ONLINE SECURE DATA SERVICE PRESENTED BY 20-08-2009 SREEJU,S7 CSE
CONTENTS INTRODUCTION. EXISTING SYSTEM. PROPOSED SYSTEM. SERVICES PROVIDED. ADVANTAGES AND DISADVANTAGES FUTURE ENHANCEMENTS CONCLUSION. 20-08-2009 SREEJU,S7 CSE
INTRODUCTION Its examines the proliferation of threats to Internet consumer privacy and security and their adverse impact access appropriate information in a more secure and precise manner. Some of the threats are real, others are fears based on misconceptions. 20-08-2009 SREEJU,S7 CSE
EXISTING SYSTEM Send mails or Receive mails without any security Not Reliable Data transfer. Any Hacker read mails ie, Send or Received. 20-08-2009 SREEJU,S7 CSE
PROPOSED SYSTEM File Encryption & Decryption. E-mail Encryption & Decryption. File compression & File Decompression. Provide Data Authentication & Integrity. Provide both Online Store & Forward Technology. 20-08-2009 SREEJU,S7 CSE
LOCAL FILE The files in the client machine can be encrypted or decrypted and can be stored either locally or in the server itself. NETWORK FILE The files from any of the machine in the network can be stored either locally or in the server itself. 20-08-2009 SREEJU,S7 CSE
VIRTUAL DIRECTORY Provide a consolidated view of user identity without having to construct an entire directory infrastructure Receives queries and directs them to the appropriate data sources. When the user data comes back, the directory presents the data to the enterprise application Technology ideal for consolidating data stored in a distributed environment. 20-08-2009 SREEJU,S7 CSE
ADVANTAGES OF VIRTUAL DIRECTORIES Faster deployment by avoiding synchronization Influence in existing investments in security and high- availability for reliable data stores Provide application specific views of identity data Allow a single view of identity data without violating internal or external regulations prevent denial of service attacks on the primary data- storage Changes made in authoritative sources are reflected in real-time 20-08-2009 SREEJU,S7 CSE
FILE ENCRYPTION AND DECRYPTION Sensitive information sent over the internet by encrypting the data first. Useful for storing private documents and files on PC Works with both text information and files Generates random passwords of any length. Helps to keep passwords and associated information in safe and secure manner Invisible mode feature present to hide the program from task bar and icons from menu 20-08-2009 SREEJU,S7 CSE
E-MAIL ENCRYPTION/DECRYPTION vendors / dealer offer products that encrypt e-mail messages, are easy to use and provide the ability to send private data, including e-mail attachments work by sending a link to the recipient, who then clicks on it and logs on to a secure e-mail server, which the organization either owns or outsource to an appropriate vendor / dealer . non-Web-based technology that allows transportation of secure messages from one person or organization to another, the most common of which is public key infrastructure (PKI) 20-08-2009 SREEJU,S7 CSE
FILE COMPRESSION AND DECOMPRESSION File compression reduces the size of a file by minimizing redundant data. Takes an existing file or files and produce a file or files that are compressed versions of the originals. Application can only operate on such files with the assistance of a file compression library Editing is typically not supported, and seeking is limited if supported at all. 20-08-2009 SREEJU,S7 CSE
WHY COMPRESS FILES? These utilities allow two or more related files to be combined into a single file. Makes it possible to transfer multiple files with a single command. It reduce the size of a file (or group of files). Take up less storage space on the host and less time to transfer over the network. Used to convert binary files to an encoded format using only ASCII characters. possible to transfer binary files via electronic mail other transport method that does not ordinarily support binary data. 20-08-2009 SREEJU,S7 CSE
DATA AUTHENTICATION Allows a receiver to verify that the data really was sent by the claimed sender. In the two-party communication case, data authentication can be achieved through a purely symmetric mechanism: The sender and the receiver share a secret key to compute a message authentication code (MAC) of all communicated data. When a message with a correct MAC arrives, the receiver knows that it must have been sent by the sender 20-08-2009 SREEJU,S7 CSE
DATA INTEGRITY Refers to the validity of data. Data integrity can be affected in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another Software bugs or viruses Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods 20-08-2009 SREEJU,S7 CSE
THREATS TO DATA INTEGRITY Backing up data regularly Controlling access to data via security mechanisms Designing user interfaces that prevent the input of invalid data Using error detection and correction software when transmitting data 20-08-2009 SREEJU,S7 CSE
STORE AND FORWARD The temporary storage of a message for transmission to its destination at a later time. Store and forward techniques allow for routing over networks that are not accessible at all times. 20-08-2009 SREEJU,S7 CSE
ADVANTAGES AND DISADVANTAGES Savings Global Accessible Safety Disadvantages: Less Control Closure of Online Company 20-08-2009 SREEJU,S7 CSE
THE FUTURE OF INTERNET SECURITY Legacy Systems Threat Consciousness Operating Systems Security Tools The Cost of Storage The Internet Cryptographic Methods 20-08-2009 SREEJU,S7 CSE
CONCLUSION Traditional security measures such as password and identification cards cannot satisfy every security requirement. Security and privacy are two major issues that continue to raise concerns with all those involved with the Internet. Internet is a different area than most of us are used to dealing with in our daily lives. One of the things that make it so difficult is that it is always "on" -- the Internet never sleeps. 20-08-2009 SREEJU,S7 CSE
Thank You 20-08-2009 SREEJU,S7 CSE