SlideShare a Scribd company logo
Data Security
Topics to be covered Encryption Firewalls Virtual Private Network Authentication Digital Certification Digital Certificate Certification Authorities Digital Signatures Internet  Virus Online Data Security Assistants
Encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security.  To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it.  Unencrypted data is called plain text; encrypted data is referred to as cipher text.  There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.
Firewall A combination of hardware and software that secures access to and from the LAN. A firewall blocks unwanted access to the protected network while giving the protected network access to networks outside of the firewall.  An organization will typically install a firewall to give users access to the internet while protecting their internal information.
Sample usage of Firewall Public/External Internet Users Intranet Clients Servers ERP Legacy systems E-mail servers Web servers Databases Firewalls
Virtually Private Network (VPN) VPN is a secure network on the Internet using  the tunneling schemes “ tunnels ” are secure data flows w/ cryptography and authorization algorithms The major objective of a VPN is to use the Internet as an inexpensive WAN backbone
VPNs (cont:) When two sites are connected across a VPN, each must have a VPN-capable router, firewall, or VPN access device installed When VPN is used to link mobile clients with Internet dial-up connections, the laptops must be equipped with VPN client software equipped with the addresses and associated encryption keys for corporate host sites
Usage of the VPNs Tunneling Internet Extranet Intranet Firewall Intranet Firewall Suppliers VPN Distributors VPN Customers VPN
Authentication Determines a user's identity, as well as determining what a user is authorized to access.  The most common form of authentication is user name and password, although this also provides the lowest level of security.  VPNs use digital certificates and digital signatures to more accurately identify the user.
Digital Certificate Electronic counterparts  to driver licenses, passports. Certificates  are the framework for identification information, and bind identities with public keys. They provide a foundation for identification , authentication and non-repudiation. Enable individuals and organizations  to secure business and personal transactions across communication networks .
Certification Authorities Trusted organization that issues certificates and maintains status information about certificates. Certification Practice Statement
How Digital Certificates work? Generate Public and Private Keys. Get Certificate from the CA Sign the document/page using the private key.  Send signed document over open networks along with the CA’s certificate. Recipient verifies using the signing CA’s public key Trust Chain and Fingerprints
Types of Certificates Root or Authority certificates These are self signed by the CA that created them  Institutional authority certificates Also called as “campus certificates”  Client certificates These are also known as end-entity  certificates, identity certificates,or personal  certificates. Web server certificates used for secure communications to and from  Web servers
Digital Signature An electronic signature that can be used to authenticate the identity of the sender of a message, or of the signer of a document.  It can also be used to ensure that the original content of the message or document that has been conveyed is unchanged.
Internet Virus Issue Computer virus A virus is a type of program that can replicate itself by making (possibly modified) copies of itself.  A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable disk
Internet Virus Issue (cont) Macro virus Macro viruses are a special case of viruses. Instead of infecting software program files directly, macro viruses infect Microsoft Office documents and templates. Worm computer worms are malicious programs that copy themselves from system to system, rather than sensitive legal files. Trojan horse Trojans, another form of malware, are generally agreed upon as doing something other than the user expected,  with that “something” defined as malicious.
Internet Virus Issue (cont) Hybrids In fact, most dangerous software combines the features of several types. One of the first successful e-mail attacks, the  Happy99 Virus , wasn't merely a virus. Malware Taken as a group, these many types of software are called "malicious software", because they modify your computer's files without asking and attempt to perform some kind of annoying or dangerous activity. Spam "Spamming [the sending of unsolicited email] is the scourge of electronic-mail and newsgroups on the Internet.
Virus Encyclopedia 1. File Viruses, DOS 2. Boot Viruses 3. Multipartite (File and Boot) Viruses 4. Multi-Platform Viruses 5. NewExe Viruses 6. Macro Viruses  7. Virus Constructors 8. Windows HLP Viruses 9. Java Viruses 10. Trojan horses 11. Script Viruses 12. Internet Worms 13. Virus Hoaxes and Non-         Viruses 14. Palm 15. Malware 16. Jokes 17. Worms 18. Spam
Top Ten Virus List
Install anti-virus software and keep the virus definitions up to date.  Don't automatically open attachments  Scan all incoming email attachments  Get immediate protection  Update your anti-virus software frequently.  Avoid downloading files you can't be sure are safe  Don't boot from a floppy disk  Don't share floppies  Scan floppies before using them  Use common sense  Golden Tips to prevent Virus
Main Features of AntiVirus Provides complete e-mail Eliminates all types of viruses    Easy to use: install and forget  Automatic virus definitions updates    Uses powerful virus scanning engines    Provides complete e-mail protection  Creates detailed scan reports ..etc
Powerful Anti-Virus Virus Encyclopedia   http:// www.antivirus.com/vinfo/virusencyclo /   Virus pattern downloads   http:// www.antivirus.com/download/pattern.asp   Subscribe to email alerts on Virus   http:// www.antivirus.com/vinfo /   Online virus scanner, Housecall                              http:// housecall.antivirus.com /   Real-time Virus Tracking   http:// wtc.trendmicro.com/wtc /   Mcafee Security http:// www.mcafee.com Nortan Antivirus http:// symantec.com
 
