SlideShare a Scribd company logo
Network and Security Concepts
• Information Assurance Fundamentals
• Authentication
• Authorization
• Non repudiation
• Confidentiality
• Integrity
• Availability
Information Assurance Fundamentals
• Authentication, authorization, and non repudiation are tools
that system designers
• Authentication, authorization, and non repudiation are tools
that system designers
• Information security professionals are dedicated to ensuring the
protection of these principals for each system they protect
• All definitions used in this section originate from the National
Information Assurance Glossary (NIAG) published by the U.S.
Committee on National Security Systems.
Authentication
• Authentication is important to any secure system.
• The key to verifying the source of a message or that an
individual is whom he or she claims.
• The NIAG defines authentication
“security measure designed to establish the validity of a
transmission, message, or originator, or a means of verifying an
individual’s authorization to receive specific categories of
information.”
Factors of authentication.
FACTOR EXAMPLES
Something
You Know
Information the system assumes others do not know; this information
may be secret, like a password or PIN code, or simply a piece of
information that most people do not know, such as a user’s mother’s
maiden name.
Something
You Have
Something the user possesses that only he or she holds; a Radio
Frequency ID (RFID) badge, One-Time-Password (OTP) generating
Token, or a physical key
Something
You Are
A person’s fingerprint, voice print, or retinal scan—factors known as
biometrics
Authorization
• While authentication relates to verifying identities.
• authorization focuses on determining what a user has permission
to do.
• NIAG defines authorization as
“access privileges granted to a user, program, or
process.”
an online banking application will authenticate a user based on his
or her credentials,
• An online banking application will
authenticate a user based on his or her credentials
• But it must then determine the accounts to which that user has
access.
• The system determines what actions the user can take regarding
those
accounts
Non repudiation
• The NIAG defines as
“assurance the sender of data is provided with proof
of delivery and the recipient is provided with proof of the
sender’s identity, so neither can later deny having processed the
data.”
• The world of digital communications, no notary can stamp each
transmitted message, but non repudiation is still necessary.
• Secure systems normally rely on asymmetric (or public key)
cryptography.
• These systems use one key (private) for signing data and use the
other key (public) for verifying data.
• Asymmetric key systems have the non repudiation property .
CIA TRIAD
Confidentiality
• The term confidentiality is familiar to most
people, even those not in the security industry.
• The NIAG defines confidentiality as
“assurance that information is not disclosed to unauthorized
individuals, processes, or devices.”
• Assuring that unauthorized parties do not have access to a piece
of information is a complex task.
• The information must have protections capable of preventing
some users from accessing it.
• Limitations must be in place to restrict access to the information
to only those who have the authorization to view it.
• An authentication system must be in place to verify the identity of
those with access to the data.
Three major steps
Integrity
• In the information security realm, integrity normally refers to data
integrity, or ensuring that stored data are accurate and contain no
unauthorized modifications.
• NIAG defines integrity as
Quality of an IS (Information System) reflecting the logical
correctness and reliability of the operating system
• Authentication, authorization, and
non repudiation as the keys to maintaining integrity, is
preventing those without authorization from modifying data.
• Software flaws and vulnerabilities can lead to accidental losses
in data integrity and can open a system to unauthorized
modification
• Disrupting the integrity of data at rest or in a message in transit
can have serious consequences.
• Ensuring the integrity of this type of message is vital to any
secure system
Availability
• Information systems must be accessible to users for these
systems to provide any value.
• If a system is down or responding too slowly, it cannot
provide the service it should.
• The NIAG defines availability as
“timely, reliable access to data and information services for
authorized users.”
• Attacks on availability are somewhat different from those on
integrity and confidentiality.
• The best-known attack on availability is a denial of service
(D o S) attack.
• The resources in question may be memory, CPU time,
network bandwidth, and/or any other component that an
attacker can influence.
• Understanding the components of the CIA triad and the
concepts
• Authentication, authorization, and nonrepudiation are tools
that system designers can use to maintain these pillars.
Basic Cryptography
• Basic cryptography to explain the history and basics of
ciphers and cryptanalysis.
• The English word cryptography derives from Greek and
translates roughly to “hidden writing.”
• The ancient Egyptians began the first known practice of
writing secret messages, using nonstandard hieroglyphs to
convey secret messages as early as 1900 bc.
• Since that time, people have developed many methods of
hiding the content of a message. These methods are known
as ciphers.
• Substitution ciphers work by substituting each letter in the
alphabet with another one when writing a message.
abcdefghijklmnopqrstuvwxyz
nopqrstuvwxyzabcdefghijklm .
• Using this cipher, the message “the act starts at midnight”
would be written as “gur npg fgnegf ng zvqavtug.”
• Cryptography is driven by the constant struggle between
people who want to keep messages secret and those who
work to uncover their meanings.
• It is easy to guess that a three-letter word at the beginning
of a sentence is likely to be the.
• By replacing all instances of the letters g,
u, and r with t, h, and e, the cipher text changes to
the npt ftnetf nt zvqavtht
Cyber security essentials
LETTER FREQUENCY LETTER FREQUENCY
e 12.70% m 2.41%
t 9.06% w 2.36%
a 8.17% f 2.23%
o 7.51% g 2.02%
i 6.97% y 1.97%
n 6.75% p 1.93%
s 6.33% b 1.49%
h 6.09% v 0.98%
r 5.99% k 0.77%
d 4.25% j 0.15%
l 4.03% x 0.15%
c 2.78% q 0.10%
u 2.76% z 0.07%
Udhaya kumar. A,
II M.Sc (CS)- MTNC
cyber security.pptx

