Download - Network Security
NETWORKSECURITY
The Security that we render towards a NETWORK is called
Bh Durga Adithya Varma , CSE-A , 12N31A0532
NETWORK SECURITY1. Cryptography2. Types of Cryptography3. Steganography4. Cyber Crime/Attack5. Ethical Hacking6. Fire Walling7. Security Mechanisms8. Security Services9. Security Threats
Bh Durga Adithya Varma , CSE-A , 12N31A0532
CRYPTOGRAPHY
SUBSTITUTION CIPHERS(replaces the original text with secret text, keeping the order as it is)
TRANSPOSITION CIPHERS(replaces the original text with secret text, but changing its order)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Substitution CipherPlain Text Letters:A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher Text Letters:Q W R T Y U I O P A S D F G H J K L Z X C V B N M
The text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Transposition CipherThe text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO
Bh Durga Adithya Varma , CSE-A , 12N31A0532
CRYPTOGRAPHY Types of
1.SECRET KEY CRYPTOGRAPHY2.PUBLIC KEY CRYPTOGRAPHY
Bh Durga Adithya Varma , CSE-A , 12N31A0532
SECRET KEY CRYPTOGRAPHY
Plain Text Cipher Text
Cipher text Plain Text
Key
Encryption
Decryption
Bh Durga Adithya Varma , CSE-A , 12N31A0532
PUBLIC KEY CRYPTOGRAPHYEncryption
Plain Text Cipher Text
Cipher text Plain Text
Decryption
Public Key
Private Key
Bh Durga Adithya Varma , CSE-A , 12N31A0532
(Crime is an illegal act if it is done in NETWORKING it is CYBER CRIME)
Security System that protect your PC’s or NETWORK from HACKERS,INTRUDERS &MALICIOUS CODE
Bh Durga Adithya Varma , CSE-A , 12N31A0532
SECURITYMECHANISMS
A mechanism that is designed to detect, prevent, or recover from a security attack
Bh Durga Adithya Varma , CSE-A , 12N31A0532
SECURITY SERVICES
1. Normal Flow2. Interruption3. Interception4. Modification5. Fabrication
Bh Durga Adithya Varma , CSE-A , 12N31A0532
SECURITY THREATS
PASSIVE ATTACKS(In this the goal of the attacker is to obtain information that is
being transmitted)
ACTIVE ATTACKS(These attacks involve some modification of the Original Data Stream or
creation of False Stream)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
CONCLUSIONSecurity is to be given to each and every Environments whether it is our
Personal Computing Environment (or)
Time Sharing Environment (or)
Client-Server Environment (or)
Distributed Computing Environment.
Bh Durga Adithya Varma , CSE-A , 12N31A0532
THANK YOU
Bh Durga Adithya Varma , CSE-A , 12N31A0532