SlideShare a Scribd company logo
1 of 16
We are living in the information age. We need to keep
information about every aspect of our lives. In other words,
information is an asset that has a value like any other asset.
As an asset, information needs to be secured from attacks.
To be secured, information needs to be hidden from
unauthorized access (confidentiality), protected from
unauthorized change (integrity), and available to an authorized
entity when it is needed (availability).
In the computer industry, the term security refers to
techniques for ensuring that data stored in a computer cannot
be read or compromised by any individuals without authorization
•Confidentiality: only sender, intended receiver should “understand”
message contents

•Authentication: sender, receiver want to confirm identity of each
other
• Message integrity: sender, receiver want to ensure message not
altered without detection.
•Access and availability: services must be accessible and available
to users
Network security refers to any activities
designed to protect your network. Specifically, these
activities protect the usability, reliability, integrity, and
safety of your network and data.

Effective network security targets a variety of threats
and stops them from entering or spreading on your
network
The most common include :
1 Viruses, worms, and Trojan horses
2 Spyware and adware
3 Zero-day attacks, also called zero-hour attacks
4 Hacker attacks
5 Denial of service attacks
6 Data interception and theft
7 Identity theft
Network security is accomplished through hardware and
software.
Network security components often include:
• Anti-virus and anti-spyware
• Firewall, to block unauthorized access to your network
• Intrusion prevention systems (IPS), to identify fastspreading threats, such as zero-day or zero-hour attacks
• Virtual Private Networks (VPNs), to provide secure remote
access


Antivirus software packages : These packages counter most
virus threats if regularly updated and correctly maintained.



Network infrastructure : Switches and routers have
hardware and software features that support secure
connectivity, intrusion protection, identity services, and
security management.



Dedicated network security hardware and software-Tools
such as firewalls and intrusion detection systems provide
protection for all areas of the network and enable secure
connections.


Identity services : These services help to identify users and
control their activities and transactions on the network.
Services include passwords, digital certificates, and digital
authentication keys.



Encryption : Encryption ensures that messages cannot be
intercepted or read by anyone other than the authorized
recipient.



Security management : This is the glue that holds together
the other building blocks of a strong security solution



Virtual private networks : These networks provide access
control and data encryption between two different computers
on a network.
A set of mathematical functions with a set of nice
properties. A common mechanism for enforcing policies. Encrypt
clear text into cipher text, and vice versa .
Properties of good encryption techniques encryption
scheme depends not on secrecy of algorithm but on parameter of
algorithm .
1) symmetric key algorithm: one shared by a pair of users
used for both encryption and decryption
2) Asymmetric or public/private key algorithms are based
on each user having two keys: public key – in public
private key – key known only to individual user
Private key cryptography:Traditional private key cryptography uses one key
• shared by both sender and receiver
• if this key is disclosed communications are compromised
• also is symmetric, because parties are equal
•hence does not protect sender from receiver forging a
message & claiming is sent by sender
Public key cryptography:Requires sender, receiver know shared secret key
radically different approach sender, receiver do not share
secret key public encryption key known to all private
decryption key known only to receiver


Asymmetric cryptography involves the use of two keys:



A public-key, which may be known by anybody, and can
be used to encrypt messages, and verify signatures



A private-key, known only to the recipient, used to
decrypt messages, and sign (create) signatures is
asymmetric because those who encrypt messages or
verify signatures cannot decrypt messages or create
signatures


Message integrity



Digital signature



End point authentication
 Information security is increasingly important .
 Have varying degrees of sensitivity of information.
 So we need to secure our data. As I said in this
presentation there are different ways for securing our
network.