More Related Content

Similar to cyber security.pptx

Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
karthikaparthasarath
 
Security
SecuritySecurity
Cryptography
CryptographyCryptography
Cryptography
Arjun Shukla
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
SwapnaPavan2
 
Computer security
Computer securityComputer security
Computer security
YUSRA FERNANDO
 
Cis326week1lesson1
Cis326week1lesson1Cis326week1lesson1
Cis326week1lesson1Fahad_1
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
zerihunnana
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptx
anbersattar
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
Raj Sampat
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
AparnaSunil24
 
CNS UNIT 1 NEW NEW UNIT has been s 1.ppt
CNS UNIT 1 NEW NEW UNIT has been s 1.pptCNS UNIT 1 NEW NEW UNIT has been s 1.ppt
CNS UNIT 1 NEW NEW UNIT has been s 1.ppt
inaamulh66
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
BhargaviGorde1
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
Awais725629
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
Awais725629
 

Similar to cyber security.pptx (20)

Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
 
Security
SecuritySecurity
Security
 
Cryptography
CryptographyCryptography
Cryptography
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
Computer security
Computer securityComputer security
Computer security
 
Crytography
CrytographyCrytography
Crytography
 
Cis326week1lesson1
Cis326week1lesson1Cis326week1lesson1
Cis326week1lesson1
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptx
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
CNS UNIT 1 NEW NEW UNIT has been s 1.ppt
CNS UNIT 1 NEW NEW UNIT has been s 1.pptCNS UNIT 1 NEW NEW UNIT has been s 1.ppt
CNS UNIT 1 NEW NEW UNIT has been s 1.ppt
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
 

More from karthikaparthasarath

BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
karthikaparthasarath
 
Fundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docxFundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docx
karthikaparthasarath
 
Software Engineering Question Bank.docx
Software Engineering Question Bank.docxSoftware Engineering Question Bank.docx
Software Engineering Question Bank.docx
karthikaparthasarath
 
BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
karthikaparthasarath
 
ATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptxATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptx
karthikaparthasarath
 
BUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdfBUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdf
karthikaparthasarath
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
karthikaparthasarath
 
simple programs.docx
simple programs.docxsimple programs.docx
simple programs.docx
karthikaparthasarath
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
karthikaparthasarath
 
