Download presentation
Presentation is loading. Please wait.
Published byAlbert Casey Modified over 8 years ago
1
Internet Security TEAMS March 18 th, 2013
2
ISP:Internet Service Provider
3
Internet: interconnected computer networks Hardware: all the devices such as computers, wires, cell phone towers, satellites, smartphones, servers, etc. Protocols: a set of rules that tell the devices how to work. (TCP/IP) Transmission Control Protocol/Internet Protocol
4
Internet Protocol (IP) Delivers data from the host to the destination at the IP address. What is an IP address? http://computer.howstuffworks.com/internet/b asics/question549.htm http://computer.howstuffworks.com/internet/b asics/question549.htm
5
Senario #1. By using countermeasures, engineers can design ways to deter phishing attempts by hackers. Phishing: attempting to acquire information (usernames, passwords, and credit card) by acting as a trustworthy entity on internet. Phishing emails may contain links to websites that are infected with malware. [1] Phishing is typically carried out by e-mail spoofing [2] or instant messaging, [3] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. passwordsmalware [1]e-mail spoofing [2]instant messaging [3]look and feel From Wikipedia
6
10 Ways to Avoid Phishing http://www.phishing.org/scams/avoid- phishing/ http://www.phishing.org/scams/avoid- phishing/
7
One Solution to Spam: CAPTCHA Telling Humans and Computers Apart http://www.pbs.org/wgbh/nova/tech/profile- von-ahn.html http://www.pbs.org/wgbh/nova/tech/profile- von-ahn.html
8
http://computer.howstuffworks.com/internet/b asics/internet.htm http://computer.howstuffworks.com/internet/b asics/internet.htm http://computer.howstuffworks.com/internet/b asics/internet-infrastructure.htm http://computer.howstuffworks.com/internet/b asics/internet-infrastructure.htm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.