IT
-
Upload
piyush-maheshwari -
Category
Education
-
view
66 -
download
0
description
Transcript of IT
![Page 1: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/1.jpg)
2013-2015
Submitted By-Piyush Mantri Poonam Kothari Pooja Parmar
Submitted to-Vikas jain
![Page 2: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/2.jpg)
Content
i. Firewall securityii. Massage securityiii. Data securityiv. Document security
![Page 3: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/3.jpg)
Firewall
![Page 4: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/4.jpg)
Firewalls•Isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others. Network gateway, handles incoming & outgoing traffic, Access manager, blocks/grants access to services, networks
firewall
administerednetwork
publicInternet
firewall
Modem
![Page 5: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/5.jpg)
Firewall Design
![Page 6: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/6.jpg)
Firewalls: Whyprevent denial of service(DoS) attacks:
SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections.
prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with something else
allow only authorized access to inside network (set of authenticated users/hosts)
two types of firewalls: application-level packet-filtering
![Page 7: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/7.jpg)
Firewall
• Packet Filter– scans IP address, port number– block specific addresses, ports– Stateful: adds connection filtering
• Application Proxy– scans packet payload– filter harmful data, program commands
• Personal– combination of filter & proxy
• Packet Filter– harmful data passes through
• Application Proxy– unknown application vulnerabilities
The Benefits The Drawbacks
![Page 8: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/8.jpg)
Messag
e Securi
ty
![Page 9: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/9.jpg)
MESSAGE SECURITY
Messaging Security is a program that provides protection for companies messaging infrastructure.
It protects all the personal message of the company which are related to company’s vision and mission.
![Page 10: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/10.jpg)
Encryption as the basis of Message security
Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key.
Its provide a protection against harmful factors affecting our data. Its purpose is only to secure our data.
![Page 11: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/11.jpg)
AdvantagesNo can figure out the private key from the corresponding public key. Hence, the key management problems is mostly confined to the management of private keys
The need for sender and receiver to share secret information over public channels is completely eliminated.
![Page 12: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/12.jpg)
Data security
![Page 13: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/13.jpg)
Data Security
Many large organizations use computers to store important data (information). Large companies, government departments, colleges and hospitals all keep important information, for example, employee records and wages, patient or student records and accounts.
Why?
1. Efficiency2. Accuracy3. Capacity4. Sharing and Transmission etc.
![Page 14: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/14.jpg)
Why your Information Sensitive? What would happen if your competitor had a copy of a spreadsheet file
containing your short and long term sales strategy?What could a resourceful private detective and a cunning lawyer do with
information on your computer?
Sensitive Information
Sensitive information is any information stored on your computer that you would hate to have fall into the wrong hands. This could be personal information, employee information, trade secrets, etc. It is the ramifications that are the concern.
Data Security
![Page 15: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/15.jpg)
Data Security
There are two problems with keeping this information on computers. The first problem is information can be lost through technical or human error.
The second problem is that some information is confidential - only certain people should see it. These people can be described as ‘authorized users’ and the people who shouldn’t see this information as ‘unauthorized users’.
![Page 16: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/16.jpg)
Security of Data
Data
Confidentiality
Data
Integrity
Data
Availability
Secure Data
Data
![Page 17: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/17.jpg)
Document security
![Page 18: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/18.jpg)
![Page 19: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/19.jpg)
![Page 20: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/20.jpg)
![Page 21: IT](https://reader036.fdocuments.in/reader036/viewer/2022070317/556524c1d8b42a767f8b4804/html5/thumbnails/21.jpg)