SlideShare a Scribd company logo
Network security & cryptography
We are living in the information age. We need to keep
information about every aspect of our lives. In other words,
information is an asset that has a value like any other asset.
As an asset, information needs to be secured from attacks.
To be secured, information needs to be hidden from
unauthorized access (confidentiality), protected from
unauthorized change (integrity), and available to an authorized
entity when it is needed (availability).
In the computer industry, the term security refers to
techniques for ensuring that data stored in a computer cannot
be read or compromised by any individuals without authorization
•Confidentiality: only sender, intended receiver should “understand”
message contents

•Authentication: sender, receiver want to confirm identity of each
other
• Message integrity: sender, receiver want to ensure message not
altered without detection.
•Access and availability: services must be accessible and available
to users
Network security refers to any activities
designed to protect your network. Specifically, these
activities protect the usability, reliability, integrity, and
safety of your network and data.

Effective network security targets a variety of threats
and stops them from entering or spreading on your
network
The most common include :
1 Viruses, worms, and Trojan horses
2 Spyware and adware
3 Zero-day attacks, also called zero-hour attacks
4 Hacker attacks
5 Denial of service attacks
6 Data interception and theft
7 Identity theft
Network security is accomplished through hardware and
software.
Network security components often include:
• Anti-virus and anti-spyware
• Firewall, to block unauthorized access to your network
• Intrusion prevention systems (IPS), to identify fastspreading threats, such as zero-day or zero-hour attacks
• Virtual Private Networks (VPNs), to provide secure remote
access


Antivirus software packages : These packages counter most
virus threats if regularly updated and correctly maintained.



Network infrastructure : Switches and routers have
hardware and software features that support secure
connectivity, intrusion protection, identity services, and
security management.



Dedicated network security hardware and software-Tools
such as firewalls and intrusion detection systems provide
protection for all areas of the network and enable secure
connections.


Identity services : These services help to identify users and
control their activities and transactions on the network.
Services include passwords, digital certificates, and digital
authentication keys.



Encryption : Encryption ensures that messages cannot be
intercepted or read by anyone other than the authorized
recipient.



Security management : This is the glue that holds together
the other building blocks of a strong security solution



Virtual private networks : These networks provide access
control and data encryption between two different computers
on a network.
A set of mathematical functions with a set of nice
properties. A common mechanism for enforcing policies. Encrypt
clear text into cipher text, and vice versa .
Properties of good encryption techniques encryption
scheme depends not on secrecy of algorithm but on parameter of
algorithm .
1) symmetric key algorithm: one shared by a pair of users
used for both encryption and decryption
2) Asymmetric or public/private key algorithms are based
on each user having two keys: public key – in public
private key – key known only to individual user
Private key cryptography:Traditional private key cryptography uses one key
• shared by both sender and receiver
• if this key is disclosed communications are compromised
• also is symmetric, because parties are equal
•hence does not protect sender from receiver forging a
message & claiming is sent by sender
Public key cryptography:Requires sender, receiver know shared secret key
radically different approach sender, receiver do not share
secret key public encryption key known to all private
decryption key known only to receiver
Network security & cryptography


Asymmetric cryptography involves the use of two keys:



A public-key, which may be known by anybody, and can
be used to encrypt messages, and verify signatures



A private-key, known only to the recipient, used to
decrypt messages, and sign (create) signatures is
asymmetric because those who encrypt messages or
verify signatures cannot decrypt messages or create
signatures
Network security & cryptography


Message integrity



Digital signature



End point authentication
 Information security is increasingly important .
 Have varying degrees of sensitivity of information.
 So we need to secure our data. As I said in this
presentation there are different ways for securing our
network.

