Upcoming SlideShare
×

638 views
577 views

Published on

Published in: Education, Technology
0 Likes
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
• Be the first to comment

• Be the first to like this

Views
Total views
638
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
0
0
Likes
0
Embeds 0
No embeds

No notes for slide

1. 1. presentation
2. 2. GROUP MEMBERSHASEEB SHABBIR (10050616-122)ZEESHAN KHALID (10050616-108)TARIQ SAEED (10050616-120)SUFYAN JALIB (10050616-113)TASSADAQ HUSSAIN (10050616-124)
3. 3. ENCRYPTION
4. 4. ENCRYPTION• Encryption is theprocess of transforminginformation to make itunreadable to anyoneexcept those possessingspecial knowledge,usually referred to as akey.• Encryption is theconversion of data intoa form, called a ciphertext that cannot beeasily understood byunauthorized people.
5. 5. DECRYPTIONDecryption is the process of converting encrypteddata back into its original form, so it can beunderstood.
6. 6. ENCRYPTIONEncryption/Decryption is a good idea when carryingout any kind of sensitive transaction, such as acredit-card purchase online, or the discussion of acompany secret between different departments inthe organization
7. 7. SYMMETRIC KEY ENCRYPTIONSymmetric-key algorithms are a class of algorithmsfor cryptography that use trivially related, oftenidentical, cryptographic keys for both decryption andencryption.The keys, in practice, represent a shared secretbetween two or more parties that can be used tomaintain a private information link.
8. 8. Public Key EncryptionSolves symmetric key encryption problem of having toexchangesecret key• Uses two mathematically related digital keys – publickey (widelydisseminated) and private key (kept secret by owner)• Both keys used to encrypt and decrypt message• Once key used to encrypt message, same key cannotbe used todecrypt message• For example, sender uses recipient’s public key toencrypt message;recipient uses his/her private key to decrypt it
9. 9. Securing Channels of CommunicationSecure Sockets Layer (SSL):– Most common form of securing channels of communication; used toestablish a secure negotiated session (client-server session in whichURL of requested document, along with contents, is encrypted)S-HTTP:– Alternative method; provides a secure message-orientedcommunications protocol designed for use in conjunction withHTTPVirtual Private Networks (VPNs):– Allow remote users to securely access internal networks via theInternet, using Point-to-Point Tunneling Protocol (PPTP)
10. 10. Secure Sockets Layer (SSL):Secure Sockets Layer, a protocol developed byNetscape for transmitting private documents via theInternet. SSL uses a cryptographic system that usestwo keys to encrypt data - a public key known toeveryone and a private or secret key known only tothe recipient of the message..
11. 11. Virtual Private Networks (VPNs):A virtual private network (VPN) is a secure way ofconnecting to a private Local Area Network at aremote location, using the Internet or any unsecurepublic network to transport the network datapackets privately, using encryption. The VPN usesauthentication to deny access to unauthorizedusers, and encryption to prevent unauthorized usersfrom reading the private network packets.
12. 12. VIRTUAL PRIVATE NETWORK
13. 13. S-HTTPAnother protocol for transmitting data securely overthe World Wide Web is Secure HTTP (S-HTTP). S-HTTP is designed to transmit individual messagessecurely.
14. 14. FirewallsA firewall is a device or set of devices designed to permit ordeny network transmissions based upon a set of rules and isfrequently used to protect networks from unauthorizedaccess while permitting legitimate communications to pass.
15. 15. AntivirusEasiest and leastexpensive way toprevent threats tosystem integrity.Antivirus software isused toprevent, detect, andremovemalware, including butnot limited to computerviruses, computerworm, Trojanhorses, spyware andadware.
16. 16. PROXYIt is a computersystem or routerthat breaks theconnectionbetween senderand receiver
17. 17. ANY QUESTION!!!