www.cert.org
www.mmcert.org.mm
Thanks You! e-mail :  [email_address]   MCC- [email_address]   Tel   : 245758, 245762

More Related Content

PPT
Chapter 3 Ensuring Internet Security
PPTX
Client server security threats
PPTX
CSC103 Digital Security
PPT
Ch03 Network and Computer Attacks
PPT
Ne Course Part One
PPT
ISDD Security Precautions
PPTX
Computing safety ryr
PPTX
Client server network threat
Chapter 3 Ensuring Internet Security
Client server security threats
CSC103 Digital Security
Ch03 Network and Computer Attacks
Ne Course Part One
ISDD Security Precautions
Computing safety ryr
Client server network threat

What's hot (20)

PDF
Client /server security overview
PPTX
Introduction to Malwares
PPS
Sreerag cs network security
PDF
Amenazas Informática
PPT
this is test for today
PPTX
Cyber Security
PPTX
Security threats
PPT
ISDD Hacking and Viruses
PDF
Network security for E-Commerce
PPT
Dilasha Shrestha Slideshow 3
PPTX
Ransomware and email security ver - 1.3
PDF
Web Server Security Guidelines
PPTX
Types of attacks in cyber security
PPT
1 security goals
PPT
Cyber security and emails presentation
PPTX
Data and Message Security
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
PPT
Network management and security
PPT
Phishing, Pharming, and the latest potholes on the Information Highway
PDF
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Client /server security overview
Introduction to Malwares
Sreerag cs network security
Amenazas Informática
this is test for today
Cyber Security
Security threats
ISDD Hacking and Viruses
Network security for E-Commerce
Dilasha Shrestha Slideshow 3
Ransomware and email security ver - 1.3
Web Server Security Guidelines
Types of attacks in cyber security
1 security goals
Cyber security and emails presentation
Data and Message Security
Class 11 ca chapter 17 computer ethics and cyber crime
Network management and security
Phishing, Pharming, and the latest potholes on the Information Highway
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Ad

Viewers also liked (20)

PPTX
Unit 4 Commerce and Cyberspace
PPTX
Unit 3 Cyber Crimes and Torts 8 hr
PPTX
Cyber Crime And Cyber Security
PPTX
PPT
28658043 cyber-terrorism
PPT
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
PPTX
Shreya Singhal vs Union Of India (Case Study)
PPT
Cyberstalking
PPSX
Cyber crime
PPT
INDIAN CYBERLAW
PDF
Cyber Harassment
PPT
Information technology-act 2000
PDF
Encryption authentication access_control_jon green
PPTX
cyber stalking
PPTX
4.2.1 computer security risks
PPTX
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
PPTX
Cyber crime types & laws
PPT
cyber terrorism
PPT
Seminar on Cyber Crime
PDF
Cyber law-it-act-2000
Unit 4 Commerce and Cyberspace
Unit 3 Cyber Crimes and Torts 8 hr
Cyber Crime And Cyber Security
28658043 cyber-terrorism
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
Shreya Singhal vs Union Of India (Case Study)
Cyberstalking
Cyber crime
INDIAN CYBERLAW
Cyber Harassment
Information technology-act 2000
Encryption authentication access_control_jon green
cyber stalking
4.2.1 computer security risks
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Cyber crime types & laws
cyber terrorism
Seminar on Cyber Crime
Cyber law-it-act-2000
Ad

Similar to Data Security (20)

