Sunday, February 22, 2009

computer security .doc (abstract)

ABSTRACT ON COMPUTER SECURITY

As a part of this paper presentation we are going to present you the different concepts of security with real time examples tested by us. Along with that we present the remedies to that loop holes. We discuss some of the concepts which are stated below briefly.

WHAT IS COMPUTER SECURITY?

Computer security is a branch of information security applied to both theoretical and actual computer systems. Computer security is a branch of computer science that addresses enforcement of 'secure' behavior on the operation of computers. The definition of ‘secure’ varies by application, and is typically defined implicitly or explicitly by a security policy that addresses Confidentiality, Integrity and Availability of electronic information that is processed by or stored on computer systems.

WHY DO WE NEED SECURITY?

In the ever changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is becoming more and more of an issue. Security is now a basic requirement because global computing is inherently insecure. As your data goes from point A to point B on the Internet, for example, it may pass through several other points along the way, giving other users the opportunity to intercept, and even alter it. It does nothing to protect your data center, other servers in our network, or a malicious user with physical access to your EnGarde system.

Security has been getting more and more attention recently, as attacks against even personal computers (viruses, worms, spam), or banking cards, or mobile phones, etc., are becoming more and more frequent, and more and more well-known to the general public.

INTERNET SECURITY.

In this paper we discuss about the methods to protect our data, protect our system while on internet and to protect all the data base’s and images from being manipulated .The topics of security we are going to discuss briefly are

· Computer Security terminology.

· Password Security.

· E-mail security.

· Web Security.

PASSWORD SECURITY:

· Are password rules too complex?

-Computer hardware speed and price are always dropping.

· POST-IT-NOTES:

-Is your computer in a locked room?

-Who has physical access to your system?

-A majority of system attacks originate through network

E-MAIL SECURITY:

· COMMON E-MAIL PROTOCOLS:

1. POPS-POP over an SSL connection.

2. IMAPS-IMAP over an SSL connection.

3. SMTP+TLS-negoioation of a TLS/SSL connection

after connecting.

4. All popular e-mail uses the following e-mail protocols.

· Protection of E-mails using

-Digital Signatures.

-Digital Encryption.

WEB SECURITY:

· SSL: Secure Sockets Layer.

· Spyware/Adware.

· Firewall.

PEER-PEER FILE SHARING (P2P):

· Issues to consider while P2P.

· Anti-virus.

Remedies: We provide different remedies that can be followed by both the developers and users of the web to get protected and thus we shall conclude the presentation

No comments:

Post a Comment