SlideShare a Scribd company logo
1 of 10
NETWORK SECURITY
What is Network Security
Security refers to techniques for ensuring that data stored in a
computer cannot be read or compromised by any individuals
without authorization. Most security measures involve data
encryption and passwords.
Security problems
Problem Description
Phishing Masquerading as a well-known site such as a bank
to obtain a user’s personal information, typically
an
account number and access code
Misrepresentation Making false or exaggerated claims about goods
or
services, or delivering fake or inferior products
Scams Various forms of trickery intended to deceive
naive
users into investing money or abetting a crime
Denial of Service Intentionally blocking a particular Internet site to
prevent or hinder business activities and
commerce
Loss of Control An intruder gains control of a computer system
and uses the system to perpetrate a crime
Loss of Data Loss of intellectual property or other valuable
proprietary business information
Security services
Network security can provide one of the five services as shown
in Figure. Four of these services are related to the message
exchanged using the network: message confidentiality, integrity,
authentication, and nonrepudiation. The fifth service provides
entity authentication or identification.
Message confidentiality
Confidentiality with symmetric key
Confidentiality with Asymmetric key
MESSAGE INTEGRITY
Routing
Message digest
MAC
MESSAGE AUTHENTICATION
HMAC
DIGITAL SIGNATURE
Signing the digest
Signing the message
ENTITY AUTHENTICATION
Challenge response using symmetric key
Password
Hey Friend,
This was just a summary on Network Security. For more detailed
information on this topic, please type the link given below or copy it
from the description of this PPT and open it in a new browser
window.
www.transtutors.com/homework-help/computer-science/network-security.aspx

More Related Content

What's hot

Trust It Mini Public
Trust It Mini PublicTrust It Mini Public
Trust It Mini PublicTrust_IT
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
maya seminar technology
maya seminar technologymaya seminar technology
maya seminar technologyVIchu10
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerceanshutomar6
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
Protecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackProtecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackBen Jones
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Analyzing securewebsites
Analyzing securewebsitesAnalyzing securewebsites
Analyzing securewebsitesDr. TJ Wolfe
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: HackingBareetSingh
 
Smarsh Email Encryption - Presented by Atidan
Smarsh Email Encryption - Presented by AtidanSmarsh Email Encryption - Presented by Atidan
Smarsh Email Encryption - Presented by AtidanDavid J Rosenthal
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 

What's hot (20)

Trust It Mini Public
Trust It Mini PublicTrust It Mini Public
Trust It Mini Public
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
technology
technologytechnology
technology
 
maya seminar technology
maya seminar technologymaya seminar technology
maya seminar technology
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Protecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackProtecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber Attack
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Analyzing securewebsites
Analyzing securewebsitesAnalyzing securewebsites
Analyzing securewebsites
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
Smarsh Email Encryption - Presented by Atidan
Smarsh Email Encryption - Presented by AtidanSmarsh Email Encryption - Presented by Atidan
Smarsh Email Encryption - Presented by Atidan
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Data security
Data securityData security
Data security
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 

Similar to Network Security | Computer Science

Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Cyber security beginner level presentation slide
Cyber security beginner level presentation slideCyber security beginner level presentation slide
Cyber security beginner level presentation slideMd. Ismiel Hossen Abir
 
Fraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTFraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTCyberambessador
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfjainutkarsh078
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
How to Protect Your Company from Broken Authentication Attacks?
How to Protect Your Company from Broken Authentication Attacks?How to Protect Your Company from Broken Authentication Attacks?
How to Protect Your Company from Broken Authentication Attacks?Caroline Johnson
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...mohammedSALEH189
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptxrehamrere
 
Website security
Website securityWebsite security
Website securityRIPPER95
 

Similar to Network Security | Computer Science (20)

Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Security environment
Security environmentSecurity environment
Security environment
 
E comm jatin
E comm jatinE comm jatin
E comm jatin
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Cyber security beginner level presentation slide
Cyber security beginner level presentation slideCyber security beginner level presentation slide
Cyber security beginner level presentation slide
 
Fraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTFraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPT
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Security in it
Security in it Security in it
Security in it
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
How to Protect Your Company from Broken Authentication Attacks?
How to Protect Your Company from Broken Authentication Attacks?How to Protect Your Company from Broken Authentication Attacks?
How to Protect Your Company from Broken Authentication Attacks?
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
E commerce security
E commerce securityE commerce security
E commerce security
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
Website security
Website securityWebsite security
Website security
 

