SlideShare a Scribd company logo
Internet Security

    Networking
What you need to know…
• Firewalls
   – Packet filtering
   – Proxy server
• Encryption
   – Public/private key encryption
• Digital signatures and certificates
   – how they are obtained and used.
• Virus detection
   – Discuss worms, spam, phishing, pharming as well as viruses,
     also vulnerabilities that these exploit and how to address them
     through improved code quality, monitoring, protection.
• Computer security procedures
   – Authentication, Authorisation, Accounting
Firewalls
Firewalls
• A firewall is a device or program that monitors
  and controls data traffic between the internet
  and a private network (such as your network at
  home). Every firewall can be customised and
  assigned rules which determine which data
  packets are allowed through from the internet
  and which are not.
• Firewalls can also be used to block data from
  certain IP addresses, domain names or port
  numbers. Many firewalls also have the
  capability of being able to search individual
  packets for specific matches of text.
Firewalls
• Packet filtering
  – When using the packet filtering method, the firewall
    analyses the packets that are sent from the internet
    against a set of filters (firewall rules) which
    determine whether or not the packet is allowed to go
    through.
• Proxy server
  – Proxy servers prevent the user of a private network
    coming into direct contact with the computer that
    hosts a web page on the internet. This works by the
    proxy requesting the data from the internet and then
    passing it on to the private network user
Encryption
• Encryption is used to hide sensitive messages
  from illegitimate recipients by using encryption
  algorithms and an encryption key to convert plain
  text to cipher text, illegible to those without the
  encryption and decryption key
• Private/Public key encryption is when both
  parties have a pair of keys, one private and one
  public. The Public Key is kept in the open freely
  usable by anyone as is the encryption algorithm,
  however the Private Key is kept hidden
Digital Signatures
• These are a way for the sender to prove to
  the receiver that the message did in fact
  originate from them
Digital Signatures
1. Message is hashed to get a message digest.
2. The message digest is encrypted with A's private key, this
   then becomes the signature.
3. The signature is appended to the message.
4. The message is encrypted using B's public key.
5. The encrypted message is sent to B.
6. B decrypts the message with B's private key.
7. B decrypts the signature with A's public key to get the
   original message digest.
8. The decrypted message is hashed again, reproducing the
   message digest.
9. The message has not been tampered with if the decrypted
   message digest is the same as the reproduced digest.
Digital Certificate
• A Digital Certificate is a way of proving that
  the public key of the sender is authentic.
  Digital Certificates are only issued by the
  Certification Authorities (CAs).
• The certificates are encrypted into the
  message via the CA's private key, and can
  only be decrypted with the CA's public key.
Task 1
• You have 15 minutes to summarise the points
  we have just gone through.

• Success Criteria
  – Definition of the terms firewall, packet filtering and
    proxy server.
  – Explanation of what encryption is including details
    on public/private keys
  – Explanation of digital signatures and digital
    certificates including details about the process
    involved.
Viruses
• What is meant by these terms?
  –   Worms,
  –   Spam,
  –   Phishing,
  –   Pharming,
  –   Viruses


• Add an explanation of each to your notes,
  including details on how these can be
  avoided.
Computer security procedures
• Authentication,
  • This refers to the process where an entity's identity is
    authenticated, typically by providing evidence that it holds a
    specific digital identity such as an identifier and the
    corresponding credentials
  • Passwords, digital certificates, digital signatures
• Authorisation,
  • This function determines whether a particular entity is
    authorized to perform a given activity
  • time-of-day restrictions, physical location restrictions, or
    restrictions against multiple access by the same entity or user
• Accounting
  • This refers to the tracking of network resource consumption by
    users for the purpose of capacity and trend analysis, cost
    allocation or billing

More Related Content

PPTX
Enhancing lan using cryptography and other modules
PPT
Digital Signiture
PPTX
PPTX
Spamming, spoofing, Dos&DDos attack
PPT
Cryptography
PPT
Data security & cryptography
PPT
Info security & crypto
PPTX
Cryptography and Encryptions,Network Security,Caesar Cipher
Enhancing lan using cryptography and other modules
Digital Signiture
Spamming, spoofing, Dos&DDos attack
Cryptography
Data security & cryptography
Info security & crypto
Cryptography and Encryptions,Network Security,Caesar Cipher

What's hot (13)

PPTX
Cryptography and Network security # Lecture 8
PPTX
Cryptography
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Encryption by fastech
PPT
Secure email gate way
PPT
Online security & encryption
PPT
Cryptography
PDF
Network security & cryptography full notes
DOCX
Case study about voip
PPTX
Steganography by jayant bhatia
PDF
Cryptography and Network security # Lecture 8
Cryptography
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Encryption by fastech
Secure email gate way
Online security & encryption
Cryptography
Network security & cryptography full notes
Case study about voip
Steganography by jayant bhatia
Ad

Viewers also liked (9)

PPT
Firewall & its configurations
PDF
WT - Firewall & Proxy Server
PPT
Firewall
PPT
Lecture 4 firewalls
PPT
Proxy Servers
PPT
All about Honeypots & Honeynets
PPT
Honeypots
PPT
PPTX
Firewall presentation
Firewall & its configurations
WT - Firewall & Proxy Server
Firewall
Lecture 4 firewalls
Proxy Servers
All about Honeypots & Honeynets
Honeypots
Firewall presentation
Ad

Similar to L4 internet security (20)

