Network Security and Concepts
Network Security and Concepts
SCIENCE
LEARNING
PRESENTATION
WELCOME
SUBSCRIBE
PARINAY
TO MY SETH
PRESENTATION
NETWORK SECURITY
CONCEPTS
INTRODUCTION
• Network security is an activity designed to
MESSAGES
protect the usability and integrity of your
network and data.
• Network security involves the authorization
HEY WHAT’S UP!!
of access to data in a network, which is YEAH GOOD
TYPES
• File Virus
• Boot sector virus
• Macro virus ``
SYMPTOMS & PREVENTION
SYMPTOMS
• Takes longer time to load applications.
• Shows unpredictable program behavior.
• Shows inexplicable changes in file sizes.
• Strange graphics appearing on your
screen.
PREVENTION
• Install Anti-Virus/Malware Software. ``
TYPES
• Email.
• Instant messaging (IM).
• Internet relay chat (IRC).
• File sharing. ``
• Internet.
SYMPTOMS & PREVENTION
SYMPTOMS
• Slow computer performance.
• Freezing/crashing.
• Programs opening & running automatically.
• Missing/modified files.
PREVENTION
• Use a personal firewall to block external
access to network services. ``
• You should use care when clicking on links
in social media and email messages.
TORJON HORSE
TYPES | SYMPTOMS | PREVENTION
INTRODUCTION / TYPES
A Trojan horse is a program that contains hidden
malicious functions. It trick users into installing them
by appearing to be genuine programs. Once
installed on a system, they reveal their true nature
and cause damage.
Types
• Trojan-Banker
• Trojan-DdoS
``
• Trojan-Downloader
• Trojan-Dropper
• Trojan-Game Thief
SYMPTOMS & PREVENTION
SYMPTOMS
• Unexpected pop-up windows.
• Crashes and error messages.
• Suspicious hard drive activity.
• Slow start up and slow performance.
PREVENTION
• Do regular backup of system.
• Scan all email attachment with an
``
anti virus before opening it.
• Never open Instant Message (IM)
attachments from unknown people.
SPAMS
INTRODUCTION
INTRODUCTION
The term spam means endless
repetition of worthless text. In
other words, unwanted messages
or mails are known as Spam. At
times internet is flooded with
multiple copies of the same
message, it is nothing but spam.
``
COOKIES
INTRODUCTION
INTRODUCTION
A cookie is a text file that a Web
browser stores on a user’s machine.
They are used by websites for
authentication, storing website
information/ preferences, other
browsing information
``
FIREWALL
INTRODUCTION
INTRODUCTION
A firewall is software used to
maintain the security of a private
network. They unauthorized access
to or from private networks and are
often employed to prevent
unauthorized Web users or illicit
software from gaining access to
private networks connected to the
Internet. ``
CYBER CRIME
INTRODUCTION
INTRODUCTION
Cybercrime is defined as a crime in which
a computer and internet is used in an
illegitimate way to harm
the user.
The list of Cyber Crimes includes:-
• Hacking.
• Cyberstalking.
• Online identity theft.
• Online child abuse. ``
• Ransomware attack.
• Internet fraud.
CYBER LAW
INTRODUCTION | IT ACT
INTRODUCTION
Cyber law is an attempt to integrate the challenges presented
by human activity on the internet with legal system of laws
applicable to the physical world.
``
INFORMATION TECHNOLOGY ACT
INFORMATION TECHNOLOGY ACT,
2000" [ITA-2000] was enacted by
Parliament of India to protect the field
of e-commerce, e-governance, e-
banking as well as penalties and
punishments in the field of Cyber
Crimes
``
INTELLECTUAL PROPERTY
RIGHTS (IPR) ISSUES
INTRODUCTION
Intellectual property rights are the
rights given to an individual over the
invention of their own. They usually
give the creator an exclusive right over
the use of his/her creation for a certain
period of time..
``
WAYS TO PROTECT INTELLECTUAL PROPERTY
1. Copyrights
Copyright is the term used for a written
document. A legal action can be taken, if
copyrights are violated.
2. Trademarks
Trademark can be defined as a name or a
different sign or a device identifying a product ``
or a service.
WAYS TO PROTECT INTELLECTUAL PROPERTY
3. Patents
A Patent is a term used for a specific
product designed by an individual.
The designer is given exclusive rights
over the patent for a limited period of
time
``
HACKING
INTRODUCTION | TYPES
INTRODUCTION
A computer enthusiast, who uses his computer programming skills
to intentionally access a computer without authorization is known
as hacking. The computer enthusiast involved in this activity is
known as a hacker.
``
TYPES OF HACKING
• Website Hacking.
• Network Hacking.
• Ethical Hacking.
• Email Hacking.
• Password Hacking.
• Online Banking Hacking.
• Computer Hacking.
``