SlideShare a Scribd company logo
1 of 28
UNIT – I
CYBER SECURITY FUNDAMENTALS
(Part –I)
Dr.M.Karthika
Head/Department of InformationTechnology,
MTNC,Madurai.
NETWORK AND SECURITY CONCEPTS
 Information Assurance Fundamentals
 Authentication
 Authorization
 Non repudiation
 Confidentiality
 Integrity
 Availability
INFORMATION ASSURANCE FUNDAMENTALS
 Authentication, authorization, and non repudiation
are tools that system designers to maintain system
security with respect to Confidentiality, Integrity and
availability.
 National Information Assurance Glossary (NIAG)
published by the U.S. Committee on National Security
Systems.
AUTHENTICATION
 Authentication is important to any secure
system.
 The key to verifying the source of a message or
that an individual is whom he or she claims.
 The NIAG defines authentication
“security measure designed to establish the
validity of a transmission, message, or originator,
or a means of verifying an individual’s
authorization to receive specific categories of
information.”
FACTORS OF AUTHENTICATION
FACTOR EXAMPLES
Something
You Know
Information the system assumes others do not know;
this information may be secret, like a password or PIN
code, or simply a piece of information that most
people do not know, such as a user’s mother’s maiden
name.
Something
You Have
Something the user possesses that only he or she
holds; a Radio Frequency ID (RFID) badge, One-Time-
Password (OTP) generating Token, or a physical key
Something
You Are
A person’s fingerprint, voice print, or retinal scan—
factors known as biometrics
FACTORS OF AUTHENTICATION
AUTHORIZATION
 Authorization focuses on determining what a user has permission to do.
 NIAG defines authorization as
“access privileges granted to a user, program, or process.”
 Example:
1. An online banking application will authenticate a user based on his or
her credentials .
2. It must then determine the accounts to which that user has access.
3. The system determines what actions the user can take regarding those
accounts.
NON REPUDIATION
 The NIAG defines as
“assurance the sender of data is provided with proof of delivery
and the recipient is provided with proof of the sender’s identity, so neither
can later deny having processed the data.”
 The world of digital communications, no notary can stamp each
transmitted message, but non repudiation is still necessary.
 Secure systems normally rely on asymmetric (or public key) cryptography.
 These systems use one key (private) for signing data and use the other key
(public) for verifying data.
 Asymmetric key systems have the non repudiation property .
Example
CIA TRIAD
CONFIDENTIALITY
 The concept of confidentiality primarily focuses on
concealing or protecting the information.
 The NIAG defines confidentiality as
“assurance that information is not disclosed to
unauthorized individuals, processes, or devices.”
 One way to protect information is by storing it in a
private location or on a private network that is limited
to those who have legitimate access to the information.
 Assuring that unauthorized parties do not have access
to a piece of information is a complex task.
Step :1 The information must have protections
capable of preventing some users from
accessing it.
Step : 2 Limitations must be in place to restrict
access to the information to only those who
have the authorization to view it.
Step :3 An authentication system must be in
place to verify the identity of those with access
to the data.
Three major steps
INTEGRITY
 Data integrity, or ensuring that stored data are
accurate and contain no unauthorized
modifications.
 NIAG defines integrity as
Quality of an IS (Information System) reflecting
the logical correctness and reliability of the operating
system
 Authentication, authorization, and non repudiation as the
keys to maintaining integrity, is preventing those without
authorization from modifying data.
 Software flaws and vulnerabilities can lead to accidental
losses
in data integrity and can open a system to unauthorized
modification
 Disrupting the integrity of data at rest or in a message in
transit can have serious consequences.
 Ensuring the integrity of this type of message is vital to any
secure system
LOSSES IN INTEGRITY
