Security and Cryptography

1,535 views

Published on

“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. In the real world as opposed to the cyber world information gathering often precedes an attack. Today the illicit activities of the hackers are growing by leaps and bounds. However; fortunately, the antagonists reacted promptly and resurrected the internet world from the brink of prostration. Tersely quoting some security ditherers - hijackers, Eavesdropping, hacking, mapping, packet sniffing, spoofing, etc.

Published in: Technology
1 Comment
1 Like
Statistics
Notes
  • I like your blog, I think it is quite different concept but quite knowledgeable but I am aware with one more website which is famous for Free Classified Ads Posting Sites www.helpadya.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
1,535
On SlideShare
0
From Embeds
0
Number of Embeds
35
Actions
Shares
0
Downloads
87
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Security and Cryptography

  1. 1. Network Security& Cryptography by D.Swathi(07631A0557) M.Tejaswi(07631A0558 )
  2. 2. Computer security is the process of preventing and detecting unauthorized use of your computer Prevention help to stop unauthorized users from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system.
  3. 4. PASS WORD SECURITY <ul><li>M ust contain 8 characters, at least 5 uppercase letters or 5 lowercase letters </li></ul><ul><li>Should contain at least 2 numbers </li></ul><ul><li>Should contain at least 1 special characters </li></ul><ul><li>Password Protection Guidelines: </li></ul><ul><li>Passwords gain access to a company systems should not used as passwords to access non-company accounts </li></ul><ul><li>If an employee knows his/her password has been compromised, it must be reported to the IT department and the password changed immediately. </li></ul>
  4. 5. E-mail Security <ul><li>Anti viruses software is the foundation of E-mail security </li></ul>Exchange Server Mail staging Anti Virus Scan (1) Anti Virus Scan (2) Some attachments removed . Outlook Client Anti-Virus Scan (3) Some attachments removed .
  5. 6. E-mail Protection <ul><li>E-mail “spoofing” :Is when an email message appears to have originated from one source when it actually was sent from another source </li></ul><ul><li>If you suspect that you may have received a spoofed email ,you should contact your service provider’s </li></ul><ul><li>E-mail borne viruses : </li></ul><ul><li>Viruses and other types malicious code are often spread as attachments to email messages </li></ul>
  6. 7. Evolving Threat Environment <ul><li>Blended Threats : Blended threats are increasingly design to get past point-solution security and target multiple vulnerabilities in clients and corporate networks. </li></ul><ul><li>Phasing attacks : The recent attacks of phasing attacks on banks and their online customers have opened both consumer and corporate eyes to the increasing dangers of corporate identity theft. </li></ul>
  7. 8. Cryptography <ul><li>Cryptography is a science of using mathematics to encrypt and decrypt the data. </li></ul><ul><li>Crptanalysis is the science of analyzing and breaking secure communication. </li></ul><ul><li>Both Cryptography and Cryptanalysis comes under Cryptology. </li></ul><ul><li>The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key. </li></ul>
  8. 9. Encryption and Decryption <ul><li>Encryption: The method of disguising plaintext in such a way as to hide its its substance. </li></ul><ul><li>Decryption: The process of reverting cipher text to its plain text. </li></ul>
  9. 10. Conventional Cryptography <ul><li>In this, one key is used both for encryption and decryption. </li></ul><ul><li>Caeser’s cipher: It is an example of conventional cryptography. It substitutes one piece of information of another. </li></ul><ul><li>Ex: Plain text: ABCDEFGHIJKLMNOPQRSTUVWXYZ </li></ul><ul><li>Cipher text: DEFGHIJKLMNOPQRSTUVWXYZABC. </li></ul>
  10. 11. Key Management And Conventional Encryption
  11. 12. Public Key Cryptography <ul><li>It is an asymmentric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private key for decryption. </li></ul><ul><li>Benefit: It allows people who have no preexisting security arrangement to exchange messages securely. </li></ul><ul><li>Anyone having public key can encrypt the data but cannot decrypt. </li></ul>
  12. 13. PGP <ul><li>It combines some of the best features of both conventional and public key cryptography. </li></ul>
  13. 14. Conclusion <ul><li>Security is every bodies business and only with everyone’s cooperation,an intelligent policy and consistent practices, will it be achievable. </li></ul><ul><li>References: </li></ul><ul><li>www.google.com </li></ul><ul><li>www.microsoft.com </li></ul><ul><li>J.N.T.U website </li></ul><ul><li>Digit magazine </li></ul>
  14. 15. Thank you..
  15. 16. Queries ..?

×