Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Chapter 7 Operating Systems and Utility Programs.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Video Following is a video of what can happen if you don’t update your security settings! security.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Day 19. Security Tools Firewalls –Host Based –Network based IDS/IPS –Host Based –Network based –Signature based detection –Anomaly based detection Anti.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Viruses.
Chapter 7: Using Windows Servers to Share Information.
1 Guide to Network Defense and Countermeasures Chapter 2.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
D. Beecroft Fremont High School VIRUSES.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Types of Electronic Infection
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Computer security By Isabelle Cooper.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
NetTech Solutions Protecting the Computer Lesson 10.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Chapter 7: Using Windows Servers
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Web Servers Security: What You Should Know

The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with Internet users. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with Internet users. Many companies use the web to expand their business and increase profit margins. Many companies use the web to expand their business and increase profit margins.

Without security it is very possible and probable that intruders can change the contents of your web page. Without security it is very possible and probable that intruders can change the contents of your web page. If host for the web server is compromised you may find that the content on your web page is altered If host for the web server is compromised you may find that the content on your web page is altered Intruders can also have access to confidential information. Intruders can also have access to confidential information.

Without security you show that your business is unprofessional and inexperienced. And ultimately your business may fail on the World Wide Web. Without security you show that your business is unprofessional and inexperienced. And ultimately your business may fail on the World Wide Web.

Managers and top officials rushing to establish a Web presence without considering security issues. Managers and top officials rushing to establish a Web presence without considering security issues. Companies are not willing to spend time and capital to plan and implement secure sites. Companies are not willing to spend time and capital to plan and implement secure sites.

Denial Of Service It is important to protect your server from Denial-of Service attacks. It is important to protect your server from Denial-of Service attacks. You can protect yourself by installing a filter on the network before a stream of information reaches your sites web server. You can protect yourself by installing a filter on the network before a stream of information reaches your sites web server.

Viruses A computer virus is a program designed to spread itself by first infecting executable files or the system areas of hard and floppy disks and then making copies of itself. A computer virus is a program designed to spread itself by first infecting executable files or the system areas of hard and floppy disks and then making copies of itself.

Examples of Viruses Melissa Virus (forced Microsoft and a number of other very large companies to completely turn off their systems until the virus could be contained ) Melissa Virus (forced Microsoft and a number of other very large companies to completely turn off their systems until the virus could be contained ) ILOVEYOU letter (comes in an note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book ) ILOVEYOU letter (comes in an note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book )

Firewall Considered a first line of defense in protecting private information. Considered a first line of defense in protecting private information.

Virtual Private Network (VPN) Private network that uses the Internet to connect remote sites or users together. Private network that uses the Internet to connect remote sites or users together.

Encryption Encryption is a process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Encryption is a process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Symmetric-key Symmetric-key Public-key encryption Public-key encryption

Intrusion detection system (IDS) Specialized software product that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees. There are two types of IDSs. Specialized software product that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees. There are two types of IDSs. Host-based IDS Host-based IDS Network-based IDS Network-based IDS