Beruflich Dokumente
Kultur Dokumente
KHALID MEHMOOD
Introduction
Unauthorized access
Spoofing
Information theft
Denial of service attack
Unauthorized Access
Authentication:
is the process of recognizing a user's identity. It is the mechanism of
associating an incoming request with a set of identifying .
Spoofing
Information about all the sites that you visit is stored on your
computer. Every image that you have ever viewed, sent or received
over the Internet is stored on your hard drive. Be it personal pictures
or confidential business charts, these can be accessed by any
snooper.
There is a record of every program that you have ever
downloaded or used on your hard drive. What you use on your
computer should be your business and nobody else's.
The windows "delete" button and the "empty recycle bin" option
does NOT completely delete your files. With the right tools,
anyone can recover removed files.
Preventing from internet security
Risks
1. Firewall
2. encryption
Firewall