Upload
lulughosh
View
217
Download
0
Embed Size (px)
Citation preview
8/13/2019 It Pptttttt - Copy
1/30
8/13/2019 It Pptttttt - Copy
2/30
8/13/2019 It Pptttttt - Copy
3/30
Confidentiality
Integrity
Availability
Authenticity
Non-repudiation
8/13/2019 It Pptttttt - Copy
4/30
ADWARE
8/13/2019 It Pptttttt - Copy
5/30
Adware is software that displays
advertisements on your computer.
It becomes a problem if it:
- installs itself
- hijacks your web browser and gathersdata on your web browsing
difficult to uninstall connection
slow down your pc and internet connection
8/13/2019 It Pptttttt - Copy
6/30
Backdoor Trojans
8/13/2019 It Pptttttt - Copy
7/30
8/13/2019 It Pptttttt - Copy
8/30
BLUEJACKING
8/13/2019 It Pptttttt - Copy
9/30
Blue jacking is sending anonymous,
unwanted messages to other users with
Bluetooth-enabled mobile phones or
laptops.
Blue jacking is essentially harmless
8/13/2019 It Pptttttt - Copy
10/30
BLUESNARFING
Bluesnarfing is the theft of data from aBluetooth phone.
Bluesnarfing depends on the ability ofBluetooth-enabled devices to detect andcontact others nearby
mobile phones serial number can also bedownloaded and used to clone thephone.
8/13/2019 It Pptttttt - Copy
11/30
8/13/2019 It Pptttttt - Copy
12/30
Create copies of themselves
Spread via internet
Use communication between computers to spread.
8/13/2019 It Pptttttt - Copy
13/30
PAGE-JACKING
Replicas of reputable web pages
Offensive materials
Reduces websites revenue
Search engines less useful.
Used in phishing attacks.
8/13/2019 It Pptttttt - Copy
14/30
Use of bogus emails and websites to trick you into supplying
confidential or personal information.
8/13/2019 It Pptttttt - Copy
15/30
8/13/2019 It Pptttttt - Copy
16/30
BROWSER HIJACKERS
Redirect computer users to bogus websites to deploy the
computer malware.
Default home and search pages changes
Changes browser settings without users permission.
8/13/2019 It Pptttttt - Copy
17/30
CRYPTOGRAPHY
8/13/2019 It Pptttttt - Copy
18/30
Components
Sender
Encryption
Receiver
Decryption
8/13/2019 It Pptttttt - Copy
19/30
key
A number or a set of
numbers
150 ,300 or more
Cipher operates on it
Symmetric keySame secret key
symmetric keySender: public key
Receiver: private key
8/13/2019 It Pptttttt - Copy
20/30
Message uthenticity
Digital Signature
electronic Non - repudiation
8/13/2019 It Pptttttt - Copy
21/30
8/13/2019 It Pptttttt - Copy
22/30
Characteristics
Inclusion
Verification
Relationship
Duplicity
8/13/2019 It Pptttttt - Copy
23/30
Captcha"Automated Turing Tests"
graphic images
deciphered by people
Create an account
8/13/2019 It Pptttttt - Copy
24/30
FIREW LLDevice between
internal network and
internet
Forward & filter packets
8/13/2019 It Pptttttt - Copy
25/30
Packet ilter irewall Proxy irewall
Based onsource,
destination address
Uses filtering table to
decide which packets
must be discarded.
Filter message based on
information inside
A proxy computer
between client &
corporation computer
8/13/2019 It Pptttttt - Copy
26/30
Anti Virus
Software
Protect computer against viruses
Keeps your computer healthy
Update your antivirus software regularly
8/13/2019 It Pptttttt - Copy
27/30
How Antivirus software works
Code characteristic of the virus
Blocks the execution of code and alerts the user
Virus is then isolated and destroyed
Regularly update your antivirus
Automatic update set it and forget it
8/13/2019 It Pptttttt - Copy
28/30
Top anti viruses
Shield deluxeAntivirus protection
Trend micro antivirus internet security
Bit defender antivirus Norton antivirus
McAfee virus scan
Zone Alarm antivirus Kaspersky Antivirus
8/13/2019 It Pptttttt - Copy
29/30
Steps to help remove a virus
Visit Microsoft update and install the latest
updates.
Update your software and perform a thorough
scan of your system.
Download, install and run the malicious
software removal tool.
8/13/2019 It Pptttttt - Copy
30/30
References
Data Communications and Networking ;
Behrouz A. Forousan
www.whatsthelatest.net
www.itsecurity.com
www.searchsecurity.techtarget.com