network security

Post on 11-Apr-2017

185 Views

Category:

Engineering

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

NETWORKSECURITY

The Security that we render towards a NETWORK is called

Bh Durga Adithya Varma , CSE-A , 12N31A0532

NETWORK SECURITY1. Cryptography2. Types of Cryptography3. Steganography4. Cyber Crime/Attack5. Ethical Hacking6. Fire Walling7. Security Mechanisms8. Security Services9. Security Threats

Bh Durga Adithya Varma , CSE-A , 12N31A0532

CRYPTOGRAPHY

SUBSTITUTION CIPHERS(replaces the original text with secret text, keeping the order as it is)

TRANSPOSITION CIPHERS(replaces the original text with secret text, but changing its order)

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Substitution CipherPlain Text Letters:A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Cipher Text Letters:Q W R T Y U I O P A S D F G H J K L Z X C V B N M

The text MEET ME AFTER SCHOOL BEHIND THE GYM

Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Transposition CipherThe text MEET ME AFTER SCHOOL BEHIND THE GYM

Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO

Bh Durga Adithya Varma , CSE-A , 12N31A0532

CRYPTOGRAPHY Types of

1.SECRET KEY CRYPTOGRAPHY2.PUBLIC KEY CRYPTOGRAPHY

Bh Durga Adithya Varma , CSE-A , 12N31A0532

SECRET KEY CRYPTOGRAPHY

Plain Text Cipher Text

Cipher text Plain Text

Key

Encryption

Decryption

Bh Durga Adithya Varma , CSE-A , 12N31A0532

PUBLIC KEY CRYPTOGRAPHYEncryption

Plain Text Cipher Text

Cipher text Plain Text

Decryption

Public Key

Private Key

Bh Durga Adithya Varma , CSE-A , 12N31A0532

(Crime is an illegal act if it is done in NETWORKING it is CYBER CRIME)

Security System that protect your PC’s or NETWORK from HACKERS,INTRUDERS &MALICIOUS CODE

Bh Durga Adithya Varma , CSE-A , 12N31A0532

SECURITYMECHANISMS

A mechanism that is designed to detect, prevent, or recover from a security attack

Bh Durga Adithya Varma , CSE-A , 12N31A0532

SECURITY SERVICES

1. Normal Flow2. Interruption3. Interception4. Modification5. Fabrication

Bh Durga Adithya Varma , CSE-A , 12N31A0532

SECURITY THREATS

PASSIVE ATTACKS(In this the goal of the attacker is to obtain information that is

being transmitted)

ACTIVE ATTACKS(These attacks involve some modification of the Original Data Stream or

creation of False Stream)

Bh Durga Adithya Varma , CSE-A , 12N31A0532

CONCLUSIONSecurity is to be given to each and every Environments whether it is our

Personal Computing Environment (or)

Time Sharing Environment (or)

Client-Server Environment (or)

Distributed Computing Environment.

Bh Durga Adithya Varma , CSE-A , 12N31A0532

THANK YOU

Bh Durga Adithya Varma , CSE-A , 12N31A0532

top related