AVAILABILITY
 Information systems must be accessible to users for
these systems to provide any value.
 If a system is down or responding too slowly, it
cannot provide the service it should.
 The NIAG defines availability as
“timely, reliable access to data and information
services for authorized users.”
 Attacks on availability are somewhat different from
those on integrity and confidentiality.
DENIAL OF SERVICE (DOS) ATTACK
 The best-known attack on availability is a denial of service (D o S)
attack.
•Resources in question may be memory, CPU
time, network bandwidth, and/or any other
component that an attacker can influence.
Resource
Exhaustion
• The attacker sends so much network traffic
to the targeted system that the traffic
saturates the network and no legitimate
request can get through.
Network
Flooding
BASIC CRYPTOGRAPHY
 The English word cryptography derives from Greek and translates
roughly to “hidden writing.”
 The ancient Egyptians began the first known practice of writing
secret messages, using nonstandard hieroglyphs to convey secret
messages as early as 1900 BC.
 Methods of hiding the content of a message-known as ciphers.
 Cipher is a frequently used algorithm in cryptology.
 It is a method of encrypting and decrypting data.
CIPHER
Two Basic
Transformation
Transposition Ciphers
Maintain all of the
original bits of data in
a byte but reverse their
order.
Substitution Ciphers
Substitute specified data
sequences with alternative
data sequences.
The data generated by any method is known as the ciphertext.
HOW DOES A CIPHER WORK?
An encryption technique is used by ciphers to convert
plaintext, which is a legible communication, into ciphertext,
which seems to be a random string of letters.
TYPES OF CIPHERS
SUBSTITUTION CIPHERS
 As name implies the current letter, character,
alphabet, number, bit is replaced by some other
letter, character, alphabet, number, bit as well.
 The replacement maybe applied on a single character
or a block of characters.
1. MONOALPHABETIC CIPHER
 Single character is replaced with single alternate
character throughout the whole data set. For example, if
for a particular data set A is considered as H, then at
everyplace letter A is used, that will be replaced with H.
 This is an easy method but to find the key is very difficult
so this is a good cipher.
Example:
Plain text: Cipher is an algorithm.
Cipher
text: PVCUREVFNANYTBEVGUZ.
2. POLYALPHABETIC CIPHER
• In this table multiple alternates are existing for single character.
• The final alternate is depending on the character and the keyword to
encrypt the text.
• For transformation a key is also used and this key is different for
each dataset.
For example, take a plain text APPLE and the keyword is RIGHT
A = R
P = I
P = G
L = H
E =T
3. CAESAR CIPHER
 This is very simple.
 In this each alphabet is replaced with its upcoming third
subsequent alphabet.
 Example: A is replaced by D, B is replaced by E etc.
let’s transform word Cipher:
C = F
I = L
P = S
H = K
E = H
R = U
So, Cipher is transformed in FLSKHU.
4. PLAYFAIR CIPHER
 In this a Playfair square is used, which is 5 X 5 in
size.
 Steps are as follows:
 First choose a keyword of your own choice. For example,
choose “cipherincryptography” (cipher in cryptography)
 Now enter the characters in the 5 X 5 matrix.
 Avoid the repeated word.
 Fill I and J in one cell.
A B C D E F G H I J K L M N O P Q R S T U V W X Y
Z
For example, choose word Apple:
Apple = AP PL EZ
AP = BI (We can choose any either I or J)
PL = IM
EZ = OE
So, Apple is encrypted as BIIMOE.
5. HILL CIPHER
 Choose a key matrix (m*n) size.
 Then choose the word to encrypt.
 Break the word in size equal to key matrix.
 Now convert the word matrix in number matrix.
 Now find the cipher matrix by using this formula:
C = KP mod 26
Here C = cipher matrix
K = key matrix.
P = word matrix
now transform the cipher matrix into word matrix.
Follow the process for the whole data set.
PATH TO CRYPTOGRAPHY
 A Lottery Cage - Randomize number Selection
Clear T h e a c T s t a r t s a t m i d n i g h t
Cage 22 19 2 11 5 12 19 5 16 12 6 11 5 2 19 15 24 20 18 2 21 6 5 19 17 21
Cipher O g k f o L e h e g b y u s p q t d k y t n z y n
THE GERMAN ENIGMA CODING
MACHINE
THANKYOU

