Group 4 Ias - Report
Group 4 Ias - Report
Group 4 Ias - Report
SECURITY TO
INFORMATION SECURITY
MEMBERS:
• REGIE ELLADORA
• JUSTINE ROSE CASAS
• JUSTINE DOLERO
• JENNIFHER BORJA
• ANGELIE BONGGAT
LEARNING OUTCOMES
Ethernet
The industry standard bus technology for local-
Figure 15.25 Various network topologies area networks.
NetworkNETWORK
topology TOPOLOGY
6
Introduction
What is Computer Security ?
8
Basic Components of CS
computer security involves providing appropriate
levels of assurance of
Security: We must
secure our computers
with technology in the
same way that we
secure the doors to
our offices
Safety: We must act
in ways that protect us
against the risks and
threats that come with
Internet use
Risks and Threats
Virus Hacking
Worm Phishing
Trojan Horse Spoofing
Spyware Denial of Service
Viruses/Worms
Software programs Trojan Horses
designed to invade
your computer, and Viruses that pretend to Spyware
copy, damage or be programs that help
you while destroying Software that secretly
delete your data watches and records
your data and damaging
your computer your online activities
or send you endless
pop-up ads
Did You Know …
14
Network Security
Network topology
Devices, tools, techniques and methodologies
used to secure the network.
The basic component of network security is :
Firewall .
Encryption and Decryption : changing
plaintext into ciphertext using key (Encryption).
Changing ciphertext back to plaintext using key
(Decryption).
Two types of encryption : (Symmetric
Encryption, Asymmetric Encryption) .
15
Symmetric Cipher Model
Public-Key Cryptography
Network topology
INFORMATION SECURITY
18
Network topology
19
20
21
3 PRINCIPLES OF INFORMATION
SECURITY
24
TOP INFORMATION SECURITY THREATS
25
TOP INFORMATION SECURITY THREATS
30
PASSIVE ATTACK
31