Year 10 Network Security.

Slides:



Advertisements
Similar presentations
INTRANET MAIL SERVER (DESIGN OF SMTP and POP3)
Advertisements

Introduction to Your Name Goes Here
COMP101 – Exploring Multimedia and Internet Computing LA1A (Wed 11:00 – 12:50) TA: Jackie Lo.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Mail Server Setup MAIL SERVER SETUP.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
© 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet-Based Client Access
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Wireless and Security CSCI 5857: Encoding and Encryption.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
and its Protocols Hina Patel TCM
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
TCP/IP (Transmission Control Protocol / Internet Protocol)
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
Mr C Johnston ICT Teacher G055 - Lecture 10 Network Protocols.
By Toby Reed.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
Implementing POP3 and IMAP4 Using Dovecot AfNOG 2016 Scalable Internet Services (SS-E) Gaborone, Botswana Presented by Michuki Mwangi (Built on materials.
Mail Server Mail is just a message in any form sends from sender to receiver. Mail Server is a computerized system that is equivalent to virtual post office.
Network Programming 10- SMTP-POP3
Dibyajit Computer Security Hacking dibyajit
Application layer tcp/ip
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
Introduction to Your Name Goes Here
Working at a Small-to-Medium Business or ISP – Chapter 7
CS 465 Secure Last Updated: Nov 30, 2017.
CIW Lesson 7 Part A Name: _______________________________________
Implementing POP3 and IMAP4 Using Dovecot
CompTIA IT Fundamentals Study Guide (FC0-U51)
14-мавзу. Cookie, сеанс, FTP и технологиялари
Working at a Small-to-Medium Business or ISP – Chapter 7
Topologies, Protocols and Layers
Topic 5: Communication and the Internet
Working at a Small-to-Medium Business or ISP – Chapter 7
Introduction to Your Name Goes Here
Internet Protocols IP: Internet Protocol
Protocols 2 Key Revision Points.
Protocol Application TCP/IP Layer Model
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Presentation transcript:

Year 10 Network Security

Starter Email Protocols Without looking in your books what do the following stand for and do? SMTP POP3 IMAP Protocol Description SMTP: Simple Mail Transfer Protocol Used the send emails. Details the format of the email should be sent POP3: Post Office Protocol DOWNLOADS emails from the email server. This means that they are deleted from the server IMAP: Internet Message Access Protocol Allows you to access your email from multiple different clients. Stays on the server until they are deleted.

Learning Objectives Understand why network security is important Understand techniques to validate and authenticate users Understand security issues with cloud storage Describe some common cyber attacks and ways to protect against them

Network Security This can range from protecting your self against a “hack” or this can be on a huge scale, such as the Play Station Network hack.

Challenge As a group you need to teach the class a specific topic of Network Security. You need to prepare a PowerPoint and hand-outs/worksheets. You have 30 mins to prepare and then up to 7 mins to present.

Groups Importance of Security (with examples) Conner – Matthew – Mika Authentication and Validation Olly – Elliot – Chloe Methods of Security Ib – Jack – Arman - Mark Cloud Storage Ruth – Fiona – Jacon R Examples of “Hacking” Jacob A – Billie – Joe – Doug

Plenary Why is Network Security important? Identify 3 security methods What are some of the issues when using the Cloud?