ThesecurityThe agenda IntroductionforthesecurityNetworksandexchangesofdataComputersecurityTherisksThe attacks Social Engineering Categories of attacks Parades forthe attacks Thesecurity architecture An example Introductionforthesecurity Networksandexchangesofdata Computersecurity TherisksNetworksandexchangesofdata Forthe exchange ofthe data, we've changed the technology The paper before and now the electronic support The electronic version, it's very abstract solution and it's not easy define the global perimeter. The Intranets, the private networks inside the companies appear all over the world and grow. The benefits are important : Gain ofthe productivity Gain ofthe time Communications most effectives Distribution ofthe information is better The interconnection for all these networks use Internet forthe simple reasons : Data shared with the clients andthe partners Propose different services Profitability NetworksandexchangesofdataThe connection between Internet andthe company's network open a large way with a lot of persons. They can use this solution and they obtain a lot of services. But Inside an Intranet we find a lot ofdataand information. Forthe live ofthe company, they're critical. If in the network, thesecurity is bad, the information can be divulged andthe system's properties. Question 1 :The persons use only the initial services ? Question 2 : How the persons use the services ? . The security The agenda Introduction for the security Networks and exchanges of data Computer security The risks The attacks. security The risks Networks and exchanges of data For the exchange of the data, we've changed the technology The paper before and now the electronic