Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Internet Security

No description
by

bassam abed

on 4 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet Security

Security token.
a six-digit code which randomly changes every 30–60 seconds.
built in mathematical computations and manipulate numbers based on the current time built into the device.
Internet Security
A tree branch of computer security specifically related to the Internet.
Involving browser security and network security.
Applies to operating system as a whole.
To protect data from intrusions or fraud.
Types of Security
Network layer security.
TCP/IP which stands for Transmission Control Protocol (TCP) and Internet Protocol (IP)
can be made secure with the help of cryptographic methods and protocols.
What is Internet Security?
Internet Protocol Security (IPsec).
designed to protect communication in a secure manner using TCP/IP.
provides security and authentication at the IP layer by transforming data using encryption.
Internet Security
Electronic mail security (E-mail)
Pretty Good Privacy provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption algorithm
Signing an email message to ensure its integrity and confirm the identity of its sender
Encrypting the body of an email message to ensure its confidentiality.
Firewalls

controls access between networks.
screen network traffic and are able to block traffic that is dangerous.
act as the intermediate server between SMTP and Hypertext Transfer Protocol (HTTP) connections.
Malicious software

Malware
user can be tricked or forced into downloading software onto a computer that is of malicious intent.
come in many forms, such as viruses, Trojan horses, spyware, and worms.
Viruses
programs that can replicate their structures or effects by infecting other files or structures on a computer.
Worms
programs that can replicate themselves throughout a computer network, performing malicious tasks throughout
Trojan horse
commonly known as a Trojan
software that pretends to be harmless
Full transcript