Download presentation
Presentation is loading. Please wait.
Published byLionel Hutchinson Modified over 8 years ago
2
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram
3
The Need for Web Security2 PRESENTATION OBJECTIVES Understand information security services Be aware of vulnerabilities and threats Realize why network security is necessary What are the elements of a comprehensive security program
4
The Need for Web Security3 TRENDS FOR INFORMATION More information is being created, stored, processed and communicated using computers and networks Computers are increasingly interconnected, creating new pathways to information assets The threats to information are becoming more widespread and more sophisticated Productivity, competitiveness, are tied to the first two trends Third trend makes it inevitable that we are increasingly vulnerable to the corruption or exploitation of information INFORMATION IS THE MOST VALUABLE ASSET
5
The Need for Web Security4 Information Security Services Confidentiality Integrity Authentication Nonrepudiation Access Control Availability
6
The Need for Web Security5 Information Security Services Confidentiality Maintaining the privacy of data Integrity Detecting that the data is not tampered with Authentication Establishing proof of identity Nonrepudiation Ability to prove that the sender actually sent the data Access Control Access to information resources are regulated Availability Computer assets are available to authorized parties when needed SERVICES
7
The Need for Web Security6 Collection of networks that communicate with a common set of protocols (TCP/IP) Collection of networks with no central control no central authority no common legal oversight or regulations no standard acceptable use policy “wild west” atmosphere What Is The Internet?
8
The Need for Web Security7 Why Is Internet Security a Problem? Security not a design consideration Implementing change is difficult Openness makes machines easy targets Increasing complexity
9
The Need for Web Security8 Common Network Security Problems Network eavesdropping Malicious Data Modification Address spoofing (impersonation) ‘Man in the Middle’ (interception) Denial of Service attacks Application layer attacks
10
The Need for Web Security9 VIRUSES VIRUSES Risk ThreatDiscoveredProtection TROJ_SIRCAM.ANew !!Latest DAT W32.Navidad11/03/200011/06/2000 W95.MTX8/17/20008/28/2000 W32.HLLW.QAZ.A7/16/20007/18/2000 VBS.Stages.A6/16/20006/16/2000 VBS.LoveLetter5/04/20005/05/2000 VBS.Network2/18/20002/18/2000 Wscript.KakWorm12/27/199912/27/1999 W32.Funlove.409911/08/199911/11/1999 PrettyPark.Worm6/04/19996/04/1999 Happy99.Worm1/28/19991/28/1999
11
The Need for Web Security10 Consider that… 90% of companies detected computer security breaches in the last 12 months 59% cited the Internet as the most frequent origin of attack 74% acknowledged financial losses due to computer breaches 85% detected computer viruses Source: Computer Security Institute
12
The Need for Web Security11 WHO ARE THE OPPONENTS? 49% are inside employees on the internal network 17% come from dial-up (still inside people) 34% are from Internet or an external connection to another company of some sort HACKERS
13
The Need for Web Security12 THE MOST COMMON EXCUSES So many people are on the Internet, I'm just a face in the crowd. No one would pick me out. I'm busy. I can't become a security expert--I don't have time, and it's not important enough No one could possibly be interested in my information Anti-virus software slows down my processor speed too much. I don't use anti-virus software because I never open viruses or e-mail attachments from people I don't know.
14
The Need for Web Security13 ELEMENTS OF A COMPREHENSIVE SECURITY PROGRAM Have Good Passwords Use Good Antiviral Products Use Good Cryptography Have Good Firewalls Have a Backup System Audit and Monitor Systems and Networks Have Training and Awareness Programs Test Your Security Frequently Principles
15
The Need for Web Security14 CRYPTOGRAPHY Necessity is the mother of invention, and computer networks are the mother of modern cryptography. Ronald L. Rivest Symmetric Key Cryptography Public Key Cryptography Digital Signatures
16
The Need for Web Security15 Firewall Visible IP Address Internal Network PC Servers Host A system or group of systems that enforces an access control policy between two networks.
17
The Need for Web Security16
18
The Need for Web Security17 THANK YOU I have questions…
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.