SlideShare una empresa de Scribd logo
1 de 18
Electronic Security
Classification of Intruders

Hackers
Hackers                     Crackers
                            Crackers




           Intruders type




              Freakers
               Freakers
Victimised Firms
• Banks                      •   Government contractors
• Financial companies        •   Government agencies
• Insurance companies        •   Hospitals
• Brokerage houses           •   Medical laboratories
• Consultants                •   Utility companies
• Network Service            •   Universities
  Providers
• Textile Business
• Wholesale/Retail traders
Attacking Methods
•   Gaining access to user’s
    account
•   Gaining privileged access
•   Using the victim‘s system as a
    platform for attacks on other         •   A significant loss of credibility or
    sites.                                    market opportunity.
•   Duration of the accomplishment :      •   A buisness no longer able to
•   Manually in less than 45 seconds          complete.
•   With automation, the time is still    •   Legal liability and
    less.                                 •   Loss of life
•   By the attack varies :
•   A minnor loss of time in recovering
    from the problem .
•   A decrease in productivity.
Three basic security concepts

• Confidentiality
• Integrity and
• Availability
Concepts relating to the people who
    use the information are :

• Authentication

• Authorisation
• Non-repudiation
Classification of Incidents
•   Probe                • Exploitation of trust
•   Scan                 • Root compromise
•   Account compromise   • Destruction or
•   Packet sniffer         Alteration of
•   Denial of service      configuration
                           information
                         • Malicious code
                         • Internet infrastructure
                           attack
Relationship between SSL & ISO Reference Model

             User Application
                                                           SSL Protocol
ISO Reference         Distributed Data Sources
Model                             Plain Data Stream
            Application Layer                              SSL Handshake Protocol


           Presentation Layer     Encrypted Data Packets
                                                            SSL Record Protocol
              Session Layer
                      Network Independent messages
             Transport Layer
             Network Layer
               Link Layer
             Physical Layer

                      Physical connection to network hardware

             Data Network
Ten Practical Tips to Secure
         E-Commerce - 1
•   Use latest version of the browser
•   Install SSL
•   Ensure ISP has a security system
•   Look for signs of trust
•   Shop with familiar companies
•   Look for easy to find security information &
    a privacy statement
Ten Practical Tips to Secure
          E-Commerce - 2
•   Pay by credit card
•   Keep a record
•   Look for information about ‘cookies’ and
•   Find out what information the site collects
    you
Security Tools - 1
• Secure transport
  stacks
• Kerberos
• Secure transactions
  over the Internet
• UNIX Security
• Password Security
  Systems
Security Tools - 2

• Electronic Mail
  SMTP
  PEM
  PGP
• Server security
• Trusting Binaries
Kerberos Authentication
         Process -1
  Credentials

A Ticket for the
server
A temporary
encryption key
The session key
Kerebos - 2
  Limitations
Vulnerability of
passwords
Need for
synchronised clocks
Weak assurances
against repudiation
UNIX Security
•   User passwords
•   File access
•   Directory access
•   File encryption and
•   Security on passwords files
Biometrics


•   Fingerprints
•   Signature Dynamics
•   Voice verification
•   Keystroke Dynamics
•   Facial Features
E- MAIL
    Advantages

o Send message in no time anywhere in the world
o For getting on & staying on the Internet
o Can be handled by a variety of programs
o Easy and inexpensive
o Increasingly used for both internal & external
  corporates
o E-mail to fax & fax to e-mail is possible
“Like” us on Facebook: 
   p //                 /
http://www.facebook.com/welearnindia 

“Follow” us on Twitter:
http://twitter.com/WeLearnIndia
http://twitter com/WeLearnIndia

Watch informative videos on Youtube: 
http://www.youtube.com/WelingkarDLP

Más contenido relacionado

La actualidad más candente

Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
Electronic signature software
Electronic signature softwareElectronic signature software
Electronic signature softwareSreeramulaSatya
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in ActionSatnam Singh
 
Solving problems with authentication
Solving problems with authenticationSolving problems with authentication
Solving problems with authenticationMecklerMedia
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Guidelines For Ethical Nudging In Password Authentication
Guidelines For Ethical Nudging In Password AuthenticationGuidelines For Ethical Nudging In Password Authentication
Guidelines For Ethical Nudging In Password AuthenticationSM Nurnobi
 
Anypoint enterprise security
Anypoint enterprise securityAnypoint enterprise security
Anypoint enterprise securityD.Rajesh Kumar
 
Mule anypoint enterprise security
Mule anypoint enterprise securityMule anypoint enterprise security
Mule anypoint enterprise securityD.Rajesh Kumar
 
What is network security.docx
What is network security.docxWhat is network security.docx
What is network security.docxkarelruth
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudHostway|HOSTING
 

La actualidad más candente (19)

Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Code Signing Certificate
Code Signing CertificateCode Signing Certificate
Code Signing Certificate
 
