1 / 12

Internet security for the home

Internet security for the home. Paul Norton MEng(Hons) AMIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet security from the viewpoint of the home user…. Profile of the Home internet user. Traditionally, home internet usage has tended to be:-

trory
Télécharger la présentation

Internet security for the home

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet security for the home Paul Norton MEng(Hons) AMIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet security from the viewpoint of the home user…

  2. Profile of the Home internet user. Traditionally, home internet usage has tended to be:- • low bandwidth • Short DHCP lease time. • For email, web access, chat. Increasing trends: • Higher bandwidth. • Longer leases. • Filesharing applications, more complex chat programs etc.

  3. What do we mean by security? • Shop online safely. • Send and receive email safely. • Keep private files private. • Prevent damage to/tampering with our operating system and computer. • Motive.

  4. Threats • Viruses • Backdoor programs • Interception • Denial of Service (DoS) • Identity theft.

  5. Who? • Black hat / commercial attacker • Opportunist • Script kiddie.

  6. More about viruses • Some viruses exploit software flaws to run automatically. • Infection can come from a variety of sources • Damage.

  7. Backdoor programs / trojans • Program can do anything that a user sitting at the computer could do. • Demo. • DDOS.

  8. DDOS attack • Distributed denial of service attack • Picture.

  9. Methods of protection • Anti virus • Password discipline • Software firewalls • Hardware firewalls

  10. Passwords • Animated GIFs? • Password cracking statistics

  11. What does a firewall do? • A firewall attempts to filter traffic on the internet connection to allow only certain types of connections. • Software firewalls may operate on a ‘per application’ basis.

  12. More slides? • Firewall logs • Public/private key • Crypto in general

More Related