Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Security

computer, network , and information security
by

Noora Al Jahwri

on 14 November 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Security

CIA Triad
Integrity
Availability
Information Security
Confidentiality
Keep private information private
Protecting information from unauthorized modification.
Ensuring authorized subjects are able
to access data.
By Majid Al Siyabi
Encryption
Access Control
Physical Security
Hashing
IPSec Protocol
Digital Signature
Data Backup
Disaster Recovery
Fault Tolerance System
Phishing
Set up a fake website to trick a user
into providing sensitive information.
facebook.com
(Original)
faceboook.com
(Duplicate)
Victims
Users
SQL Injection
The ability to inject SQL commands into the database engine through an existing application.
"SELECT * FROM users
WHERE username='username' AND password='password'";
"SELECT * FROM users
WHERE username='
noora
' AND password='
anything' OR '1'='1
'";
"SELECT * FROM usersWHERE username='noora' AND password='anything' OR '1'='1'";
D
ELETE FROM users;
Denial of Service
Flooding network with useless traffic
to make it unavailable.
Thank You
Have a Nice Day
Target
ISP
Hacker
Innocent Users
Zombies
Full transcript