PPT
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
PPTX
Security problems.pptx
PPTX
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
PPTX
cryptographydiksha.pptx
PPT
Digital signature
PPTX
Computer Security Essentials.pptx
PPT
Mutual Authentication For Wireless Communication
PPT
Eds user authenticationuser authentication methods
PPTX
Chapter 2 Overview of Commercial Issues.pptx
PDF
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
PPT
Implementing an improved security for collin’s database and telecommuters
PPTX
lecture 7.pptx
PPTX
Cryptography
PPTX
ebusiness digital,E business signature .
PPTX
Introduction to Cryptography and digital signatures
PPTX
6 security
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
PPTX
Computer Introduction (Data Encryption)-Lecture05
PPTX
cryptography introduction.pptx
PPT
Digital Signature
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
Security problems.pptx
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
cryptographydiksha.pptx
Digital signature
Computer Security Essentials.pptx
Mutual Authentication For Wireless Communication
Eds user authenticationuser authentication methods
Chapter 2 Overview of Commercial Issues.pptx
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Implementing an improved security for collin’s database and telecommuters
lecture 7.pptx
Cryptography
ebusiness digital,E business signature .
Introduction to Cryptography and digital signatures
6 security
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Computer Introduction (Data Encryption)-Lecture05
cryptography introduction.pptx
Digital Signature

More from listergc (20)

PPTX
PPTX
Validation, verification, output and backup
PPTX
L3 more networking
PPTX
L1 networking basics
PPTX
L1 networking basics
PPTX
L2 communication methods
PPTX
PPTX
Introduction to operating systems
PPTX
PPTX
Y12 peripherals
PPTX
Y12 peripherals
PPTX
L3 how do images work
PPTX
Describe primary and secondary memory inc
PPTX
Pp t3
PPTX
PPTX
PPTX
PPTX
PPTX
Systems software and applications packages
PPTX
Components of a computer system
Validation, verification, output and backup
L3 more networking
L1 networking basics
L1 networking basics
L2 communication methods
Introduction to operating systems
Y12 peripherals
Y12 peripherals
L3 how do images work
Describe primary and secondary memory inc
Pp t3
Systems software and applications packages
Components of a computer system

L4 internet security

  • 1. Internet Security Networking
  • 2. What you need to know… • Firewalls – Packet filtering – Proxy server • Encryption – Public/private key encryption • Digital signatures and certificates – how they are obtained and used. • Virus detection – Discuss worms, spam, phishing, pharming as well as viruses, also vulnerabilities that these exploit and how to address them through improved code quality, monitoring, protection. • Computer security procedures – Authentication, Authorisation, Accounting
  • 4. Firewalls • A firewall is a device or program that monitors and controls data traffic between the internet and a private network (such as your network at home). Every firewall can be customised and assigned rules which determine which data packets are allowed through from the internet and which are not. • Firewalls can also be used to block data from certain IP addresses, domain names or port numbers. Many firewalls also have the capability of being able to search individual packets for specific matches of text.
  • 5. Firewalls • Packet filtering – When using the packet filtering method, the firewall analyses the packets that are sent from the internet against a set of filters (firewall rules) which determine whether or not the packet is allowed to go through. • Proxy server – Proxy servers prevent the user of a private network coming into direct contact with the computer that hosts a web page on the internet. This works by the proxy requesting the data from the internet and then passing it on to the private network user
  • 6. Encryption • Encryption is used to hide sensitive messages from illegitimate recipients by using encryption algorithms and an encryption key to convert plain text to cipher text, illegible to those without the encryption and decryption key • Private/Public key encryption is when both parties have a pair of keys, one private and one public. The Public Key is kept in the open freely usable by anyone as is the encryption algorithm, however the Private Key is kept hidden
  • 7. Digital Signatures • These are a way for the sender to prove to the receiver that the message did in fact originate from them
  • 8. Digital Signatures 1. Message is hashed to get a message digest. 2. The message digest is encrypted with A's private key, this then becomes the signature. 3. The signature is appended to the message. 4. The message is encrypted using B's public key. 5. The encrypted message is sent to B. 6. B decrypts the message with B's private key. 7. B decrypts the signature with A's public key to get the original message digest. 8. The decrypted message is hashed again, reproducing the message digest. 9. The message has not been tampered with if the decrypted message digest is the same as the reproduced digest.
  • 9. Digital Certificate • A Digital Certificate is a way of proving that the public key of the sender is authentic. Digital Certificates are only issued by the Certification Authorities (CAs). • The certificates are encrypted into the message via the CA's private key, and can only be decrypted with the CA's public key.
  • 10. Task 1 • You have 15 minutes to summarise the points we have just gone through. • Success Criteria – Definition of the terms firewall, packet filtering and proxy server. – Explanation of what encryption is including details on public/private keys – Explanation of digital signatures and digital certificates including details about the process involved.
  • 11. Viruses • What is meant by these terms? – Worms, – Spam, – Phishing, – Pharming, – Viruses • Add an explanation of each to your notes, including details on how these can be avoided.
  • 12. Computer security procedures • Authentication, • This refers to the process where an entity's identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the corresponding credentials • Passwords, digital certificates, digital signatures • Authorisation, • This function determines whether a particular entity is authorized to perform a given activity • time-of-day restrictions, physical location restrictions, or restrictions against multiple access by the same entity or user • Accounting • This refers to the tracking of network resource consumption by users for the purpose of capacity and trend analysis, cost allocation or billing