The security
The agenda
Introduction for the security
Networks and exchanges of data
Computer security
The risks
The attacks
Social Engineering
Categories of attacks
Parades for the attacks
The security architecture
An example
Introduction for the security
Networks and exchanges of data
Computer security
The risks
Networks and exchanges of data
For the exchange of the data, we've changed the technology
The paper before and now the electronic support
The electronic version, it's very abstract solution and it's not easy define the
global perimeter.
The Intranets, the private networks inside the companies appear all
over the world and grow. The benefits are important :
Gain of the productivity
Gain of the time
Communications most effectives
Distribution of the information is better
The interconnection for all these networks use Internet for the simple
reasons :
Data shared with the clients and the partners
Propose different services
Profitability
Networks and exchanges of data
The connection between Internet and the company's
network open a large way with a lot of persons. They
can use this solution and they obtain a lot of services.
But Inside an Intranet we find a lot of data and
information. For the live of the company, they're critical.
If in the network, the security is bad, the information
can be divulged and the system's properties.
Question 1 : The persons use only the initial services ?
Question 2 : How the persons use the services ?