Electronic signature software
Electronic signature softwareElectronic signature software
Electronic signature software
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in Action
 
NewsBytes - Nullhyd
NewsBytes - Nullhyd NewsBytes - Nullhyd
NewsBytes - Nullhyd
 
Solving problems with authentication
Solving problems with authenticationSolving problems with authentication
Solving problems with authentication
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Security environment
Security environmentSecurity environment
Security environment
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Guidelines For Ethical Nudging In Password Authentication
Guidelines For Ethical Nudging In Password AuthenticationGuidelines For Ethical Nudging In Password Authentication
Guidelines For Ethical Nudging In Password Authentication
 
Anypoint enterprise security
Anypoint enterprise securityAnypoint enterprise security
Anypoint enterprise security
 
Mule anypoint enterprise security
Mule anypoint enterprise securityMule anypoint enterprise security
Mule anypoint enterprise security
 
What is network security.docx
What is network security.docxWhat is network security.docx
What is network security.docx
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Security Audit
Security AuditSecurity Audit
Security Audit
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
 

Destacado

Need For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian societyNeed For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian societyrahul arora
 
Medical Tourism : An Emerging Industry
Medical Tourism : An Emerging Industry Medical Tourism : An Emerging Industry
Medical Tourism : An Emerging Industry Anil Bankar
 
Electronic security system
Electronic security systemElectronic security system
Electronic security systemAtharva Chavan
 
Medical tourism
Medical tourismMedical tourism
Medical tourismMalko29
 
How to stand out online
How to stand out onlineHow to stand out online
How to stand out onlineMars Dorian
 
Are Content Strategists the Next Corporate Rock Stars?
Are Content Strategists the Next Corporate Rock Stars?Are Content Strategists the Next Corporate Rock Stars?
Are Content Strategists the Next Corporate Rock Stars?Mark Fidelman
 
The 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the TrendThe 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the Trend360i
 
Deep Learning through Examples
Deep Learning through ExamplesDeep Learning through Examples
Deep Learning through ExamplesSri Ambati
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Destacado (10)

Need For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian societyNeed For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian society
 
Medical Tourism : An Emerging Industry
Medical Tourism : An Emerging Industry Medical Tourism : An Emerging Industry
Medical Tourism : An Emerging Industry
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
Medical tourism
Medical tourismMedical tourism
Medical tourism
 
How to stand out online
How to stand out onlineHow to stand out online
How to stand out online
 
Are Content Strategists the Next Corporate Rock Stars?
Are Content Strategists the Next Corporate Rock Stars?Are Content Strategists the Next Corporate Rock Stars?
Are Content Strategists the Next Corporate Rock Stars?
 
The 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the TrendThe 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the Trend
 
Technical Analysis Rudramurthy
Technical Analysis   RudramurthyTechnical Analysis   Rudramurthy
Technical Analysis Rudramurthy
 
Deep Learning through Examples
Deep Learning through ExamplesDeep Learning through Examples
Deep Learning through Examples
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar a Electronic security

Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Nicholas Davis
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Nicholas Davis
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYNishant Pawar
 
E commerce security
E commerce securityE commerce security
E commerce securityRoha1234567
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key ManagementNCC Group
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
 
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsCombating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsTripwire
 
How to secure your emails for sensitive docs
How to secure your emails for sensitive docsHow to secure your emails for sensitive docs
How to secure your emails for sensitive docsDavid Strom
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Nicholas Davis
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Nicholas Davis
 

Similar a Electronic security (20)

Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Security audit
Security auditSecurity audit
Security audit
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key Management
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsCombating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
 
How to secure your emails for sensitive docs
How to secure your emails for sensitive docsHow to secure your emails for sensitive docs
How to secure your emails for sensitive docs
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 

Más de We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program.

Más de We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program. (20)

PGDM in Supply Chain Management
PGDM in Supply Chain ManagementPGDM in Supply Chain Management
PGDM in Supply Chain Management
 
PGDM in Rural & Agribusiness Management
PGDM in Rural & Agribusiness ManagementPGDM in Rural & Agribusiness Management
PGDM in Rural & Agribusiness Management
 
PGDM in E-Commerce Management
PGDM in E-Commerce ManagementPGDM in E-Commerce Management
PGDM in E-Commerce Management
 
PGDM in Service Excellence
PGDM in Service ExcellencePGDM in Service Excellence
PGDM in Service Excellence
 
PGDM in International Management
PGDM in International ManagementPGDM in International Management
PGDM in International Management
 
PGDM in IT Project Management
PGDM in IT Project ManagementPGDM in IT Project Management
PGDM in IT Project Management
 
Distance Learning PGDM in E-Business Management
Distance Learning PGDM in E-Business ManagementDistance Learning PGDM in E-Business Management
Distance Learning PGDM in E-Business Management
 
Distance Learning PGDM in Business Administration
Distance Learning PGDM in Business AdministrationDistance Learning PGDM in Business Administration
Distance Learning PGDM in Business Administration
 
