SAMET KARTAL
No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep it safe and secret. At this technology age almost all information is sharing with internet For this reason ‘’ Network Security’’ is the most important topic for the internet users
Someone wants to get your s. Hackers wants to get your credit card numbers. Sometimes someone wants to get your special information Sometimes someone wants to get your companies project Sometime some countries get some war plans from enemy country Etc….
?
A firewall is a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider.
Encrypting and decrypting event is happening is this layer Hided with some rules data is going to another machine and opening to there
Firewalls and some anti-virus programes are detecting package that harmfull or not
Transport Layer Security (TLS) which is frequently referred to as 'SSL', are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols are in widespread use in applications such as web browsing, , internet faxing, instant messaging, and voice-over-IP (VoIP). Major web sites use TLS to secure all communications between their servers and web browsers.
After passing all layers at last data will be shown on computer after authentication Cryptography is using on this layer
Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it Simply you will change your data with some rules and make it impossible to can be seen without your changing rules
Everything will encrypting according to your algorithmes and sending other computer If it has your algorithme key, data will be decrypted
Phishing Spyware Virus Worms
Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in , IM or other communication channels
Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data
A computer virus is a program to cause damage, steal personal information, modify data, send , display messages, or some combination of these actions. When the virus is executed, it spreads by copying itself into or over data files, programs, boot sector of a computer's hard drive, or potentially anything else writable. Virus writers use detailed knowledge of security vulnerebilities to gain access to a host's computer.
A computer worm is a self-replicating computer program that penetrates an operating system with the intent of spreading malicious code. Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via . Worms can also install backdoors on computers.
guvenligi/bilgisayar-guvenligini-tehdit-eden-temel- nedenler/ guvenligi/bilgisayar-guvenligini-tehdit-eden-temel- nedenler/ nedir-ve-nasil-siniflandirilir/ nedir-ve-nasil-siniflandirilir/ r_security r_security
n/cryptography n/cryptography k k