PPT
Safe Computing At Home And Work
PDF
How to Protect Your Devices from Internet-Based Malware.pdf
PPTX
Computer security threats & prevention
PPTX
Internet security
PPTX
Network and Security | by M.Hassaan Anjum
PPT
Cyber-Security-.ppt
PPTX
Internet safety and you
PPTX
2nd Class PPT.pptx
PPT
Tutorial 09 - Security on the Internet and the Web
 
PPT
Cyber-Security.ppt
DOC
Computer Secutity.
PPTX
Lecture 2.pptx
PPTX
Lecture 2.pptx
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber security and detailed informat.ppt
PPTX
Computing safety
PPTX
Cyber security
PPTX
Computer security ethics_and_privacy
PPT
IT8005_EC_Unit_III_Securing_Communication_Channels
PPTX
Computer security
Safe Computing At Home And Work
How to Protect Your Devices from Internet-Based Malware.pdf
Computer security threats & prevention
Internet security
Network and Security | by M.Hassaan Anjum
Cyber-Security-.ppt
Internet safety and you
2nd Class PPT.pptx
Tutorial 09 - Security on the Internet and the Web
 
Cyber-Security.ppt
Computer Secutity.
Lecture 2.pptx
Lecture 2.pptx
Cyber-Security-20211013105857.ppt
Cyber security and detailed informat.ppt
Computing safety
Cyber security
Computer security ethics_and_privacy
IT8005_EC_Unit_III_Securing_Communication_Channels
Computer security

More from backdoor (20)

PPT
Java Database Connectivity
PPT
Distributed Programming using RMI
PPT
Programming Server side with Sevlet
PPT
Distributed Programming using RMI
PPT
Client Side Programming with Applet
PPT
Java Network Programming
PPT
Windows Programming with Swing
PPT
Windows Programming with AWT
PPT
Multithreading
PPT
Object and Classes in Java
PPT
IO and serialization
PPT
Exception Handling
PPT
Java Intro
PPT
Object Oriented Programming with Java
PPT
AWT Program output
PPT
Net Man
PPT
Ne Course Part Two
PPT
Net Sec
PDF
Security Policy Checklist
PPT
Bcis Csm Chapter Three
Java Database Connectivity
Distributed Programming using RMI
Programming Server side with Sevlet
Distributed Programming using RMI
Client Side Programming with Applet
Java Network Programming
Windows Programming with Swing
Windows Programming with AWT
Multithreading
Object and Classes in Java
IO and serialization
Exception Handling
Java Intro
Object Oriented Programming with Java
AWT Program output
Net Man
Ne Course Part Two
Net Sec
Security Policy Checklist
Bcis Csm Chapter Three

Recently uploaded (20)

PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
DOCX
Business Management - unit 1 and 2
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Keppel_Proposed Divestment of M1 Limited
PDF
How to Get Funding for Your Trucking Business
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Hindu Circuler Economy - Model (Concept)
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
Charisse Litchman: A Maverick Making Neurological Care More Accessible
Comments on Crystal Cloud and Energy Star.pdf
NEW - FEES STRUCTURES (01-july-2024).pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
340036916-American-Literature-Literary-Period-Overview.ppt
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Business Management - unit 1 and 2
Business Ethics - An introduction and its overview.pptx
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Deliverable file - Regulatory guideline analysis.pdf
Keppel_Proposed Divestment of M1 Limited
How to Get Funding for Your Trucking Business
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Module 2 - Modern Supervison Challenges - Student Resource.pdf
Nidhal Samdaie CV - International Business Consultant
Hindu Circuler Economy - Model (Concept)
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers

