INTERNET AND GLOBAL
CONNECTIVITY –
SECURITY CONCERNS
WOW CHALLENGE-1
Name Roll No.
Anish singh
Aishwarya 06
Amika Bhagat 09
Kajal 20
Kamala Pati Singhaniyan 21
Mohammad Soffiyan 27
Rajat Bandhu 41
Pragya
Shanshu Kumar
• The world is becoming more interconnected with the internet
and new networking technology.
• Network security has become more important to personal
computer users, organization and military.
• The internet structure itself allowed for many threats to occur.
• The architecture of internet, when modified can reduce the
possible attacks that can be sent across the networks.
• Knowing the attack methods , allows for the appropriate
security to emerge
INTRODUCTION
NETWORK SECURITY
• Security is crucial to networks and application. With the
connectivity comes security.
• Securities issues are like
• Threats
• Viruses
• Cyber Attacks
• Easily accessible to anyone,
• Drain your bank account
• Hacked your account and profile
• Scam-Fraud, Predators and fake friends
COMMON INTERNET ATTACK
METHODS
Common internet attacks methods are broken down into
categories. Some attacks gain system knowledge or personal
information.
• Eavesdropping
• Viruses
• Worms
• Trojans
• Phishing
• IP Spoofing Attacks
• Denial of Service
EAVESDROPPING
• Interception of communications by an
unauthorized party is called
eavesdropping.
• Passive eavesdropping is when the
person only secretly listens to the
networked messages.
• On the other hand, active
eavesdropping is when the intruder
listens and inserts something into the
communication stream.
• Police department uses this method to
trace suspected phone calls,where
attackers usee to trace private and
confedential calls.
VIRUSES
• Viruses are self‐replication programs that use files to infect and propagate.
• Once a file is opened, the virus will activate within the system.
RED CODE VIRUS
WORMS
• A worm is similar to a virus because they both are self‐replicating, but the worm does
not require a file to allow it to propagate.
• There are two main types of worms, mass‐mailing worms and network aware worms.
• Mass mailing worms use email as a means to infect other computer.
PHISHING
• Phishing is an attempt to obtain
confidential information from an
• individual, group, or organization .
• Phishers trick users into disclosing
personal data, such as credit card
numbers, online banking
credentials, and other sensitive
information.
• Example :- Russians hacked in
DNS influencing the election in
favour of Donald Trump.
• Fake Images can be displayed on
screen that may divert/misguide
you.
IP SPOOFING ATTACKS
• Spoofing means to have the address of the computer mirror
the address of a trusted computer in order to gain access to
other computers. The identity of the intruder is hidden by
different means making detection and prevention difficult.
• Computers in government offices can be accessed through
this method which may leak highly confedential information
between two nations.
TECHNOLOGY FOR INTERNET
SECURITY
Internet threats will continue to be a major issue in the global
world as long as information is accessible and transferred across
the Internet. Different defense and detection mechanisms were
developed to deal with these attacks. Such as
• Firewall
• Intrusion Detection Systems
• Anti‐Malware Software and scanners
• Secure Socket Layer (SSL)
FIREWALL
• A firewall is a typical border control
mechanism or perimeter defense.
• The purpose of a firewall is to block traffic
from the outside, but it could also be used to
block traffic from the inside.
• A firewall is the front line defense mechanism
against intruders.
• It is a system designed to prevent unauthorized
access to or from a private network.
• Firewalls can be implemented in both
hardware and software, or a combination of
both.
INTRUSION DETECTION
SYSTEMS
• An Intrusion Detection System (IDS) is an additiona
lprotection measure that helps ward off computer
intrusions.
• IDS systems can be software and hardware devices used to
detect an attack.
• IDS products are used to monitor connection in
determining whether attacks are been launched.
• Some IDS systems just monitor and alert of an attack,
whereas others try to block the attack.
SECURE SOCKET LAYER (SSL)
• The Secure Socket Layer (SSL) is a suite of protocols that
is a standard way to achieve a good level of security
between a web browser and a website.
• SSL is designed to create a secure channel, or tunnel,
between a web browser and the web server, so that any
information exchanged is protected with in the secured
tunnel.
• SSL provides authentication of clients to server through
the use of certificates.
• Clients present a certificate to the server to prove their
identity.
ATTACK METHODS AND SECURITY
TECHNOLOGY
Computer Security
attributes
Attack Methods Technology for internet
security
Confidential Eavesdropping,
Hacking, Phishing,DoS
and IP Spoofing
IDS, Firewall,
Cryptographic System.
IP Sec and SSL
Integrity Viruses , Worms,
Trojans,
Eavesdropping, Dos
and IP Spoofing.
IDS, Firewall,Anti-
Maleware Software,
IPsec and SSL
Privacy Email Bombing,
Spamming, Hacking,
Dos and Cookies
IDS, Firewall, Anti-
Maleware Software,
IPSec and SSL
Availability Dos, Email Bombing,
Spamming and System
Boot
IDS, Anti-Maleware
Software and Firewall.
ADVANTAGES
Regular connectivity with
• Social Media - Facebook, twitter
• Business world - Different location across different
countries
• Media – to circulate information all over the world from
anywhere and at anytime
DISADVANTAGES
• Business-related security issues
• Personal security issues
CONCLUSION
• Network security is an important field that is increasingly
gaining attention as the internet expands.
• The Attack Methods and Internet Security were analyzed
to determine the necessary security technology. The
security technology is mostly software based, but many
common hardware devices are used.
.
THANK YOU

