Network Security protects your network and data from breaches, intrusions and other threats. ... Network Security involves access control, virus and antivirus software, application security, network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and more.
3. PEM(privacy enhanced mail)
It is an internet standard adopted by IAS (internet architecture
Board) for secure electronic mail communication over internet.
Described in four specification documents which are RFC
no.1421 to 1424
4. PEM(privacy enhanced mail)
To keep message secrete Message received is truly from person
from other person who claim to have sent it.
Message hasn’t be modified during
transport from sender
1.confidentiality 2.Authentication
3.Message
integrity
6. Working of PEM:-
Broad steps in PEM are:-
Canonical conversion
Digital signature
Encryption
Base – 64 - encoding
7. 1. CANONICAL CONVERSION
Transfer each email message in an abstract, canonical
representation
Regardless of architecture and OS of sending and receiving
computer, email message travel in uniform, independent format.
Ensure uniform presentation syntax among a heterogeneous
collection of computer system.
8. 2. DIGITAL SINGNATURE
Create the message using MD 5 or MD 2.
Then it is encrypted with the sender’s private key to form the
sender’s digital signature.
10. 4. BASE 64 ENCODING
Also called as radix 64 encoding or ASCII armour.
Binary input is processed in the block of 3 octates or 24 bits.
These 24 bits are considered to be made up of 4sets, each of
6bits.
Each such set of 6bits is mapped into an 8bit output character
13. WHAT IS SSL?
It is an internet protocol for secure exchange of information between a web
browser and a web server
It provides
Authentication
Confidentiality
Developed by Netscape corporation in 1994
Currently comes in three versions : 2,3 and 3.1