SlideShare a Scribd company logo
1 of 15
The Security that we render towards a
NETWORK is called
Bh Durga Adithya Varma , CSE-A , 12N31A0532
1. Cryptography
2. Types of Cryptography
3. Steganography
4. Cyber Crime/Attack
5. Ethical Hacking
6. Fire Walling
7. Security Mechanisms
8. Security Services
9. Security Threats
Bh Durga Adithya Varma , CSE-A , 12N31A0532
CRYPTOGRAPHY
SUBSTITUTION CIPHERS
(replaces the original text with secret text, keeping the order as it is)
TRANSPOSITION CIPHERS
(replaces the original text with secret text, but changing its order)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Plain Text Letters:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher Text Letters:
Q W R T Y U I O P A S D F G H J K L Z X C V B N M
The text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM
Bh Durga Adithya Varma , CSE-A , 12N31A0532
The text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO
Bh Durga Adithya Varma , CSE-A , 12N31A0532
1.SECRET KEY CRYPTOGRAPHY
2.PUBLIC KEY CRYPTOGRAPHY
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Plain Text Cipher Text
Cipher text Plain Text
Key
Encryption
Decryption
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Encryption
Plain Text Cipher Text
Cipher text Plain Text
Decryption
Public Key
Private Key
Bh Durga Adithya Varma , CSE-A , 12N31A0532
(Crime is an illegal act if it is done in NETWORKING it is CYBER CRIME)
Security System that protect your PC’s or NETWORK from
HACKERS,INTRUDERS &MALICIOUS CODE
Bh Durga Adithya Varma , CSE-A , 12N31A0532
A mechanism that is designed to detect, prevent,
or recover from a security attack
Bh Durga Adithya Varma , CSE-A , 12N31A0532
1. Normal Flow
2. Interruption
3. Interception
4. Modification
5. Fabrication
Bh Durga Adithya Varma , CSE-A , 12N31A0532
SECURITY THREATS
PASSIVE ATTACKS
(In this the goal of the attacker is to obtain information that is
being transmitted)
ACTIVE ATTACKS
(These attacks involve some modification of the Original Data Stream or
creation of False Stream)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
CONCLUSION
Security is to be given to each and every Environments whether it is our
Personal Computing Environment
(or)
Time Sharing Environment
(or)
Client-Server Environment
(or)
Distributed Computing Environment.
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Bh Durga Adithya Varma , CSE-A , 12N31A0532

More Related Content

Viewers also liked (8)

Idea to world class Product
Idea to world class ProductIdea to world class Product
Idea to world class Product
 
Blogs Práctica UTPL
Blogs Práctica UTPLBlogs Práctica UTPL
Blogs Práctica UTPL
 
Book chennai to delhi flights
Book chennai to delhi flightsBook chennai to delhi flights
Book chennai to delhi flights
 
Identifying Opportunities for Climate-Compatible Tourism Development in Belize
Identifying Opportunities for Climate-Compatible Tourism Development in BelizeIdentifying Opportunities for Climate-Compatible Tourism Development in Belize
Identifying Opportunities for Climate-Compatible Tourism Development in Belize
 
Derechos Humanos de las personas detenidas
Derechos Humanos de las personas detenidasDerechos Humanos de las personas detenidas
Derechos Humanos de las personas detenidas
 
Historic District Overlay Ordinance
Historic District Overlay OrdinanceHistoric District Overlay Ordinance
Historic District Overlay Ordinance
 
For U
For UFor U
For U
 
Lear english
Lear englishLear english
Lear english
 

Similar to Network Security

Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Rahulprasad Yadav
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
Google
 

Similar to Network Security (20)

Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Information Security
Information SecurityInformation Security
Information Security
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security Presentation
 
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREHARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
 
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREHARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
 
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREHARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
 
Security and Cryptography
Security and CryptographySecurity and Cryptography
Security and Cryptography
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Rsa
RsaRsa
Rsa
 
Information Security
Information SecurityInformation Security
Information Security
 

Recently uploaded

Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
Kira Dess
 

Recently uploaded (20)

Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 

Network Security

  • 1. The Security that we render towards a NETWORK is called Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 2. 1. Cryptography 2. Types of Cryptography 3. Steganography 4. Cyber Crime/Attack 5. Ethical Hacking 6. Fire Walling 7. Security Mechanisms 8. Security Services 9. Security Threats Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 3. CRYPTOGRAPHY SUBSTITUTION CIPHERS (replaces the original text with secret text, keeping the order as it is) TRANSPOSITION CIPHERS (replaces the original text with secret text, but changing its order) Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 4. Plain Text Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher Text Letters: Q W R T Y U I O P A S D F G H J K L Z X C V B N M The text MEET ME AFTER SCHOOL BEHIND THE GYM Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 5. The text MEET ME AFTER SCHOOL BEHIND THE GYM Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 6. 1.SECRET KEY CRYPTOGRAPHY 2.PUBLIC KEY CRYPTOGRAPHY Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 7. Plain Text Cipher Text Cipher text Plain Text Key Encryption Decryption Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 8. Encryption Plain Text Cipher Text Cipher text Plain Text Decryption Public Key Private Key Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 9. (Crime is an illegal act if it is done in NETWORKING it is CYBER CRIME)
  • 10. Security System that protect your PC’s or NETWORK from HACKERS,INTRUDERS &MALICIOUS CODE Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 11. A mechanism that is designed to detect, prevent, or recover from a security attack Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 12. 1. Normal Flow 2. Interruption 3. Interception 4. Modification 5. Fabrication Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 13. SECURITY THREATS PASSIVE ATTACKS (In this the goal of the attacker is to obtain information that is being transmitted) ACTIVE ATTACKS (These attacks involve some modification of the Original Data Stream or creation of False Stream) Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 14. CONCLUSION Security is to be given to each and every Environments whether it is our Personal Computing Environment (or) Time Sharing Environment (or) Client-Server Environment (or) Distributed Computing Environment. Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 15. Bh Durga Adithya Varma , CSE-A , 12N31A0532