SlideShare a Scribd company logo
By
G. MANJUNATH, BCA III Year
 Introduction
 Risk Factors for Cryptography Systems
 Authentication and Key Establishment
 Types of Security Attacks
 Security Services
 Network Security Model
 Secret Key Cryptography
 Types of Firewalls
 Future Work
 Conclusion
Cryptography is the study of
secret (crypto-) writing (-graphy)
It verifies the correctness of a message to
the recipient (authentication)
A network Is an interconnection or a media between two or
more systems to share information among them.
The various threats caused to network are :
Remote Login
Application Backdoors
SMTP Session Hijackings
Operating System Bugs
Spams
Viruses etc.
There is no simple formula for determining how safe a specific
cryptosystem is from attacks and potential security compromises.
The Following Factors Affect The Risk Of Successful Attacks On
Cryptosystems:
 Symmetric Key Length
 Public Key Lifetimes
 Amount Of Plaintext Known To Attackers
 Strength Of The Security Implementation
 Randomness Of Generated Keys
 Strength Of The Security Protocols
Risk
Impact
Damage
Potential
No. of Affected
Components
Possibility
Degree Of
Migration
Ease Of
Exploitation
Discoverability
Exploitability Reproducability
 Authentication and key establishment
are foundational for establishment
of secure communication channels.
 There exists a variety of
authentication protocols for different
applications and with different security guarantees.
 The Authentication techniques such as private keys,
passwords, or biometric data,
and more sophisticated security
properties such as leakage resilience
or robustness.
The are few intertwined in network security as :
 Secrecy
 Authentication
 Non - Repudation
 Integrity Control etc
Theards are classified in two categories :
 Passive Attacks - eavesdropping on, or monitoring of, transmissions to:
 obtain message contents, or
 monitor traffic flows
 Active Attacks – modification of data stream to:
 masquerade of one entity as some other
 replay previous messages
 modify messages in transit
 denial of service
It is a service that is provided by a protocol
layer of communicating and security systems or data
transmission. It enhances the security of data
processing and transferring.
Data Integrity
Data Confidentiality
Authenticity
Non - Repudiation
Access Control
 A message is to be transferred from
one part of Internet service.
 A security-related y to another across
some sort of transformation on the
information to be sent.
 Message should be encrypted by key so that it is unreadable by
the opponent
 An encryption key used in conjunction
with scramble the message before
transmission and unscramble it on
reception
AES was designed to be efficient in both hardware and software.
AES comprises three block ciphers, are
AES-128,
AES-192 and
AES-256.
Each cipher encrypts and decrypts data in blocks of 128 bits
using cryptographic keys of 128-, 192- and 256-bits.
AES is largely considered impervious to all attacks, with the
exception of brute force.
Security experts believe that AES will eventually be hailed the de
facto standard for encrypting data in the private sector.
It can operate as a positivefilter, allowingto pass only packets thatmeet
specific criteria,or as a negativefilter, rejectingany packet that meetscertain
criteria.
Type of firewall:
PacketFilter
Stateful PacketInspection
Application-LevelGateway
13
 Prevents cyber attack
 Levels of access
 Protect data
 Confidentiality
 Authentication
 Data Integrity
 Non-repudiation
 Costly set up
 Time consuming
 Requires skilled staff
 Careless admin
 Difficult to access
even for a legitimate
user
 High availability
 Selective access
control
 The explosive growth in the Internet Network and
data security have become an inevitable concern
whose internal private network is connected to the
Internet.
 The security for the data has become highly
important. User’s data privacy is a central question
over cloud.
 With more mathematical tools, cryptographic
schemes are getting more versatile and often
involve multiple keys for a single application
 Network Security is the most vital
component in information security
it is responsible for securing all
information passed through networked computers adopted
by the administrator to protect the network accessible
resources from unauthorized access
 Cryptographic techniques to increase the security of
network provide a high degree of protection in digital
communications against intruder attacks
1 - William Stallings Principles And Practices
Book
2 - Lawrie Brown
3 - Dr. Himanshu Gupta ,Senior Faculty
Member, Amity University
4 - Xiang-yang Li

More Related Content

What's hot

Ch20
Ch20Ch20
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
sandeepsandy75
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
Meet Soni
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Seqrite
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
Seqrite
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Ch18
Ch18Ch18
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
Dr.Florence Dayana
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Fat-Thing Gabriel-Culley
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Network security ppt
Network security pptNetwork security ppt
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
vasanthimuniasamy
 