More from Transweb Global Inc

Resultant of Coplanar Parallel Forces | Mechanical Engineering
Resultant of Coplanar Parallel Forces | Mechanical EngineeringResultant of Coplanar Parallel Forces | Mechanical Engineering
Resultant of Coplanar Parallel Forces | Mechanical EngineeringTransweb Global Inc
 
The Centroidal Axis | Mechanical Engineering
The Centroidal Axis | Mechanical EngineeringThe Centroidal Axis | Mechanical Engineering
The Centroidal Axis | Mechanical EngineeringTransweb Global Inc
 
System Of Coplanar Forces | Mechanical Engineering
System Of Coplanar Forces | Mechanical EngineeringSystem Of Coplanar Forces | Mechanical Engineering
System Of Coplanar Forces | Mechanical EngineeringTransweb Global Inc
 
Resultant of Two Unlike and Unequal Parallel Forces | Mechanical Engineering
Resultant of Two Unlike and Unequal Parallel Forces | Mechanical EngineeringResultant of Two Unlike and Unequal Parallel Forces | Mechanical Engineering
Resultant of Two Unlike and Unequal Parallel Forces | Mechanical EngineeringTransweb Global Inc
 
SFD Load Diagram Examples | Mechanical Engineering
SFD Load Diagram Examples | Mechanical EngineeringSFD Load Diagram Examples | Mechanical Engineering
SFD Load Diagram Examples | Mechanical EngineeringTransweb Global Inc
 
Principle Of Transmissibility | Mechanical Engineering
Principle Of Transmissibility | Mechanical EngineeringPrinciple Of Transmissibility | Mechanical Engineering
Principle Of Transmissibility | Mechanical EngineeringTransweb Global Inc
 
Law Of Polygon | Mechanical Engineering
Law Of Polygon | Mechanical EngineeringLaw Of Polygon | Mechanical Engineering
Law Of Polygon | Mechanical EngineeringTransweb Global Inc
 
Similarities between Leadership and Management | Management
Similarities between Leadership and Management | ManagementSimilarities between Leadership and Management | Management
Similarities between Leadership and Management | ManagementTransweb Global Inc
 
Ranked Positional Weight Method | Management
Ranked Positional Weight Method | ManagementRanked Positional Weight Method | Management
Ranked Positional Weight Method | ManagementTransweb Global Inc
 
Business Intelligence And Business Analytics | Management
Business Intelligence And Business Analytics | ManagementBusiness Intelligence And Business Analytics | Management
Business Intelligence And Business Analytics | ManagementTransweb Global Inc
 
Conductance | Electrical Engineering
Conductance | Electrical EngineeringConductance | Electrical Engineering
Conductance | Electrical EngineeringTransweb Global Inc
 
Advantages and Disadvantages of Digital Electronics | Electrical Engineering
Advantages and Disadvantages of Digital Electronics | Electrical EngineeringAdvantages and Disadvantages of Digital Electronics | Electrical Engineering
Advantages and Disadvantages of Digital Electronics | Electrical EngineeringTransweb Global Inc
 
Stabilization Of Operating Point | Electrical Engineering
Stabilization Of Operating Point | Electrical EngineeringStabilization Of Operating Point | Electrical Engineering
Stabilization Of Operating Point | Electrical EngineeringTransweb Global Inc
 
Computer Architecture | Computer Science
Computer Architecture | Computer ScienceComputer Architecture | Computer Science
Computer Architecture | Computer ScienceTransweb Global Inc
 
Compilers Computer Program | Computer Science
Compilers Computer Program | Computer ScienceCompilers Computer Program | Computer Science
Compilers Computer Program | Computer ScienceTransweb Global Inc
 

More from Transweb Global Inc (20)

Resultant of Coplanar Parallel Forces | Mechanical Engineering
Resultant of Coplanar Parallel Forces | Mechanical EngineeringResultant of Coplanar Parallel Forces | Mechanical Engineering
Resultant of Coplanar Parallel Forces | Mechanical Engineering
 
The Centroidal Axis | Mechanical Engineering
The Centroidal Axis | Mechanical EngineeringThe Centroidal Axis | Mechanical Engineering
The Centroidal Axis | Mechanical Engineering
 
System Of Coplanar Forces | Mechanical Engineering
System Of Coplanar Forces | Mechanical EngineeringSystem Of Coplanar Forces | Mechanical Engineering
System Of Coplanar Forces | Mechanical Engineering
 
