SlideShare uma empresa Scribd logo
1 de 17
Internet Security
By
Satya praveen
Ola!
I am Satya Praveen
Objectives
• What is Internet Security
• Threats we encounter from Internet.
• Remedies
What is internet Security
Threats:
◎ Malicious software
◎ Denialofservice attacks
◎ Phishing
◎ Application vulnerabilities
Remedies:
◎Network layer security: secured with cryptographic methods
and security protocols.
◎ Internet Protocol Security (IPsec):It provides security and
authentication at the IP layer by transforming data using
encryption.
◎ Security token: Some online sites offer customers the ability
to use a six digit code which randomly changes every 30–60
seconds on a security token.
◎ Electronic mail security: Email messages are composed,
delivered, and stored in a multiple step process.
◎Firewalls : Firewalls also screen network traffic and are able to
block traffic that is dangerous.
Hackers???
◎One who uses a computer to gain
unauthorised access to data , or to carry out
malicious attacks.
Tips :
• Always lock your personal computer and mobile phones.
• Never ever log Into your personal accounts(email ,bank) from
anyone else’s computer unless necessary.
• Always update your anti-virus
• Never open unnecessary mails or websites which you are not
aware of they may contain bots or spyware which could steal
your personal data.
• Always Have backup data of most important things.
“
I think computer viruses should count as life. I think it
says something about human nature that the only form
of life we have created so far is purely
destructive. We’ve created life in our own image.
-stephen hawking.
Every Click
Matters?
Think Before you
Click.
$171 Billion
Whoa! That’s a big number
The Loss of Sony in 2011 when it got Hacked
$ 589,526,124
That’s a lot of money
185,244 users
And a lot of users
Any Questions?
Feedback Please……
Thanks!
You can find me at:
pokanatipraveen@gmail.com

Mais conteúdo relacionado

Mais procurados

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Brief Introduction of Hackers
Brief Introduction of HackersBrief Introduction of Hackers
Brief Introduction of HackersChintzy
 

Mais procurados (18)

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Hacking
HackingHacking
Hacking
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Hacking
HackingHacking
Hacking
 
New internet security
New internet securityNew internet security
New internet security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Brief Introduction of Hackers
Brief Introduction of HackersBrief Introduction of Hackers
Brief Introduction of Hackers
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Destaque

127041059 understanding-timing-and-using-the-digital-social-media-ecosystem
127041059 understanding-timing-and-using-the-digital-social-media-ecosystem127041059 understanding-timing-and-using-the-digital-social-media-ecosystem
127041059 understanding-timing-and-using-the-digital-social-media-ecosystemMaria Velardi
 
Інструменти е-врядування та е-демократії спрямовані на забезпечення ефективно...
Інструменти е-врядування та е-демократії спрямовані на забезпечення ефективно...Інструменти е-врядування та е-демократії спрямовані на забезпечення ефективно...
Інструменти е-врядування та е-демократії спрямовані на забезпечення ефективно...Olena Ursu
 
Bawse legacy 2.2!
Bawse legacy 2.2!Bawse legacy 2.2!
Bawse legacy 2.2!ChanPear
 
презентация антон сурик
презентация антон сурикпрезентация антон сурик
презентация антон сурикAnton Surov
 
プロトタイピング用途の基板に欲しい拡張基板
プロトタイピング用途の基板に欲しい拡張基板プロトタイピング用途の基板に欲しい拡張基板
プロトタイピング用途の基板に欲しい拡張基板Kenichi Yoshida
 
Questions to Ask Your Ithaca College Student
Questions to Ask Your Ithaca College StudentQuestions to Ask Your Ithaca College Student
Questions to Ask Your Ithaca College StudentBailey Reagan
 
автомобиль и ос 1
автомобиль и ос 1автомобиль и ос 1
автомобиль и ос 1Demanessa
 
Wie konnen Sie Fax mit iPhone senden
Wie konnen Sie Fax mit iPhone sendenWie konnen Sie Fax mit iPhone senden
Wie konnen Sie Fax mit iPhone sendenJohnny Snowie
 
программа воспитания гуманных отношений среди подростков и молодежи
программа воспитания гуманных отношений среди подростков и молодежипрограмма воспитания гуманных отношений среди подростков и молодежи
программа воспитания гуманных отношений среди подростков и молодежиDemanessa
 
Shirley Temple: 7 Memorable Movie Roles
Shirley Temple: 7 Memorable Movie RolesShirley Temple: 7 Memorable Movie Roles
Shirley Temple: 7 Memorable Movie RolesStinson
 
My opinion on boom placer
My opinion on boom placerMy opinion on boom placer
My opinion on boom placerNitin Kumar
 
Yourvid YES Digital LdV TOI Project
Yourvid YES Digital LdV TOI ProjectYourvid YES Digital LdV TOI Project
Yourvid YES Digital LdV TOI ProjectNicoleta Olcott
 
Runners society
Runners societyRunners society
Runners societyHajin Lim
 

Destaque (20)

127041059 understanding-timing-and-using-the-digital-social-media-ecosystem
127041059 understanding-timing-and-using-the-digital-social-media-ecosystem127041059 understanding-timing-and-using-the-digital-social-media-ecosystem
127041059 understanding-timing-and-using-the-digital-social-media-ecosystem
 
Інструменти е-врядування та е-демократії спрямовані на забезпечення ефективно...
Інструменти е-врядування та е-демократії спрямовані на забезпечення ефективно...Інструменти е-врядування та е-демократії спрямовані на забезпечення ефективно...
Інструменти е-врядування та е-демократії спрямовані на забезпечення ефективно...
 