More Related Content

PPTX
Introduction to information security
PPT
Computer Security
PPTX
Infocrimeppt
PPTX
Cyber Crimes
PPTX
Cyber crime and security
PPTX
Cyber security ppt final
DOCX
Cyber crime
PPTX
introduction of Cyber securit
Introduction to information security
Computer Security
Infocrimeppt
Cyber Crimes
Cyber crime and security
Cyber security ppt final
Cyber crime
introduction of Cyber securit

What's hot (20)

PPTX
What is cyber security
PPT
E secuity
PPTX
Cyber security mis
PPT
Cyber Crime and Security
PPT
System vulnerability and abuse
PPTX
Attacks on Mobiles\Cell Phones
PPTX
Types of Cyber-Attacks
PPTX
Cyber crime and cyber security
PPTX
Types of cyber attacks
PPTX
Cyber crime and secuity
PPTX
Cyber crime & security
PPTX
cyber security and forensic tools
PPTX
Information security
PPTX
Internet security powerpoint
PPTX
Cyber Crime
PPTX
Ethical hacking
PPTX
Ethical hacking (legal)
PPTX
Ethical hacking ppt
PPTX
Tools and methods used in cyber crime
What is cyber security
E secuity
Cyber security mis
Cyber Crime and Security
System vulnerability and abuse
Attacks on Mobiles\Cell Phones
Types of Cyber-Attacks
Cyber crime and cyber security
Types of cyber attacks
Cyber crime and secuity
Cyber crime & security
cyber security and forensic tools
Information security
Internet security powerpoint
Cyber Crime
Ethical hacking
Ethical hacking (legal)
Ethical hacking ppt
Tools and methods used in cyber crime
Ad

Viewers also liked (12)

PPTX
P & G marketing strategy
DOCX
Вимоги до мультимедійної презентації
PDF
How to fight against “full scratch disease”
PPSX
Insurance general knowledge
PPTX
Adjudication camp brief
PDF
Kolkata settlement
PPT
Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)
 
PPTX
Model debate adj camp
PPTX
Statistical Significance | Statistics
PPT
Density Function | Statistics
PPTX
Hero mindmine
DOCX
Economic and accounting education
P & G marketing strategy
Вимоги до мультимедійної презентації
How to fight against “full scratch disease”
Insurance general knowledge
Adjudication camp brief
Kolkata settlement
Päijät-Häme hyvinvoinnin ja terveyden edistämisen alatyöryhmä 151216 (2)
 
Model debate adj camp
Statistical Significance | Statistics
Density Function | Statistics
Hero mindmine
Economic and accounting education
Ad

Similar to Internet and Global Connectivity – Security Concerns (20)