PGDM in Finance Management
PGDM in Finance ManagementPGDM in Finance Management
PGDM in Finance Management
 
PGDM in Marketing Management
PGDM in Marketing ManagementPGDM in Marketing Management
PGDM in Marketing Management
 
PGDM in Operation Management
PGDM in Operation ManagementPGDM in Operation Management
PGDM in Operation Management
 
Marketing Management
Marketing ManagementMarketing Management
Marketing Management
 
PGDM in Media & Advertising
PGDM in Media & AdvertisingPGDM in Media & Advertising
PGDM in Media & Advertising
 
We School HR Management
We School HR ManagementWe School HR Management
We School HR Management
 
WE SCHOOL TRAVEL & TOURISM MANAGEMENT
WE SCHOOL TRAVEL & TOURISM MANAGEMENTWE SCHOOL TRAVEL & TOURISM MANAGEMENT
WE SCHOOL TRAVEL & TOURISM MANAGEMENT
 
Personal budgeting
Personal budgetingPersonal budgeting
Personal budgeting
 
Maintaining the financial health of businesses through financial accounting
Maintaining the financial health of businesses through financial accountingMaintaining the financial health of businesses through financial accounting
Maintaining the financial health of businesses through financial accounting
 
Asset Management Case Sstudy
Asset Management  Case SstudyAsset Management  Case Sstudy
Asset Management Case Sstudy
 
Team management’ scored on the football
Team management’ scored on the footballTeam management’ scored on the football
Team management’ scored on the football
 
Mc donalds Recruitment Case Study
Mc donalds Recruitment Case StudyMc donalds Recruitment Case Study
Mc donalds Recruitment Case Study
 

Último

Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 

Último (20)

Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 

Electronic security

  • 2. Classification of Intruders Hackers Hackers Crackers Crackers Intruders type Freakers Freakers
  • 3. Victimised Firms • Banks • Government contractors • Financial companies • Government agencies • Insurance companies • Hospitals • Brokerage houses • Medical laboratories • Consultants • Utility companies • Network Service • Universities Providers • Textile Business • Wholesale/Retail traders
  • 4. Attacking Methods • Gaining access to user’s account • Gaining privileged access • Using the victim‘s system as a platform for attacks on other • A significant loss of credibility or sites. market opportunity. • Duration of the accomplishment : • A buisness no longer able to • Manually in less than 45 seconds complete. • With automation, the time is still • Legal liability and less. • Loss of life • By the attack varies : • A minnor loss of time in recovering from the problem . • A decrease in productivity.
  • 5. Three basic security concepts • Confidentiality • Integrity and • Availability
  • 6. Concepts relating to the people who use the information are : • Authentication • Authorisation • Non-repudiation
  • 7. Classification of Incidents • Probe • Exploitation of trust • Scan • Root compromise • Account compromise • Destruction or • Packet sniffer Alteration of • Denial of service configuration information • Malicious code • Internet infrastructure attack
  • 8. Relationship between SSL & ISO Reference Model User Application SSL Protocol ISO Reference Distributed Data Sources Model Plain Data Stream Application Layer SSL Handshake Protocol Presentation Layer Encrypted Data Packets SSL Record Protocol Session Layer Network Independent messages Transport Layer Network Layer Link Layer Physical Layer Physical connection to network hardware Data Network
  • 9. Ten Practical Tips to Secure E-Commerce - 1 • Use latest version of the browser • Install SSL • Ensure ISP has a security system • Look for signs of trust • Shop with familiar companies • Look for easy to find security information & a privacy statement
  • 10. Ten Practical Tips to Secure E-Commerce - 2 • Pay by credit card • Keep a record • Look for information about ‘cookies’ and • Find out what information the site collects you
  • 11. Security Tools - 1 • Secure transport stacks • Kerberos • Secure transactions over the Internet • UNIX Security • Password Security Systems
  • 12. Security Tools - 2 • Electronic Mail SMTP PEM PGP • Server security • Trusting Binaries
  • 13. Kerberos Authentication Process -1 Credentials A Ticket for the server A temporary encryption key The session key
  • 14. Kerebos - 2 Limitations Vulnerability of passwords Need for synchronised clocks Weak assurances against repudiation
  • 15. UNIX Security • User passwords • File access • Directory access • File encryption and • Security on passwords files
  • 16. Biometrics • Fingerprints • Signature Dynamics • Voice verification • Keystroke Dynamics • Facial Features
  • 17. E- MAIL Advantages o Send message in no time anywhere in the world o For getting on & staying on the Internet o Can be handled by a variety of programs o Easy and inexpensive o Increasingly used for both internal & external corporates o E-mail to fax & fax to e-mail is possible
  • 18. “Like” us on Facebook:  p // / http://www.facebook.com/welearnindia  “Follow” us on Twitter: http://twitter.com/WeLearnIndia http://twitter com/WeLearnIndia Watch informative videos on Youtube:  http://www.youtube.com/WelingkarDLP