Network management and security
Network management and securityNetwork management and security
Network management and security
Ankit Bhandari
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
sheikhparvez4
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
veeresh35
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
Joe McCarthy
 
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 

What's hot (20)

Ch20
Ch20Ch20
Ch20
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Ch18
Ch18Ch18
Ch18
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Network security
Network securityNetwork security
Network security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 

Similar to Network Security and Cryptography

Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ssuser6e8e41
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
Saranya Natarajan
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
eSAT Publishing House
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
eSAT Journals
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
RavikumarVadana
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
Nitesh Dubey
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
prosunghosh7
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
Umang Gupta
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
Biroja
 
Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptx
SamyLacheheub
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
Kerry Cole
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
Manish Tiwari
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
JeevananthamArumugam
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
SHUBHA CHATURVEDI
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
 

Similar to Network Security and Cryptography (20)

Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Network security
Network security Network security
Network security
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptx
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Network Security and Cryptography

  • 2.  Introduction  Risk Factors for Cryptography Systems  Authentication and Key Establishment  Types of Security Attacks  Security Services  Network Security Model  Secret Key Cryptography  Types of Firewalls  Future Work  Conclusion
  • 3. Cryptography is the study of secret (crypto-) writing (-graphy) It verifies the correctness of a message to the recipient (authentication) A network Is an interconnection or a media between two or more systems to share information among them. The various threats caused to network are : Remote Login Application Backdoors SMTP Session Hijackings Operating System Bugs Spams Viruses etc.
  • 4. There is no simple formula for determining how safe a specific cryptosystem is from attacks and potential security compromises. The Following Factors Affect The Risk Of Successful Attacks On Cryptosystems:  Symmetric Key Length  Public Key Lifetimes  Amount Of Plaintext Known To Attackers  Strength Of The Security Implementation  Randomness Of Generated Keys  Strength Of The Security Protocols
  • 5. Risk Impact Damage Potential No. of Affected Components Possibility Degree Of Migration Ease Of Exploitation Discoverability Exploitability Reproducability
  • 6.  Authentication and key establishment are foundational for establishment of secure communication channels.  There exists a variety of authentication protocols for different applications and with different security guarantees.  The Authentication techniques such as private keys, passwords, or biometric data, and more sophisticated security properties such as leakage resilience or robustness.
  • 7. The are few intertwined in network security as :  Secrecy  Authentication  Non - Repudation  Integrity Control etc Theards are classified in two categories :  Passive Attacks - eavesdropping on, or monitoring of, transmissions to:  obtain message contents, or  monitor traffic flows  Active Attacks – modification of data stream to:  masquerade of one entity as some other  replay previous messages  modify messages in transit  denial of service
  • 8. It is a service that is provided by a protocol layer of communicating and security systems or data transmission. It enhances the security of data processing and transferring. Data Integrity Data Confidentiality Authenticity Non - Repudiation Access Control
  • 9.  A message is to be transferred from one part of Internet service.  A security-related y to another across some sort of transformation on the information to be sent.  Message should be encrypted by key so that it is unreadable by the opponent  An encryption key used in conjunction with scramble the message before transmission and unscramble it on reception
  • 10. AES was designed to be efficient in both hardware and software. AES comprises three block ciphers, are AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and 256-bits. AES is largely considered impervious to all attacks, with the exception of brute force. Security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.
  • 11.
  • 12. It can operate as a positivefilter, allowingto pass only packets thatmeet specific criteria,or as a negativefilter, rejectingany packet that meetscertain criteria. Type of firewall: PacketFilter Stateful PacketInspection Application-LevelGateway
  • 13. 13
  • 14.  Prevents cyber attack  Levels of access  Protect data  Confidentiality  Authentication  Data Integrity  Non-repudiation  Costly set up  Time consuming  Requires skilled staff  Careless admin  Difficult to access even for a legitimate user  High availability  Selective access control
  • 15.  The explosive growth in the Internet Network and data security have become an inevitable concern whose internal private network is connected to the Internet.  The security for the data has become highly important. User’s data privacy is a central question over cloud.  With more mathematical tools, cryptographic schemes are getting more versatile and often involve multiple keys for a single application
  • 16.  Network Security is the most vital component in information security it is responsible for securing all information passed through networked computers adopted by the administrator to protect the network accessible resources from unauthorized access  Cryptographic techniques to increase the security of network provide a high degree of protection in digital communications against intruder attacks
  • 17. 1 - William Stallings Principles And Practices Book 2 - Lawrie Brown 3 - Dr. Himanshu Gupta ,Senior Faculty Member, Amity University 4 - Xiang-yang Li