More Related Content

What's hot

Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11
Amit Fogla
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
Kiran Munir
 

What's hot (19)

Security services
Security servicesSecurity services
Security services
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
01 Application Security Fundamentals - part 1 - introduction and goals
01 Application Security Fundamentals - part 1 - introduction and goals01 Application Security Fundamentals - part 1 - introduction and goals
01 Application Security Fundamentals - part 1 - introduction and goals
 
Ch01
Ch01Ch01
Ch01
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
N5 security precautions
N5 security precautionsN5 security precautions
N5 security precautions
 
Security
SecuritySecurity
Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
 
Data encryption-ciphers
Data encryption-ciphersData encryption-ciphers
Data encryption-ciphers
 
Network security
Network securityNetwork security
Network security
 

Viewers also liked

Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
webhostingguy
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Network and network security
Network and network securityNetwork and network security
Network and network security
Ruchi Gupta
 

Viewers also liked (20)

Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
13. Casting
13. Casting13. Casting
13. Casting
 
Message Hiding
Message HidingMessage Hiding
Message Hiding
 
Security and Cryptography
Security and CryptographySecurity and Cryptography
Security and Cryptography
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Party pronto pres new
Party pronto pres newParty pronto pres new
Party pronto pres new
 
E securty
E securtyE securty
E securty
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Network and network security
Network and network securityNetwork and network security
Network and network security
 
Nymble: Blocking System
Nymble: Blocking SystemNymble: Blocking System
Nymble: Blocking System
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
 
Pgp smime
Pgp smimePgp smime
Pgp smime
 

Similar to Network security & cryptography

Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
AparnaSunil24
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Network security & cryptography (20)

Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
typesofattacks-180418113629.pdf
typesofattacks-180418113629.pdftypesofattacks-180418113629.pdf
typesofattacks-180418113629.pdf
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 

Recently uploaded

Recently uploaded (20)

Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Network security & cryptography

  • 1.
  • 2. We are living in the information age. We need to keep information about every aspect of our lives. In other words, information is an asset that has a value like any other asset. As an asset, information needs to be secured from attacks. To be secured, information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and available to an authorized entity when it is needed (availability).
  • 3. In the computer industry, the term security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization •Confidentiality: only sender, intended receiver should “understand” message contents •Authentication: sender, receiver want to confirm identity of each other • Message integrity: sender, receiver want to ensure message not altered without detection. •Access and availability: services must be accessible and available to users
  • 4. Network security refers to any activities designed to protect your network. Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network
  • 5. The most common include : 1 Viruses, worms, and Trojan horses 2 Spyware and adware 3 Zero-day attacks, also called zero-hour attacks 4 Hacker attacks 5 Denial of service attacks 6 Data interception and theft 7 Identity theft
  • 6. Network security is accomplished through hardware and software. Network security components often include: • Anti-virus and anti-spyware • Firewall, to block unauthorized access to your network • Intrusion prevention systems (IPS), to identify fastspreading threats, such as zero-day or zero-hour attacks • Virtual Private Networks (VPNs), to provide secure remote access
  • 7.  Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained.  Network infrastructure : Switches and routers have hardware and software features that support secure connectivity, intrusion protection, identity services, and security management.  Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.
  • 8.  Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys.  Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.  Security management : This is the glue that holds together the other building blocks of a strong security solution  Virtual private networks : These networks provide access control and data encryption between two different computers on a network.
  • 9. A set of mathematical functions with a set of nice properties. A common mechanism for enforcing policies. Encrypt clear text into cipher text, and vice versa . Properties of good encryption techniques encryption scheme depends not on secrecy of algorithm but on parameter of algorithm .
  • 10. 1) symmetric key algorithm: one shared by a pair of users used for both encryption and decryption 2) Asymmetric or public/private key algorithms are based on each user having two keys: public key – in public private key – key known only to individual user
  • 11. Private key cryptography:Traditional private key cryptography uses one key • shared by both sender and receiver • if this key is disclosed communications are compromised • also is symmetric, because parties are equal •hence does not protect sender from receiver forging a message & claiming is sent by sender Public key cryptography:Requires sender, receiver know shared secret key radically different approach sender, receiver do not share secret key public encryption key known to all private decryption key known only to receiver
  • 12.
  • 13.  Asymmetric cryptography involves the use of two keys:  A public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures  A private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures is asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures
  • 14.
  • 16.  Information security is increasingly important .  Have varying degrees of sensitivity of information.  So we need to secure our data. As I said in this presentation there are different ways for securing our network.