PPT
Network sec 1
PPTX
Computer security and privacy
PPTX
internet security
PPT
lec security
PPTX
Internet infrastructure UNIT 5
PPTX
cybersecurity
PPTX
Network Security
PPT
Web security
PPTX
INTERNET SECURITY.pptx
PPTX
CYBER SECURITY happy life pogi ako cyber
PPTX
Network security (vulnerabilities, threats, and attacks)
PPT
IT8005_EC_Unit_III_Securing_Communication_Channels
PPTX
SEMINAR ON CYBER SECURITY.pptx
PDF
Peripheral Review and Analysis of Internet Network Security
PPTX
network security ppt.pptx
DOCX
Network security
PPTX
Seminar (network security)
PPTX
6 security
PPTX
Types of Attack in Information and Network Security
PDF
wireless networking chapter three WAN.pdf
Network sec 1
Computer security and privacy
internet security
lec security
Internet infrastructure UNIT 5
cybersecurity
Network Security
Web security
INTERNET SECURITY.pptx
CYBER SECURITY happy life pogi ako cyber
Network security (vulnerabilities, threats, and attacks)
IT8005_EC_Unit_III_Securing_Communication_Channels
SEMINAR ON CYBER SECURITY.pptx
Peripheral Review and Analysis of Internet Network Security
network security ppt.pptx
Network security
Seminar (network security)
6 security
Types of Attack in Information and Network Security
wireless networking chapter three WAN.pdf

More from Akshay Jain (12)

PPTX
BANKING SECTOR
PPTX
The Future Trends Marketing In Reference To Technology
PPTX
Food Industry
PPTX
Textile Industry
PPTX
INDIAN FMCG SECTOR
PPTX
TELECOMMUNICATION
PPTX
RETAIL INDUSTRY
PPTX
REAL ESTATE SECTOR - GODREJ PROPERTIES
PPTX
MAN TRUCKS
PPTX
INTERNATIONAL TERRORISM
PPTX
FUNCTIONS OF BANKS
PPTX
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
BANKING SECTOR
The Future Trends Marketing In Reference To Technology
Food Industry
Textile Industry
INDIAN FMCG SECTOR
TELECOMMUNICATION
RETAIL INDUSTRY
REAL ESTATE SECTOR - GODREJ PROPERTIES
MAN TRUCKS
INTERNATIONAL TERRORISM
FUNCTIONS OF BANKS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS

Recently uploaded (20)

PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
DOCX
search engine optimization ppt fir known well about this
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Configure Apache Mutual Authentication
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Zenith AI: Advanced Artificial Intelligence
PPT
Geologic Time for studying geology for geologist
PDF
UiPath Agentic Automation session 1: RPA to Agents
OpenACC and Open Hackathons Monthly Highlights July 2025
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Custom Battery Pack Design Considerations for Performance and Safety
Module 1.ppt Iot fundamentals and Architecture
A comparative study of natural language inference in Swahili using monolingua...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Chapter 5: Probability Theory and Statistics
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
search engine optimization ppt fir known well about this
Benefits of Physical activity for teenagers.pptx
Enhancing emotion recognition model for a student engagement use case through...
Configure Apache Mutual Authentication
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Flame analysis and combustion estimation using large language and vision assi...
Developing a website for English-speaking practice to English as a foreign la...
Zenith AI: Advanced Artificial Intelligence
Geologic Time for studying geology for geologist
UiPath Agentic Automation session 1: RPA to Agents