Data Security

  • 2. Topics to be covered Encryption Firewalls Virtual Private Network Authentication Digital Certification Digital Certificate Certification Authorities Digital Signatures Internet Virus Online Data Security Assistants
  • 3. Encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.
  • 4. Firewall A combination of hardware and software that secures access to and from the LAN. A firewall blocks unwanted access to the protected network while giving the protected network access to networks outside of the firewall. An organization will typically install a firewall to give users access to the internet while protecting their internal information.
  • 5. Sample usage of Firewall Public/External Internet Users Intranet Clients Servers ERP Legacy systems E-mail servers Web servers Databases Firewalls
  • 6. Virtually Private Network (VPN) VPN is a secure network on the Internet using the tunneling schemes “ tunnels ” are secure data flows w/ cryptography and authorization algorithms The major objective of a VPN is to use the Internet as an inexpensive WAN backbone
  • 7. VPNs (cont:) When two sites are connected across a VPN, each must have a VPN-capable router, firewall, or VPN access device installed When VPN is used to link mobile clients with Internet dial-up connections, the laptops must be equipped with VPN client software equipped with the addresses and associated encryption keys for corporate host sites
  • 8. Usage of the VPNs Tunneling Internet Extranet Intranet Firewall Intranet Firewall Suppliers VPN Distributors VPN Customers VPN
  • 9. Authentication Determines a user's identity, as well as determining what a user is authorized to access. The most common form of authentication is user name and password, although this also provides the lowest level of security. VPNs use digital certificates and digital signatures to more accurately identify the user.
  • 10. Digital Certificate Electronic counterparts to driver licenses, passports. Certificates are the framework for identification information, and bind identities with public keys. They provide a foundation for identification , authentication and non-repudiation. Enable individuals and organizations to secure business and personal transactions across communication networks .
  • 11. Certification Authorities Trusted organization that issues certificates and maintains status information about certificates. Certification Practice Statement
  • 12. How Digital Certificates work? Generate Public and Private Keys. Get Certificate from the CA Sign the document/page using the private key. Send signed document over open networks along with the CA’s certificate. Recipient verifies using the signing CA’s public key Trust Chain and Fingerprints
  • 13. Types of Certificates Root or Authority certificates These are self signed by the CA that created them Institutional authority certificates Also called as “campus certificates” Client certificates These are also known as end-entity certificates, identity certificates,or personal certificates. Web server certificates used for secure communications to and from Web servers
  • 14. Digital Signature An electronic signature that can be used to authenticate the identity of the sender of a message, or of the signer of a document. It can also be used to ensure that the original content of the message or document that has been conveyed is unchanged.
  • 15. Internet Virus Issue Computer virus A virus is a type of program that can replicate itself by making (possibly modified) copies of itself. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable disk
  • 16. Internet Virus Issue (cont) Macro virus Macro viruses are a special case of viruses. Instead of infecting software program files directly, macro viruses infect Microsoft Office documents and templates. Worm computer worms are malicious programs that copy themselves from system to system, rather than sensitive legal files. Trojan horse Trojans, another form of malware, are generally agreed upon as doing something other than the user expected, with that “something” defined as malicious.
  • 17. Internet Virus Issue (cont) Hybrids In fact, most dangerous software combines the features of several types. One of the first successful e-mail attacks, the Happy99 Virus , wasn't merely a virus. Malware Taken as a group, these many types of software are called "malicious software", because they modify your computer's files without asking and attempt to perform some kind of annoying or dangerous activity. Spam "Spamming [the sending of unsolicited email] is the scourge of electronic-mail and newsgroups on the Internet.
  • 18. Virus Encyclopedia 1. File Viruses, DOS 2. Boot Viruses 3. Multipartite (File and Boot) Viruses 4. Multi-Platform Viruses 5. NewExe Viruses 6. Macro Viruses 7. Virus Constructors 8. Windows HLP Viruses 9. Java Viruses 10. Trojan horses 11. Script Viruses 12. Internet Worms 13. Virus Hoaxes and Non- Viruses 14. Palm 15. Malware 16. Jokes 17. Worms 18. Spam
  • 20. Install anti-virus software and keep the virus definitions up to date. Don't automatically open attachments Scan all incoming email attachments Get immediate protection Update your anti-virus software frequently. Avoid downloading files you can't be sure are safe Don't boot from a floppy disk Don't share floppies Scan floppies before using them Use common sense Golden Tips to prevent Virus
  • 21. Main Features of AntiVirus Provides complete e-mail Eliminates all types of viruses   Easy to use: install and forget Automatic virus definitions updates   Uses powerful virus scanning engines   Provides complete e-mail protection Creates detailed scan reports ..etc
  • 22. Powerful Anti-Virus Virus Encyclopedia http:// www.antivirus.com/vinfo/virusencyclo / Virus pattern downloads http:// www.antivirus.com/download/pattern.asp Subscribe to email alerts on Virus http:// www.antivirus.com/vinfo / Online virus scanner, Housecall                             http:// housecall.antivirus.com / Real-time Virus Tracking http:// wtc.trendmicro.com/wtc / Mcafee Security http:// www.mcafee.com Nortan Antivirus http:// symantec.com
  • 23.  
  • 26. Thanks You! e-mail : [email_address] MCC- [email_address] Tel : 245758, 245762