More Related Content

What's hot (20)

Java collections concept
Java collections conceptJava collections concept
Java collections concept
 
Mirage For Beginners
Mirage For BeginnersMirage For Beginners
Mirage For Beginners
 
Java Collections
Java  Collections Java  Collections
Java Collections
 
Encryption
EncryptionEncryption
Encryption
 
Python set
Python setPython set
Python set
 
Question bank
Question bankQuestion bank
Question bank
 
Algorithm
AlgorithmAlgorithm
Algorithm
 
Object oriented programming in python
Object oriented programming in pythonObject oriented programming in python
Object oriented programming in python
 
Big o notation
Big o notationBig o notation
Big o notation
 
Cryptography
CryptographyCryptography
Cryptography
 
Types of methods in python
Types of methods in pythonTypes of methods in python
Types of methods in python
 
Time and space complexity
Time and space complexityTime and space complexity
Time and space complexity
 
LISP: Input And Output
LISP: Input And OutputLISP: Input And Output
LISP: Input And Output
 
Hashing algorithms and its uses
Hashing algorithms and its usesHashing algorithms and its uses
Hashing algorithms and its uses
 
AVL Tree
AVL TreeAVL Tree
AVL Tree
 
C# classes objects
C#  classes objectsC#  classes objects
C# classes objects
 
Set data structure
Set data structure Set data structure
Set data structure
 
Lec 17 heap data structure
Lec 17 heap data structureLec 17 heap data structure
Lec 17 heap data structure
 
Conceptual dependency
Conceptual dependencyConceptual dependency
Conceptual dependency
 
Collections in-csharp
Collections in-csharpCollections in-csharp
Collections in-csharp
 

Similar to Unit - I cyber security fundamentals part -1.pptx

Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
Cyber Security Unit I Part -I.pptx
Cyber Security Unit I Part -I.pptxCyber Security Unit I Part -I.pptx
Cyber Security Unit I Part -I.pptxkarthikaparthasarath
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography pptSoma Subbama
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 

Similar to Unit - I cyber security fundamentals part -1.pptx (20)

Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Cyber Security Unit I Part -I.pptx
Cyber Security Unit I Part -I.pptxCyber Security Unit I Part -I.pptx
Cyber Security Unit I Part -I.pptx
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
N45028390
N45028390N45028390
N45028390
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 

More from karthikaparthasarath

BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxkarthikaparthasarath
 
Fundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docxFundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docxkarthikaparthasarath
 
Software Engineering Question Bank.docx
Software Engineering Question Bank.docxSoftware Engineering Question Bank.docx
Software Engineering Question Bank.docxkarthikaparthasarath
 
BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxkarthikaparthasarath
 
ATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptxATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptxkarthikaparthasarath
 
BUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdfBUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdfkarthikaparthasarath
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptkarthikaparthasarath
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptkarthikaparthasarath
 
UNIT III Process Synchronization.docx
UNIT III Process Synchronization.docxUNIT III Process Synchronization.docx
UNIT III Process Synchronization.docxkarthikaparthasarath
 
Android Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docxAndroid Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docxkarthikaparthasarath
 

More from karthikaparthasarath (18)

BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
 
Fundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docxFundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docx
 
Software Engineering Question Bank.docx
Software Engineering Question Bank.docxSoftware Engineering Question Bank.docx
Software Engineering Question Bank.docx
 
BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
 
ATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptxATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptx
 
BUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdfBUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdf
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
 
simple programs.docx
simple programs.docxsimple programs.docx
simple programs.docx
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
 
UNIT III Process Synchronization.docx
UNIT III Process Synchronization.docxUNIT III Process Synchronization.docx
UNIT III Process Synchronization.docx
 
Android Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docxAndroid Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docx
 
Activity playfair cipher.pptx
Activity playfair cipher.pptxActivity playfair cipher.pptx
Activity playfair cipher.pptx
 
