SlideShare a Scribd company logo
1 of 16
CRYPTOGRAPHY AND
NETWORK SECURITY.
ASSIGNMENT-2
A Model For Network Security
PRESENTED BY,
ASHOK R,
DEEPIKA C,
DEEPIKA T,
HARISH S,
IV-B.Tech(IT),
KSRIET.
1
A Model For Network Security
Objectives of the Topic:
• After completing this topic, a student will be able to
describe a model for network security.
Figures and material in this topic have been
• adapted from “Network Security Essentials: Applications
and Standards”, 2014, by William Stallings.
2
A Model For Network Security
• Assume a message is to be transferred from one party to
another across some sort of Internet service.
• The two parties, who are the principals in this transaction,
must cooperate for the exchange to take place.
• A logical information channel is established by defining a
route through the Internet from source to destination and by
the cooperative use of communication protocols (e.g.,
TCP/IP) by the two principals.
3
A Generic Model For Network Security
4
A Model For Network Security
• To protect the information from an opponent who may
present a threat to confidentiality, authenticity, and so on,
security comes into play.
• All of the security techniques have two components:
1) A security-related transformation on the information to be
sent.
2) Some secret information shared by the two principals and
unknown to the opponent.
5
A Model For Network Security
1) A security-related transformation on the information to be
sent.
• Example1: encryption of the message, which scrambles the
message so that it is unreadable by the opponent.
• Example 2: the addition of a code based on the contents of
the message, which can be used to verify the identity of the
sender.
6
A Model For Network Security
2) Some secret information shared by the two principals and
unknown to the opponent.
• Example: encryption key used with the transformation to
scramble the message before transmission and unscramble it
on reception.
7
A Model For Network Security
• A trusted third party (TTP) may be needed to achieve secure
transmission.
• Example: A TTP may be responsible for distributing the secret
information to the two principals while keeping it from any
opponent.
8
A Model For Network Security
• This general model shows that there are four basic tasks in
designing a particular security service:
1. Design an algorithm for the security-related transformation.
An opponent should not be able to defeat purpose of the
algorithm.
2. Generate the secret information used by the algorithm.
9
A Model For Network Security
3. Develop methods for the distribution and sharing of the
secret information.
4. Specify a protocol enabling the principals to use the security
algorithm and the secret information for a particular security
service.
10
A Model For Network Security
• Next, we describe a general model which reflects a concern
for protecting an information system from unwanted access.
• E.g. A hacker who attempts to penetrate system that can be
accessed over a net.
• An intruder can be a disgruntled employee who wishes to do
damage or a criminal who seeks to exploit computer assets
for financial gain (e.g., obtaining credit card numbers or
performing illegal money transfers).
11
A Model For Network Security
• Using this model requires us to:
• Select appropriate gatekeeper functions to identify users
• Implement security controls to ensure only authorized users
access designated information or resources.
12
Network Access Security Model
13
Network Access Security Model
• Another type of unwanted access is the placement in a
computer system of logic that exploits vulnerabilities in the
system and that can affect application programs.
• There are two ways to secure your system from attacker.
1)Gatekeeper function.
2)Antivirus
14
Network Access Security Model
1)Gatekeeper function:
• Introducing gatekeeper function means introducing login-
id and passwords which would keep away the unwanted
access.
2)Antivirus:
• This second method we call as antivirus which we install on
our system to prevent the unwanted user from accessing your
computer system through the internet.
• So, this is all about the network security model.
15
Thank You!
16

More Related Content

Similar to CNS ASSIGNMENT 2 TEAM 1.pptx

computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.pptPandiya Rajan
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsDamien Magoni
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxNune SrinivasRao
 
04 authentication
04 authentication04 authentication
04 authenticationJadavsejal
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxRizwanBasha12
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 

Similar to CNS ASSIGNMENT 2 TEAM 1.pptx (20)

computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
04 authentication
04 authentication04 authentication
04 authentication
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 

More from KannanN45

Classify the advanced encryption standard-butterfly effect in protecting imag...
Classify the advanced encryption standard-butterfly effect in protecting imag...Classify the advanced encryption standard-butterfly effect in protecting imag...
Classify the advanced encryption standard-butterfly effect in protecting imag...KannanN45
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptxKannanN45
 
CNS team 6.pptx
CNS team 6.pptxCNS team 6.pptx
CNS team 6.pptxKannanN45
 
CNS Case study.pptx
CNS Case study.pptxCNS Case study.pptx
CNS Case study.pptxKannanN45
 