Internet and Global Connectivity – Security Concerns

  • 1. INTERNET AND GLOBAL CONNECTIVITY – SECURITY CONCERNS WOW CHALLENGE-1
  • 2. Name Roll No. Anish singh Aishwarya 06 Amika Bhagat 09 Kajal 20 Kamala Pati Singhaniyan 21 Mohammad Soffiyan 27 Rajat Bandhu 41 Pragya Shanshu Kumar
  • 3. • The world is becoming more interconnected with the internet and new networking technology. • Network security has become more important to personal computer users, organization and military. • The internet structure itself allowed for many threats to occur. • The architecture of internet, when modified can reduce the possible attacks that can be sent across the networks. • Knowing the attack methods , allows for the appropriate security to emerge INTRODUCTION
  • 4. NETWORK SECURITY • Security is crucial to networks and application. With the connectivity comes security. • Securities issues are like • Threats • Viruses • Cyber Attacks • Easily accessible to anyone, • Drain your bank account • Hacked your account and profile • Scam-Fraud, Predators and fake friends
  • 5. COMMON INTERNET ATTACK METHODS Common internet attacks methods are broken down into categories. Some attacks gain system knowledge or personal information. • Eavesdropping • Viruses • Worms • Trojans • Phishing • IP Spoofing Attacks • Denial of Service
  • 6. EAVESDROPPING • Interception of communications by an unauthorized party is called eavesdropping. • Passive eavesdropping is when the person only secretly listens to the networked messages. • On the other hand, active eavesdropping is when the intruder listens and inserts something into the communication stream. • Police department uses this method to trace suspected phone calls,where attackers usee to trace private and confedential calls.
  • 7. VIRUSES • Viruses are self‐replication programs that use files to infect and propagate. • Once a file is opened, the virus will activate within the system. RED CODE VIRUS WORMS • A worm is similar to a virus because they both are self‐replicating, but the worm does not require a file to allow it to propagate. • There are two main types of worms, mass‐mailing worms and network aware worms. • Mass mailing worms use email as a means to infect other computer.
  • 8. PHISHING • Phishing is an attempt to obtain confidential information from an • individual, group, or organization . • Phishers trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information. • Example :- Russians hacked in DNS influencing the election in favour of Donald Trump. • Fake Images can be displayed on screen that may divert/misguide you.
  • 9. IP SPOOFING ATTACKS • Spoofing means to have the address of the computer mirror the address of a trusted computer in order to gain access to other computers. The identity of the intruder is hidden by different means making detection and prevention difficult. • Computers in government offices can be accessed through this method which may leak highly confedential information between two nations.
  • 10. TECHNOLOGY FOR INTERNET SECURITY Internet threats will continue to be a major issue in the global world as long as information is accessible and transferred across the Internet. Different defense and detection mechanisms were developed to deal with these attacks. Such as • Firewall • Intrusion Detection Systems • Anti‐Malware Software and scanners • Secure Socket Layer (SSL)
  • 11. FIREWALL • A firewall is a typical border control mechanism or perimeter defense. • The purpose of a firewall is to block traffic from the outside, but it could also be used to block traffic from the inside. • A firewall is the front line defense mechanism against intruders. • It is a system designed to prevent unauthorized access to or from a private network. • Firewalls can be implemented in both hardware and software, or a combination of both.
  • 12. INTRUSION DETECTION SYSTEMS • An Intrusion Detection System (IDS) is an additiona lprotection measure that helps ward off computer intrusions. • IDS systems can be software and hardware devices used to detect an attack. • IDS products are used to monitor connection in determining whether attacks are been launched. • Some IDS systems just monitor and alert of an attack, whereas others try to block the attack.
  • 13. SECURE SOCKET LAYER (SSL) • The Secure Socket Layer (SSL) is a suite of protocols that is a standard way to achieve a good level of security between a web browser and a website. • SSL is designed to create a secure channel, or tunnel, between a web browser and the web server, so that any information exchanged is protected with in the secured tunnel. • SSL provides authentication of clients to server through the use of certificates. • Clients present a certificate to the server to prove their identity.
  • 14. ATTACK METHODS AND SECURITY TECHNOLOGY Computer Security attributes Attack Methods Technology for internet security Confidential Eavesdropping, Hacking, Phishing,DoS and IP Spoofing IDS, Firewall, Cryptographic System. IP Sec and SSL Integrity Viruses , Worms, Trojans, Eavesdropping, Dos and IP Spoofing. IDS, Firewall,Anti- Maleware Software, IPsec and SSL Privacy Email Bombing, Spamming, Hacking, Dos and Cookies IDS, Firewall, Anti- Maleware Software, IPSec and SSL Availability Dos, Email Bombing, Spamming and System Boot IDS, Anti-Maleware Software and Firewall.
  • 15. ADVANTAGES Regular connectivity with • Social Media - Facebook, twitter • Business world - Different location across different countries • Media – to circulate information all over the world from anywhere and at anytime DISADVANTAGES • Business-related security issues • Personal security issues
  • 16. CONCLUSION • Network security is an important field that is increasingly gaining attention as the internet expands. • The Attack Methods and Internet Security were analyzed to determine the necessary security technology. The security technology is mostly software based, but many common hardware devices are used. .