Activity Hill Cipher.pptx
Activity  Hill Cipher.pptxActivity  Hill Cipher.pptx
Activity Hill Cipher.pptx
 
Activity Caesar Cipher.pptx
Activity Caesar Cipher.pptxActivity Caesar Cipher.pptx
Activity Caesar Cipher.pptx
 
Unit I Q&A.docx
Unit I Q&A.docxUnit I Q&A.docx
Unit I Q&A.docx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
UNIT I - Part 1.pptx
UNIT I - Part 1.pptxUNIT I - Part 1.pptx
UNIT I - Part 1.pptx
 
UNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docxUNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docx
 

Recently uploaded

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

Unit - I cyber security fundamentals part -1.pptx

  • 1. UNIT – I CYBER SECURITY FUNDAMENTALS (Part –I) Dr.M.Karthika Head/Department of InformationTechnology, MTNC,Madurai.
  • 2. NETWORK AND SECURITY CONCEPTS  Information Assurance Fundamentals  Authentication  Authorization  Non repudiation  Confidentiality  Integrity  Availability
  • 3. INFORMATION ASSURANCE FUNDAMENTALS  Authentication, authorization, and non repudiation are tools that system designers to maintain system security with respect to Confidentiality, Integrity and availability.  National Information Assurance Glossary (NIAG) published by the U.S. Committee on National Security Systems.
  • 4. AUTHENTICATION  Authentication is important to any secure system.  The key to verifying the source of a message or that an individual is whom he or she claims.  The NIAG defines authentication “security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.”
  • 5. FACTORS OF AUTHENTICATION FACTOR EXAMPLES Something You Know Information the system assumes others do not know; this information may be secret, like a password or PIN code, or simply a piece of information that most people do not know, such as a user’s mother’s maiden name. Something You Have Something the user possesses that only he or she holds; a Radio Frequency ID (RFID) badge, One-Time- Password (OTP) generating Token, or a physical key Something You Are A person’s fingerprint, voice print, or retinal scan— factors known as biometrics
  • 7. AUTHORIZATION  Authorization focuses on determining what a user has permission to do.  NIAG defines authorization as “access privileges granted to a user, program, or process.”  Example: 1. An online banking application will authenticate a user based on his or her credentials . 2. It must then determine the accounts to which that user has access. 3. The system determines what actions the user can take regarding those accounts.
  • 8. NON REPUDIATION  The NIAG defines as “assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data.”  The world of digital communications, no notary can stamp each transmitted message, but non repudiation is still necessary.  Secure systems normally rely on asymmetric (or public key) cryptography.  These systems use one key (private) for signing data and use the other key (public) for verifying data.  Asymmetric key systems have the non repudiation property . Example
  • 10. CONFIDENTIALITY  The concept of confidentiality primarily focuses on concealing or protecting the information.  The NIAG defines confidentiality as “assurance that information is not disclosed to unauthorized individuals, processes, or devices.”  One way to protect information is by storing it in a private location or on a private network that is limited to those who have legitimate access to the information.  Assuring that unauthorized parties do not have access to a piece of information is a complex task.
  • 11. Step :1 The information must have protections capable of preventing some users from accessing it. Step : 2 Limitations must be in place to restrict access to the information to only those who have the authorization to view it. Step :3 An authentication system must be in place to verify the identity of those with access to the data. Three major steps
  • 12. INTEGRITY  Data integrity, or ensuring that stored data are accurate and contain no unauthorized modifications.  NIAG defines integrity as Quality of an IS (Information System) reflecting the logical correctness and reliability of the operating system
  • 13.  Authentication, authorization, and non repudiation as the keys to maintaining integrity, is preventing those without authorization from modifying data.  Software flaws and vulnerabilities can lead to accidental losses in data integrity and can open a system to unauthorized modification  Disrupting the integrity of data at rest or in a message in transit can have serious consequences.  Ensuring the integrity of this type of message is vital to any secure system LOSSES IN INTEGRITY