UNIT-1 22-23.pptx
UNIT-1 22-23.pptxUNIT-1 22-23.pptx
UNIT-1 22-23.pptxKannanN45
 
IT DEPT 1.8.23.pptx
IT DEPT 1.8.23.pptxIT DEPT 1.8.23.pptx
IT DEPT 1.8.23.pptxKannanN45
 

More from KannanN45 (7)

Classify the advanced encryption standard-butterfly effect in protecting imag...
Classify the advanced encryption standard-butterfly effect in protecting imag...Classify the advanced encryption standard-butterfly effect in protecting imag...
Classify the advanced encryption standard-butterfly effect in protecting imag...
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptx
 
CNS team 6.pptx
CNS team 6.pptxCNS team 6.pptx
CNS team 6.pptx
 
CNS Case study.pptx
CNS Case study.pptxCNS Case study.pptx
CNS Case study.pptx
 
data.pptx
data.pptxdata.pptx
data.pptx
 
UNIT-1 22-23.pptx
UNIT-1 22-23.pptxUNIT-1 22-23.pptx
UNIT-1 22-23.pptx
 
IT DEPT 1.8.23.pptx
IT DEPT 1.8.23.pptxIT DEPT 1.8.23.pptx
IT DEPT 1.8.23.pptx
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

CNS ASSIGNMENT 2 TEAM 1.pptx

  • 1. CRYPTOGRAPHY AND NETWORK SECURITY. ASSIGNMENT-2 A Model For Network Security PRESENTED BY, ASHOK R, DEEPIKA C, DEEPIKA T, HARISH S, IV-B.Tech(IT), KSRIET. 1
  • 2. A Model For Network Security Objectives of the Topic: • After completing this topic, a student will be able to describe a model for network security. Figures and material in this topic have been • adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings. 2
  • 3. A Model For Network Security • Assume a message is to be transferred from one party to another across some sort of Internet service. • The two parties, who are the principals in this transaction, must cooperate for the exchange to take place. • A logical information channel is established by defining a route through the Internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals. 3
  • 4. A Generic Model For Network Security 4
  • 5. A Model For Network Security • To protect the information from an opponent who may present a threat to confidentiality, authenticity, and so on, security comes into play. • All of the security techniques have two components: 1) A security-related transformation on the information to be sent. 2) Some secret information shared by the two principals and unknown to the opponent. 5
  • 6. A Model For Network Security 1) A security-related transformation on the information to be sent. • Example1: encryption of the message, which scrambles the message so that it is unreadable by the opponent. • Example 2: the addition of a code based on the contents of the message, which can be used to verify the identity of the sender. 6
  • 7. A Model For Network Security 2) Some secret information shared by the two principals and unknown to the opponent. • Example: encryption key used with the transformation to scramble the message before transmission and unscramble it on reception. 7
  • 8. A Model For Network Security • A trusted third party (TTP) may be needed to achieve secure transmission. • Example: A TTP may be responsible for distributing the secret information to the two principals while keeping it from any opponent. 8
  • 9. A Model For Network Security • This general model shows that there are four basic tasks in designing a particular security service: 1. Design an algorithm for the security-related transformation. An opponent should not be able to defeat purpose of the algorithm. 2. Generate the secret information used by the algorithm. 9
  • 10. A Model For Network Security 3. Develop methods for the distribution and sharing of the secret information. 4. Specify a protocol enabling the principals to use the security algorithm and the secret information for a particular security service. 10
  • 11. A Model For Network Security • Next, we describe a general model which reflects a concern for protecting an information system from unwanted access. • E.g. A hacker who attempts to penetrate system that can be accessed over a net. • An intruder can be a disgruntled employee who wishes to do damage or a criminal who seeks to exploit computer assets for financial gain (e.g., obtaining credit card numbers or performing illegal money transfers). 11
  • 12. A Model For Network Security • Using this model requires us to: • Select appropriate gatekeeper functions to identify users • Implement security controls to ensure only authorized users access designated information or resources. 12
  • 14. Network Access Security Model • Another type of unwanted access is the placement in a computer system of logic that exploits vulnerabilities in the system and that can affect application programs. • There are two ways to secure your system from attacker. 1)Gatekeeper function. 2)Antivirus 14
  • 15. Network Access Security Model 1)Gatekeeper function: • Introducing gatekeeper function means introducing login- id and passwords which would keep away the unwanted access. 2)Antivirus: • This second method we call as antivirus which we install on our system to prevent the unwanted user from accessing your computer system through the internet. • So, this is all about the network security model. 15