Artem serenok
Artem serenokArtem serenok
Artem serenok
 
Placemaking Conference: Pedaling Toward Healthy Communities
Placemaking Conference: Pedaling Toward Healthy CommunitiesPlacemaking Conference: Pedaling Toward Healthy Communities
Placemaking Conference: Pedaling Toward Healthy Communities
 
Bawse legacy 2.2!
Bawse legacy 2.2!Bawse legacy 2.2!
Bawse legacy 2.2!
 
презентация антон сурик
презентация антон сурикпрезентация антон сурик
презентация антон сурик
 
プロトタイピング用途の基板に欲しい拡張基板
プロトタイピング用途の基板に欲しい拡張基板プロトタイピング用途の基板に欲しい拡張基板
プロトタイピング用途の基板に欲しい拡張基板
 
Questions to Ask Your Ithaca College Student
Questions to Ask Your Ithaca College StudentQuestions to Ask Your Ithaca College Student
Questions to Ask Your Ithaca College Student
 
Yrflvr
YrflvrYrflvr
Yrflvr
 
10. mamatova
10. mamatova10. mamatova
10. mamatova
 
Peran bpk ri
Peran bpk riPeran bpk ri
Peran bpk ri
 
автомобиль и ос 1
автомобиль и ос 1автомобиль и ос 1
автомобиль и ос 1
 
Wie konnen Sie Fax mit iPhone senden
Wie konnen Sie Fax mit iPhone sendenWie konnen Sie Fax mit iPhone senden
Wie konnen Sie Fax mit iPhone senden
 
программа воспитания гуманных отношений среди подростков и молодежи
программа воспитания гуманных отношений среди подростков и молодежипрограмма воспитания гуманных отношений среди подростков и молодежи
программа воспитания гуманных отношений среди подростков и молодежи
 
Interview AME LEAD
Interview AME LEADInterview AME LEAD
Interview AME LEAD
 
Abc2015 winterkobe
Abc2015 winterkobeAbc2015 winterkobe
Abc2015 winterkobe
 
Shirley Temple: 7 Memorable Movie Roles
Shirley Temple: 7 Memorable Movie RolesShirley Temple: 7 Memorable Movie Roles
Shirley Temple: 7 Memorable Movie Roles
 
My opinion on boom placer
My opinion on boom placerMy opinion on boom placer
My opinion on boom placer
 
Yourvid YES Digital LdV TOI Project
Yourvid YES Digital LdV TOI ProjectYourvid YES Digital LdV TOI Project
Yourvid YES Digital LdV TOI Project
 
Runners society
Runners societyRunners society
Runners society
 

Semelhante a Internet security

Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 

Semelhante a Internet security (20)

Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Internet security

  • 2. Ola! I am Satya Praveen
  • 3. Objectives • What is Internet Security • Threats we encounter from Internet. • Remedies
  • 4. What is internet Security
  • 5. Threats: ◎ Malicious software ◎ Denialofservice attacks ◎ Phishing ◎ Application vulnerabilities
  • 6. Remedies: ◎Network layer security: secured with cryptographic methods and security protocols. ◎ Internet Protocol Security (IPsec):It provides security and authentication at the IP layer by transforming data using encryption. ◎ Security token: Some online sites offer customers the ability to use a six digit code which randomly changes every 30–60 seconds on a security token. ◎ Electronic mail security: Email messages are composed, delivered, and stored in a multiple step process. ◎Firewalls : Firewalls also screen network traffic and are able to block traffic that is dangerous.
  • 7. Hackers??? ◎One who uses a computer to gain unauthorised access to data , or to carry out malicious attacks.
  • 8. Tips : • Always lock your personal computer and mobile phones. • Never ever log Into your personal accounts(email ,bank) from anyone else’s computer unless necessary. • Always update your anti-virus • Never open unnecessary mails or websites which you are not aware of they may contain bots or spyware which could steal your personal data. • Always Have backup data of most important things.
  • 9. “ I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image. -stephen hawking.
  • 10.
  • 12.
  • 13. $171 Billion Whoa! That’s a big number The Loss of Sony in 2011 when it got Hacked
  • 14. $ 589,526,124 That’s a lot of money 185,244 users And a lot of users
  • 17. Thanks! You can find me at: pokanatipraveen@gmail.com