Presentation is loading. Please wait.

Presentation is loading. Please wait.

Dibyajit dash@PIET,ORISSA Computer Security Email Hacking dibyajit dash@PIET,ORISSA.

Similar presentations


Presentation on theme: "Dibyajit dash@PIET,ORISSA Computer Security Email Hacking dibyajit dash@PIET,ORISSA."— Presentation transcript:

1 dibyajit dash@PIET,ORISSA
Computer Security Hacking dibyajit

2 what exactly HACKING is ?
->Hacking is a process to bypass the security mechanisms of an information system or network. These are two types:- Local hacking: Local hacking is done in local area where we physical access ,like through printer etc. Remote hacking: Remote hacking is done remotely by taking advantages of the vulnerability of the target system. dibyajit

3 Internet Protocol Stack
BitTorrent SMTP HTTP Application Layer RTSP UDP TCP Transport Layer IP Network Layer Ethernet 802.11(b, a, g) / WiFi Link Layer Physical Layer Cables Fiber Optics Radio dibyajit

4 dibyajit dash@PIET,ORISSA
SMTP ->SMTP used to send from sender to recipient’s mail server ->Then use POP3, IMAP or HTTP (Web mail) to get messages from server ->As with many application protocols, SMTP commands are human readable recipient sender SMTP SMTP POP3 dibyajit

5 dibyajit dash@PIET,ORISSA
Electronic Mail Three major components: • user agents • mail servers • simple mail transfer protocol: SMTP User Agent • a.k.a. “mail reader” • composing, editing, reading mail messages • e.g., pine, Outlook, elm, Thunderbird • outgoing, incoming messages stored on server SMTP user agent Mail server user agent Mail server user agent user agent Mail server user agent user agent dibyajit

6 Electronic Mail: mail servers
Mail Servers • mailbox contains incoming messages for user • message queue of outgoing (to be sent) mail messages • SMTP protocol between mail servers to send messages – client: sending mail server – “server”: receiving mail server SMTP Mail server Mail server Mail server dibyajit

7 Sending Server to Receiving Server
• three phases of transfer – handshaking (greeting) – transfer of messages – closure • command/response interaction – commands: ASCII text: HELO, MAIL, RCPT, DATA, QUIT, etc. – response: status code and phrase • messages must be in 7-bit ASCII dibyajit

8 dibyajit dash@PIET,ORISSA
Mail message format RFC 822: standard for text message format: • header lines, e.g., – To: – From: – Subject: • body – the “message”, ASCII characters only blank line header body dibyajit

9 More mail access protocols
• SMTP: delivery/storage to receiver’s server • Mail access protocol: retrieval from server – POP: Post Office Protocol [RFC 1939] • authorization (agent <-->server) and download – IMAP: Internet Mail Access Protocol [RFC 1730] • more features (more complex) • manipulation of stored messages on server – HTTP: Hotmail , Yahoo! Mail, etc. dibyajit

10 dibyajit dash@PIET,ORISSA
What is Security? Security is the protection of assets. The three main aspects are: prevention detection re-action dibyajit

11 Some differences between traditional security and information security
Information can be stolen - but you still have it Confidential information may be copied and sold - but the theft might not be detected The criminals may be on the other side of the world dibyajit

12 dibyajit dash@PIET,ORISSA
Computer Security deals with the prevention and detection of unauthorised actions by users of a computer system. dibyajit

13 dibyajit dash@PIET,ORISSA
There is no single definition of security What features should a computer security system provide? dibyajit

14 dibyajit dash@PIET,ORISSA
Confidentiality The prevention of unauthorized disclosure of information. Confidentiality is keeping information secret or private. Confidentiality might be important for military, business or personal reasons. dibyajit

15 dibyajit dash@PIET,ORISSA
Security systems A security system is not just a computer package. It also requires security conscious personnel who respect the procedures and their role in the system. Conversely, a good security system should not rely on personnel having security expertise. dibyajit

16 dibyajit dash@PIET,ORISSA
Risk Analysis The disadvantages of a security system are that they are time-consuming, costly, and impede management and smooth running of the organization. Risk analysis is the study of the cost of a particular system against the benefits of the system. dibyajit

17 Designing a Security System
There are a number of design considerations: Does the system focus on the data, operations or the users of the system? What level should the security system operate from? Should it be at the level of hardware, operating system or applications package? Should it be simple or sophisticated? In a distributed system, should the security be centralised or spread? How do you secure the levels below the level of the security system? dibyajit

18 dibyajit dash@PIET,ORISSA
Summary By now you should have some idea about Why we need computer security (prevention, detection and re-action) What a computer security system does (confidentiality, integrity, availability, non-repudiation, authentication, access control, accountability) What computer security exerts do (design, implement and evaluate security systems) dibyajit

19 dibyajit dash@PIET,ORISSA
Thank You… dibyajit

20 dibyajit dash@PIET,ORISSA


Download ppt "Dibyajit dash@PIET,ORISSA Computer Security Email Hacking dibyajit dash@PIET,ORISSA."

Similar presentations


Ads by Google