, and ransomware being some
of the most common. Understanding these
threats is the first step in developing a robust
defense strategy. Awareness is key to preventing
attacks and protecting sensitive information.
 Malware (malicious software) is software that
has been specifically designed to perform
malicious tasks on a device or network, such as
corrupting data or taking control of a system.
 Increasing global connectivity, usage of cloud
services, and outsourcing mean a much larger
attack vector than in the past. Third-party risk
and fourth-party risk is on the rise, making
Third-Party Risk Management,
Vendor Risk Management, and
cyber security risk management all the more
important for reducing the risk of third-party
data breaches.
Importance of the strong
passwords
 Using strong passwords is a fundamental aspect of internet security. A strong password should
be at least 12 characters long, combining letters, numbers, and symbols. Regularly updating
passwords can significantly reduce the risk of unauthorized access.

 The average user will create passwords to fool human hackers. This used to be a smart way
to fight data theft. A criminal would use any information they could find about you and use
common patterns in passwords to guess yours. You used to be able to just switch up the
characters in your passwords and “Tr1Ck” your way into security. But hackers took notice

 To protect yourself against the newest hacking methods, you'll need powerful passwords.
If you're wondering. "how strong is my password?" here are some tips to help you create a
strong password:

 Is it hard to guess? You should avoid sequences (“12345” “qwerty”) because these can
be brute force hacked in seconds. Also, avoid common words (“password1”) for the same
reason.
TWO FACTOR AUTHENTICATION
 Implementing two-factor authentication (2FA)
adds an extra layer of security. By requiring a
second form of verification, such as a text
message or authentication app, users can better
protect their accounts from breaches and
unauthorized access

 Keeping software up to date is vital for security.


Regular updates patch vulnerabilities that
cybercriminals exploit. Enable automatic
updates whenever possible to ensure your
systems are protected against the latest threats.
 A firewall acts as a barrier between your network and potential threats. It monitors incoming and
outgoing traffic, blocking harmful data packets. Proper configuration of firewalls is essential for
maintaining a secure digital environment.

 There are several ways in which someone can be authenticated using more than one authentication
method. Currently, most authentication methods rely on knowledge factors, such as a traditional password,
while two-factor authentication methods add either a possession factor or an inherence factor.
 Authentication factors are:

• A knowledge factor is something the user knows, such as a


password, a personal identification number (PIN) or some other
type of shared secret.

• A possession factor is something the user has, such as an ID


card, a security token, a cellphone, a mobile device or a
smartphone app, to approve authentication requests.
Data Encryption Techniques

 Data encryption is crucial for protecting sensitive information. By


converting data into a coded format, it becomes unreadable to
unauthorized users. Implementing encryption techniques ensures
that your data remains secure during transmission and storage.

 The data that needs to be encrypted is termed plaintext or


cleartext. The plaintext needs to be passed via some
encryption algorithms, which are basically mathematical
calculations to be done on raw information. There are multiple
encryption algorithms, each of which differs by application and
security index
Safe Browsing Practices
 Practicing safe browsing habits can significantly reduce the risk of cyber threats.
Avoid clicking on suspicious links, and always verify the URL before entering
sensitive information. Awareness of safe browsing practices is essential for internet
security.
 The internet is a vast and wonderful place full of
information, entertainment, and opportunity.
However, with all that the internet has to offer,
it can also be a dangerous place if you’re not
careful; Especially in recent years, with the
exponential increase in cybersecurity threats
and breaches.

 Malicious emails, viruses, and inappropriate


content are only a few of the potential threats to
prevent when browsing online. So whether
you’re a first-time web surfer or an experienced
pro, read on for some well-tested tips on how to
browse the internet safely!
Emerging Technologies in Security
 The world of cybersecurity is constantly evolving, and staying ahead of the curve is
essential for protecting sensitive information and preventing cyberattacks. With new
technologies emerging all the time, it can be challenging to keep up with the latest trends
and developments. In this blog post, we will explore some of the newest cybersecurity
technologies and how they can help keep your data safe.

 Emerging technologies like AI and machine learning are transforming internet security.
These technologies can analyze vast amounts of data to detect anomalies and potential
threats, providing organizations with advanced tools to enhance their security posture.

 IOT devices are becoming more prevalent in homes and businesses, and they are
often vulnerable to cyberattacks. IoT security technologies include encryption, access
controls, and monitoring to protect IoT devices and the data they collect.
The primary types of internet security
includes:
• email security

• Firewalls

• multi-factor authentication (MFA)

• browser selection

• URL filtering

• data loss prevention


CONCLUSION
 In conclusion, fortifying digital boundaries requires a
comprehensive approach that encompasses various
strategies, from strong passwords to user education.
By implementing these measures, we can significantly
enhance our internet security and protect our digital
assets .
REFERENCES :
al Institute of Standards and Technology (NIST). (n.d.). Cybersecurity Framework. Retr
ww.nist.gov/cyberframework

n Web Application Security Project (OWASP). (n.d.). OWASP Top Ten. Retrieved from
://owasp.org/www-project-top-ten/
THANK YOU
ANY QUERIES

You might also like