Lesson 20. E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002.

Slides:



Advertisements
Similar presentations
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Access Control Chapter 3 Part 5 Pages 248 to 252.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lesson 19: Configuring Windows Firewall
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Bullet-Proofing Your Wireless Router By Steve Janss.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Security Advice Georgie Pepper Campsmount Acadamy.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Computer Security, Ethics and Privacy Chapter 11.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Course ILT Printer and virus management Unit objectives Perform various printing tasks, including installing printer drivers, printing documents, monitoring.
Computer security By Shreya Houji. VirusesViruses.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewalls Julie Petrusa S.A.M. Matiur Rahman Carlo Mormina.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
NetTech Solutions Protecting the Computer Lesson 10.
A Network Security -Firewall Bruce Turin.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Brooke Thorpe COSC 101-Section 7. Overview What is a Firewall? System designed to prevent unauthorized access to or from a private network Will check.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Ch 21. Computer Network Firewall. What is firewall? Hardware and Software Installed in a computer to protect only one computer.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Managing Windows Security
Firewall Techniques Matt Cupp.
What is a Firewall?.
Backdoor Attacks.
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Answer the questions to reveal the blocks and guess the picture.
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Operating Systems Security
Fire-wall.
Maintaining State in a Stateless System
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Lesson 20

E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002

Back Doors And Trojan Horses

Virus Protection Install anti-virus software – McAfee, Norton, Dr. Solomon, Symantec Downloading of plug-ins from the internet be avoided Downloading of plug-ins should be done from the vendor’s official website Newly obtained disks, programs or files should be scanned for viruses before use Installation of a firewall may also reduce the risk of virus infiltration

Outside Attacks On A Network Eavesdropping/Sniffing/Snooping – ability to monitor network traffic using some kind of network-monitoring software Password Attacks – attacker is able to gain access to the network and gather information such as valid users, computer names, resources – can lead to modification, deletion or rerouting of network data IP Address Spoofing – attacker assumes a legal IP address and gain access to the network Man-in-the–middle attacks – attacker is able to monitor, capture and control data between sending and receiving devices

Firewalls A combination of hardware and software that sits between the internet and the internal network Protects a network from outside attack A firewall examines data leaving and entering the internal network and is able to filter the data according to the specified rules

Internet Organization network Fire wall

Types of Firewalls Packet Filter Firewall Circuit-Level Firewall Application-Gateway Firewall