network security
TRANSCRIPT
![Page 1: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/1.jpg)
NETWORKSECURITY
The Security that we render towards a NETWORK is called
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 2: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/2.jpg)
NETWORK SECURITY1. Cryptography2. Types of Cryptography3. Steganography4. Cyber Crime/Attack5. Ethical Hacking6. Fire Walling7. Security Mechanisms8. Security Services9. Security Threats
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 3: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/3.jpg)
CRYPTOGRAPHY
SUBSTITUTION CIPHERS(replaces the original text with secret text, keeping the order as it is)
TRANSPOSITION CIPHERS(replaces the original text with secret text, but changing its order)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 4: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/4.jpg)
Substitution CipherPlain Text Letters:A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher Text Letters:Q W R T Y U I O P A S D F G H J K L Z X C V B N M
The text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 5: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/5.jpg)
Transposition CipherThe text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 6: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/6.jpg)
CRYPTOGRAPHY Types of
1.SECRET KEY CRYPTOGRAPHY2.PUBLIC KEY CRYPTOGRAPHY
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 7: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/7.jpg)
SECRET KEY CRYPTOGRAPHY
Plain Text Cipher Text
Cipher text Plain Text
Key
Encryption
Decryption
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 8: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/8.jpg)
PUBLIC KEY CRYPTOGRAPHYEncryption
Plain Text Cipher Text
Cipher text Plain Text
Decryption
Public Key
Private Key
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 9: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/9.jpg)
(Crime is an illegal act if it is done in NETWORKING it is CYBER CRIME)
![Page 10: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/10.jpg)
Security System that protect your PC’s or NETWORK from HACKERS,INTRUDERS &MALICIOUS CODE
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 11: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/11.jpg)
SECURITYMECHANISMS
A mechanism that is designed to detect, prevent, or recover from a security attack
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 12: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/12.jpg)
SECURITY SERVICES
1. Normal Flow2. Interruption3. Interception4. Modification5. Fabrication
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 13: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/13.jpg)
SECURITY THREATS
PASSIVE ATTACKS(In this the goal of the attacker is to obtain information that is
being transmitted)
ACTIVE ATTACKS(These attacks involve some modification of the Original Data Stream or
creation of False Stream)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 14: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/14.jpg)
CONCLUSIONSecurity is to be given to each and every Environments whether it is our
Personal Computing Environment (or)
Time Sharing Environment (or)
Client-Server Environment (or)
Distributed Computing Environment.
Bh Durga Adithya Varma , CSE-A , 12N31A0532
![Page 15: Network Security](https://reader037.vdocuments.us/reader037/viewer/2022100114/58ecadb91a28ab8b058b45a1/html5/thumbnails/15.jpg)
THANK YOU
Bh Durga Adithya Varma , CSE-A , 12N31A0532