network security

15
NETWORK SECURITY The Security that we render towards a NETWORK is called Bh Durga Adithya Varma , CSE-A , 12N31A0532

Upload: bhupathiraju-durga-adithya-varma

Post on 11-Apr-2017

185 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Network Security

NETWORKSECURITY

The Security that we render towards a NETWORK is called

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 2: Network Security

NETWORK SECURITY1. Cryptography2. Types of Cryptography3. Steganography4. Cyber Crime/Attack5. Ethical Hacking6. Fire Walling7. Security Mechanisms8. Security Services9. Security Threats

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 3: Network Security

CRYPTOGRAPHY

SUBSTITUTION CIPHERS(replaces the original text with secret text, keeping the order as it is)

TRANSPOSITION CIPHERS(replaces the original text with secret text, but changing its order)

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 4: Network Security

Substitution CipherPlain Text Letters:A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Cipher Text Letters:Q W R T Y U I O P A S D F G H J K L Z X C V B N M

The text MEET ME AFTER SCHOOL BEHIND THE GYM

Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 5: Network Security

Transposition CipherThe text MEET ME AFTER SCHOOL BEHIND THE GYM

Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 6: Network Security

CRYPTOGRAPHY Types of

1.SECRET KEY CRYPTOGRAPHY2.PUBLIC KEY CRYPTOGRAPHY

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 7: Network Security

SECRET KEY CRYPTOGRAPHY

Plain Text Cipher Text

Cipher text Plain Text

Key

Encryption

Decryption

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 8: Network Security

PUBLIC KEY CRYPTOGRAPHYEncryption

Plain Text Cipher Text

Cipher text Plain Text

Decryption

Public Key

Private Key

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 9: Network Security

(Crime is an illegal act if it is done in NETWORKING it is CYBER CRIME)

Page 10: Network Security

Security System that protect your PC’s or NETWORK from HACKERS,INTRUDERS &MALICIOUS CODE

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 11: Network Security

SECURITYMECHANISMS

A mechanism that is designed to detect, prevent, or recover from a security attack

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 12: Network Security

SECURITY SERVICES

1. Normal Flow2. Interruption3. Interception4. Modification5. Fabrication

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 13: Network Security

SECURITY THREATS

PASSIVE ATTACKS(In this the goal of the attacker is to obtain information that is

being transmitted)

ACTIVE ATTACKS(These attacks involve some modification of the Original Data Stream or

creation of False Stream)

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 14: Network Security

CONCLUSIONSecurity is to be given to each and every Environments whether it is our

Personal Computing Environment (or)

Time Sharing Environment (or)

Client-Server Environment (or)

Distributed Computing Environment.

Bh Durga Adithya Varma , CSE-A , 12N31A0532

Page 15: Network Security

THANK YOU

Bh Durga Adithya Varma , CSE-A , 12N31A0532