Resultant of Two Unlike and Unequal Parallel Forces | Mechanical Engineering
Resultant of Two Unlike and Unequal Parallel Forces | Mechanical EngineeringResultant of Two Unlike and Unequal Parallel Forces | Mechanical Engineering
Resultant of Two Unlike and Unequal Parallel Forces | Mechanical Engineering
 
SFD Load Diagram Examples | Mechanical Engineering
SFD Load Diagram Examples | Mechanical EngineeringSFD Load Diagram Examples | Mechanical Engineering
SFD Load Diagram Examples | Mechanical Engineering
 
Principle Of Transmissibility | Mechanical Engineering
Principle Of Transmissibility | Mechanical EngineeringPrinciple Of Transmissibility | Mechanical Engineering
Principle Of Transmissibility | Mechanical Engineering
 
Law Of Polygon | Mechanical Engineering
Law Of Polygon | Mechanical EngineeringLaw Of Polygon | Mechanical Engineering
Law Of Polygon | Mechanical Engineering
 
Similarities between Leadership and Management | Management
Similarities between Leadership and Management | ManagementSimilarities between Leadership and Management | Management
Similarities between Leadership and Management | Management
 
Ranked Positional Weight Method | Management
Ranked Positional Weight Method | ManagementRanked Positional Weight Method | Management
Ranked Positional Weight Method | Management
 
Business Intelligence And Business Analytics | Management
Business Intelligence And Business Analytics | ManagementBusiness Intelligence And Business Analytics | Management
Business Intelligence And Business Analytics | Management
 
ABC Cost Hierarchy | Management
ABC Cost Hierarchy | ManagementABC Cost Hierarchy | Management
ABC Cost Hierarchy | Management
 
Speed To Market | Management
Speed To Market | ManagementSpeed To Market | Management
Speed To Market | Management
 
Managerial Hubris | Finance
Managerial Hubris | FinanceManagerial Hubris | Finance
Managerial Hubris | Finance
 
Conductance | Electrical Engineering
Conductance | Electrical EngineeringConductance | Electrical Engineering
Conductance | Electrical Engineering
 
Advantages and Disadvantages of Digital Electronics | Electrical Engineering
Advantages and Disadvantages of Digital Electronics | Electrical EngineeringAdvantages and Disadvantages of Digital Electronics | Electrical Engineering
Advantages and Disadvantages of Digital Electronics | Electrical Engineering
 
Stabilization Of Operating Point | Electrical Engineering
Stabilization Of Operating Point | Electrical EngineeringStabilization Of Operating Point | Electrical Engineering
Stabilization Of Operating Point | Electrical Engineering
 
Offer Curves | Economics
Offer Curves | EconomicsOffer Curves | Economics
Offer Curves | Economics
 
Fixed Exchange Rate | Economics
Fixed Exchange Rate | EconomicsFixed Exchange Rate | Economics
Fixed Exchange Rate | Economics
 
Computer Architecture | Computer Science
Computer Architecture | Computer ScienceComputer Architecture | Computer Science
Computer Architecture | Computer Science
 
Compilers Computer Program | Computer Science
Compilers Computer Program | Computer ScienceCompilers Computer Program | Computer Science
Compilers Computer Program | Computer Science
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Network Security | Computer Science

  • 2. What is Network Security Security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most security measures involve data encryption and passwords.
  • 3. Security problems Problem Description Phishing Masquerading as a well-known site such as a bank to obtain a user’s personal information, typically an account number and access code Misrepresentation Making false or exaggerated claims about goods or services, or delivering fake or inferior products Scams Various forms of trickery intended to deceive naive users into investing money or abetting a crime Denial of Service Intentionally blocking a particular Internet site to prevent or hinder business activities and commerce Loss of Control An intruder gains control of a computer system and uses the system to perpetrate a crime Loss of Data Loss of intellectual property or other valuable proprietary business information
  • 4. Security services Network security can provide one of the five services as shown in Figure. Four of these services are related to the message exchanged using the network: message confidentiality, integrity, authentication, and nonrepudiation. The fifth service provides entity authentication or identification.
  • 5. Message confidentiality Confidentiality with symmetric key Confidentiality with Asymmetric key
  • 8. DIGITAL SIGNATURE Signing the digest Signing the message
  • 9. ENTITY AUTHENTICATION Challenge response using symmetric key Password
  • 10. Hey Friend, This was just a summary on Network Security. For more detailed information on this topic, please type the link given below or copy it from the description of this PPT and open it in a new browser window. www.transtutors.com/homework-help/computer-science/network-security.aspx