UNIT III Process Synchronization.docx
UNIT III Process Synchronization.docxUNIT III Process Synchronization.docx
UNIT III Process Synchronization.docx
karthikaparthasarath
 
Android Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docxAndroid Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docx
karthikaparthasarath
 
Activity playfair cipher.pptx
Activity playfair cipher.pptxActivity playfair cipher.pptx
Activity playfair cipher.pptx
karthikaparthasarath
 
Activity Hill Cipher.pptx
Activity  Hill Cipher.pptxActivity  Hill Cipher.pptx
Activity Hill Cipher.pptx
karthikaparthasarath
 
Activity Caesar Cipher.pptx
Activity Caesar Cipher.pptxActivity Caesar Cipher.pptx
Activity Caesar Cipher.pptx
karthikaparthasarath
 
Unit I Q&A.docx
Unit I Q&A.docxUnit I Q&A.docx
Unit I Q&A.docx
karthikaparthasarath
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
karthikaparthasarath
 
UNIT I - Part 1.pptx
UNIT I - Part 1.pptxUNIT I - Part 1.pptx
UNIT I - Part 1.pptx
karthikaparthasarath
 
UNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docxUNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docx
karthikaparthasarath
 

More from karthikaparthasarath (18)

BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
 
Fundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docxFundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docx
 
Software Engineering Question Bank.docx
Software Engineering Question Bank.docxSoftware Engineering Question Bank.docx
Software Engineering Question Bank.docx
 
BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
 
ATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptxATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptx
 
BUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdfBUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdf
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
 
simple programs.docx
simple programs.docxsimple programs.docx
simple programs.docx
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
 
UNIT III Process Synchronization.docx
UNIT III Process Synchronization.docxUNIT III Process Synchronization.docx
UNIT III Process Synchronization.docx
 
Android Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docxAndroid Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docx
 
Activity playfair cipher.pptx
Activity playfair cipher.pptxActivity playfair cipher.pptx
Activity playfair cipher.pptx
 
Activity Hill Cipher.pptx
Activity  Hill Cipher.pptxActivity  Hill Cipher.pptx
Activity Hill Cipher.pptx
 
Activity Caesar Cipher.pptx
Activity Caesar Cipher.pptxActivity Caesar Cipher.pptx
Activity Caesar Cipher.pptx
 
Unit I Q&A.docx
Unit I Q&A.docxUnit I Q&A.docx
Unit I Q&A.docx
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
UNIT I - Part 1.pptx
UNIT I - Part 1.pptxUNIT I - Part 1.pptx
UNIT I - Part 1.pptx
 
UNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docxUNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docx
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