  • 14. AVAILABILITY  Information systems must be accessible to users for these systems to provide any value.  If a system is down or responding too slowly, it cannot provide the service it should.  The NIAG defines availability as “timely, reliable access to data and information services for authorized users.”  Attacks on availability are somewhat different from those on integrity and confidentiality.
  • 15. DENIAL OF SERVICE (DOS) ATTACK  The best-known attack on availability is a denial of service (D o S) attack. •Resources in question may be memory, CPU time, network bandwidth, and/or any other component that an attacker can influence. Resource Exhaustion • The attacker sends so much network traffic to the targeted system that the traffic saturates the network and no legitimate request can get through. Network Flooding
  • 16. BASIC CRYPTOGRAPHY  The English word cryptography derives from Greek and translates roughly to “hidden writing.”  The ancient Egyptians began the first known practice of writing secret messages, using nonstandard hieroglyphs to convey secret messages as early as 1900 BC.  Methods of hiding the content of a message-known as ciphers.
  • 17.  Cipher is a frequently used algorithm in cryptology.  It is a method of encrypting and decrypting data. CIPHER Two Basic Transformation Transposition Ciphers Maintain all of the original bits of data in a byte but reverse their order. Substitution Ciphers Substitute specified data sequences with alternative data sequences. The data generated by any method is known as the ciphertext.
  • 18. HOW DOES A CIPHER WORK? An encryption technique is used by ciphers to convert plaintext, which is a legible communication, into ciphertext, which seems to be a random string of letters.
  • 20. SUBSTITUTION CIPHERS  As name implies the current letter, character, alphabet, number, bit is replaced by some other letter, character, alphabet, number, bit as well.  The replacement maybe applied on a single character or a block of characters.
  • 21. 1. MONOALPHABETIC CIPHER  Single character is replaced with single alternate character throughout the whole data set. For example, if for a particular data set A is considered as H, then at everyplace letter A is used, that will be replaced with H.  This is an easy method but to find the key is very difficult so this is a good cipher. Example: Plain text: Cipher is an algorithm. Cipher text: PVCUREVFNANYTBEVGUZ.
  • 22. 2. POLYALPHABETIC CIPHER • In this table multiple alternates are existing for single character. • The final alternate is depending on the character and the keyword to encrypt the text. • For transformation a key is also used and this key is different for each dataset. For example, take a plain text APPLE and the keyword is RIGHT A = R P = I P = G L = H E =T
  • 23. 3. CAESAR CIPHER  This is very simple.  In this each alphabet is replaced with its upcoming third subsequent alphabet.  Example: A is replaced by D, B is replaced by E etc. let’s transform word Cipher: C = F I = L P = S H = K E = H R = U So, Cipher is transformed in FLSKHU.
  • 24. 4. PLAYFAIR CIPHER  In this a Playfair square is used, which is 5 X 5 in size.  Steps are as follows:  First choose a keyword of your own choice. For example, choose “cipherincryptography” (cipher in cryptography)  Now enter the characters in the 5 X 5 matrix.  Avoid the repeated word.  Fill I and J in one cell. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z For example, choose word Apple: Apple = AP PL EZ AP = BI (We can choose any either I or J) PL = IM EZ = OE So, Apple is encrypted as BIIMOE.
  • 25. 5. HILL CIPHER  Choose a key matrix (m*n) size.  Then choose the word to encrypt.  Break the word in size equal to key matrix.  Now convert the word matrix in number matrix.  Now find the cipher matrix by using this formula: C = KP mod 26 Here C = cipher matrix K = key matrix. P = word matrix now transform the cipher matrix into word matrix. Follow the process for the whole data set.
  • 26. PATH TO CRYPTOGRAPHY  A Lottery Cage - Randomize number Selection Clear T h e a c T s t a r t s a t m i d n i g h t Cage 22 19 2 11 5 12 19 5 16 12 6 11 5 2 19 15 24 20 18 2 21 6 5 19 17 21 Cipher O g k f o L e h e g b y u s p q t d k y t n z y n
  • 27. THE GERMAN ENIGMA CODING MACHINE