Разделы презентаций


Internet Security Reporter: Korobkov E. V

Internet SecurityIs a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications

Слайды и текст этой презентации

Слайд 1Internet Security

Reporter: Korobkov E. V.

Internet SecurityReporter:  Korobkov E. V.

Слайд 2Internet Security

Is a branch of computer security specifically related to

the Internet, often involving browser security but also network security

on a more general level as it applies to other applications or operating systems on a whole.
Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.
Different methods have been used to protect the transfer of data, including encryption.
Internet SecurityIs a branch of computer security specifically related to the Internet, often involving browser security but

Слайд 3Types of security
Network layer security
IPsec Protocol
Electronic mail security (E-mail)
Background
Pretty Good

Privacy (PGP)
Multipurpose Internet Mail
Extensions (MIME)
Message Authentication Code

Types of securityNetwork layer securityIPsec ProtocolElectronic mail security (E-mail)BackgroundPretty Good Privacy (PGP)Multipurpose Internet MailExtensions (MIME)Message Authentication Code

Слайд 4Firewalls
A firewall controls access between networks. It generally consists of

gateways and filters which vary from one firewall to another.

Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.
FirewallsA firewall controls access between networks. It generally consists of gateways and filters which vary from one

Слайд 5Role of firewalls in Internet Security and web security
Firewalls impose

restrictions on incoming and outgoing packets to and from private

networks. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet.
Role of firewalls in Internet Security and web securityFirewalls impose restrictions on incoming and outgoing packets to

Слайд 6Types of firewalls
Packet filters
Circuit-level gateways
Application-level gateways

Types of firewallsPacket filtersCircuit-level gatewaysApplication-level gateways

Слайд 7Malicious software and antivirus
Malware
Viruses
Trojan horse
Spyware
Worms
Botnet

Malicious software and antivirusMalwareVirusesTrojan horseSpywareWormsBotnet

Слайд 8Antivirus
Antivirus programs and Internet security programs are useful in protecting

a computer or programmable device from malware.

AntivirusAntivirus programs and Internet security programs are useful in protecting a computer or programmable device from malware.

Слайд 9Denial of service attack
A denial-of-service attack (DoS attack) or distributed

denial-of-service attack (DDoS attack) is an attempt to make a

computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
Denial of service attackA denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt

Слайд 10Browser choice
Web browser statistics tend to affect the amount a

Web browser is exploited.

Browser choiceWeb browser statistics tend to affect the amount a Web browser is exploited.

Слайд 11Buffer overflow attacks
A buffer overflow is an attack that could

be used by a cracker to get full system access

through various methods by essentially cracking a computer using brute force. Most security applications and suites are incapable of adequate defense against these kinds of attacks.
Buffer overflow attacksA buffer overflow is an attack that could be used by a cracker to get

Слайд 12THANK YOU FOR YOUR ATTENTION

THANK YOU FOR YOUR ATTENTION

Обратная связь

Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое TheSlide.ru?

Это сайт презентации, докладов, проектов в PowerPoint. Здесь удобно  хранить и делиться своими презентациями с другими пользователями.


Для правообладателей

Яндекс.Метрика