cyber security.pptx

  • 1.
  • 2. Network and Security Concepts • Information Assurance Fundamentals • Authentication • Authorization • Non repudiation • Confidentiality • Integrity • Availability
  • 3. Information Assurance Fundamentals • Authentication, authorization, and non repudiation are tools that system designers • Authentication, authorization, and non repudiation are tools that system designers • Information security professionals are dedicated to ensuring the protection of these principals for each system they protect • All definitions used in this section originate from the National Information Assurance Glossary (NIAG) published by the U.S. Committee on National Security Systems.
  • 4. Authentication • Authentication is important to any secure system. • The key to verifying the source of a message or that an individual is whom he or she claims. • The NIAG defines authentication “security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.”
  • 5. Factors of authentication. FACTOR EXAMPLES Something You Know Information the system assumes others do not know; this information may be secret, like a password or PIN code, or simply a piece of information that most people do not know, such as a user’s mother’s maiden name. Something You Have Something the user possesses that only he or she holds; a Radio Frequency ID (RFID) badge, One-Time-Password (OTP) generating Token, or a physical key Something You Are A person’s fingerprint, voice print, or retinal scan—factors known as biometrics
  • 6.
  • 7. Authorization • While authentication relates to verifying identities. • authorization focuses on determining what a user has permission to do. • NIAG defines authorization as “access privileges granted to a user, program, or process.” an online banking application will authenticate a user based on his or her credentials,
  • 8. • An online banking application will authenticate a user based on his or her credentials • But it must then determine the accounts to which that user has access. • The system determines what actions the user can take regarding those accounts
  • 9. Non repudiation • The NIAG defines as “assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data.” • The world of digital communications, no notary can stamp each transmitted message, but non repudiation is still necessary.
  • 10. • Secure systems normally rely on asymmetric (or public key) cryptography. • These systems use one key (private) for signing data and use the other key (public) for verifying data. • Asymmetric key systems have the non repudiation property .
  • 12. Confidentiality • The term confidentiality is familiar to most people, even those not in the security industry. • The NIAG defines confidentiality as “assurance that information is not disclosed to unauthorized individuals, processes, or devices.” • Assuring that unauthorized parties do not have access to a piece of information is a complex task.
  • 13. • The information must have protections capable of preventing some users from accessing it. • Limitations must be in place to restrict access to the information to only those who have the authorization to view it. • An authentication system must be in place to verify the identity of those with access to the data. Three major steps
  • 14. Integrity • In the information security realm, integrity normally refers to data integrity, or ensuring that stored data are accurate and contain no unauthorized modifications. • NIAG defines integrity as Quality of an IS (Information System) reflecting the logical correctness and reliability of the operating system
  • 15. • Authentication, authorization, and non repudiation as the keys to maintaining integrity, is preventing those without authorization from modifying data. • Software flaws and vulnerabilities can lead to accidental losses in data integrity and can open a system to unauthorized modification • Disrupting the integrity of data at rest or in a message in transit can have serious consequences. • Ensuring the integrity of this type of message is vital to any secure system
  • 16. Availability • Information systems must be accessible to users for these systems to provide any value. • If a system is down or responding too slowly, it cannot provide the service it should. • The NIAG defines availability as “timely, reliable access to data and information services for authorized users.” • Attacks on availability are somewhat different from those on integrity and confidentiality.
  • 17. • The best-known attack on availability is a denial of service (D o S) attack. • The resources in question may be memory, CPU time, network bandwidth, and/or any other component that an attacker can influence. • Understanding the components of the CIA triad and the concepts • Authentication, authorization, and nonrepudiation are tools that system designers can use to maintain these pillars.
  • 18. Basic Cryptography • Basic cryptography to explain the history and basics of ciphers and cryptanalysis. • The English word cryptography derives from Greek and translates roughly to “hidden writing.” • The ancient Egyptians began the first known practice of writing secret messages, using nonstandard hieroglyphs to convey secret messages as early as 1900 bc. • Since that time, people have developed many methods of hiding the content of a message. These methods are known as ciphers.
  • 19. • Substitution ciphers work by substituting each letter in the alphabet with another one when writing a message. abcdefghijklmnopqrstuvwxyz nopqrstuvwxyzabcdefghijklm . • Using this cipher, the message “the act starts at midnight” would be written as “gur npg fgnegf ng zvqavtug.” • Cryptography is driven by the constant struggle between people who want to keep messages secret and those who work to uncover their meanings.
  • 20. • It is easy to guess that a three-letter word at the beginning of a sentence is likely to be the. • By replacing all instances of the letters g, u, and r with t, h, and e, the cipher text changes to the npt ftnetf nt zvqavtht
  • 21. Cyber security essentials LETTER FREQUENCY LETTER FREQUENCY e 12.70% m 2.41% t 9.06% w 2.36% a 8.17% f 2.23% o 7.51% g 2.02% i 6.97% y 1.97% n 6.75% p 1.93% s 6.33% b 1.49% h 6.09% v 0.98% r 5.99% k 0.77% d 4.25% j 0.15% l 4.03% x 0.15% c 2.78% q 0.10% u 2.76% z 0.07%
  • 22. Udhaya kumar. A, II M.Sc (CS)- MTNC