More Related Content

PPTX
Models For Communication Security
PPTX
6 security
PDF
Chapter 1 Introduction of Cryptography and Network security
PPTX
Security Mechanisms
PDF
Security in computer systems fundamentals
PPT
Chapter 01
PPTX
Security in wireless sensor networks
PPTX
Presentation1 new (1) (1)cf
Models For Communication Security
6 security
Chapter 1 Introduction of Cryptography and Network security
Security Mechanisms
Security in computer systems fundamentals
Chapter 01
Security in wireless sensor networks
Presentation1 new (1) (1)cf

What's hot (19)

PPTX
Security services
PDF
Network security chapter 1
PPTX
Mis jaiswal-chapter-11
PPT
Network Security 1st Lecture
PPTX
Chapter 1: Overview of Network Security
PPTX
Ppt.1
PPT
Technical seminar on Security
PDF
Network security - OSI Security Architecture
PPTX
Chapter- I introduction
PPTX
Introduction of network security
PPTX
01 Application Security Fundamentals - part 1 - introduction and goals
PPT
PDF
CNS - Chapter1
PPT
N5 security precautions
PPTX
Security
PPTX
Network Security
PPT
Infomation System Security
PPT
Data encryption-ciphers
PPTX
Network security
Security services
Network security chapter 1
Mis jaiswal-chapter-11
Network Security 1st Lecture
Chapter 1: Overview of Network Security
Ppt.1
Technical seminar on Security
Network security - OSI Security Architecture
Chapter- I introduction
Introduction of network security
01 Application Security Fundamentals - part 1 - introduction and goals
CNS - Chapter1
N5 security precautions
Security
Network Security
Infomation System Security
Data encryption-ciphers
Network security
Ad

Viewers also liked (14)

PPT
Susans Art Work
PPT
Phishing
PPTX
India day presentation_HKIS
PPTX
Chatham County is Open for Business
PPS
Thank youamerica
PPTX
Cyber crime & security (2)
PPT
Rtutorial
PDF
PPTX
Administracion
PPTX
Technical development (2)
DOCX
Cerita arnab dan kura kura
PDF
Development-Environment Up & Running with Docker
PDF
Risk Managment
PPTX
Susans Art Work
Phishing
India day presentation_HKIS
Chatham County is Open for Business
Thank youamerica
Cyber crime & security (2)
Rtutorial
Administracion
Technical development (2)
Cerita arnab dan kura kura
Development-Environment Up & Running with Docker
Risk Managment
Ad

Similar to Network security & cryptography (20)

PPTX
Computer Security Essentials.pptx
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PPT
Module-1.ppt cryptography and network security
PPTX
Dos unit 5
PDF
wireless networking chapter three WAN.pdf
PPT
CNS Unit-I_final.ppt
PPTX
information security (network security methods)
PPTX
Information security ist lecture
PPT
Cryptography
PPTX
cryptography introduction.pptx
PPTX
Information Systems.pptx
PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
CNS new ppt unit 1.pptx
PPTX
Security in Computer System
PPT
Chapter1 intro network_security_sunorganised
PPTX
Computer Introduction (Data Encryption)-Lecture05
PPTX
Fundamental Concept of Cryptography in Computer Security
PPT
A+ Update Endpoint Encryption
PPTX
typesofattacks-180418113629 255536155.pptx
PPTX
cns unit 1.pptx
Computer Security Essentials.pptx
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
Module-1.ppt cryptography and network security
Dos unit 5
wireless networking chapter three WAN.pdf
CNS Unit-I_final.ppt
information security (network security methods)
Information security ist lecture
Cryptography
cryptography introduction.pptx
Information Systems.pptx
Unit 1 Network Fundamentals and Security .pptx
CNS new ppt unit 1.pptx
Security in Computer System
Chapter1 intro network_security_sunorganised
Computer Introduction (Data Encryption)-Lecture05
Fundamental Concept of Cryptography in Computer Security
A+ Update Endpoint Encryption
typesofattacks-180418113629 255536155.pptx
cns unit 1.pptx

Recently uploaded (20)

PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Lesson notes of climatology university.
PDF
Empowerment Technology for Senior High School Guide
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Digestion and Absorption of Carbohydrates, Proteina and Fats
Orientation - ARALprogram of Deped to the Parents.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Cell Types and Its function , kingdom of life
A systematic review of self-coping strategies used by university students to ...
Paper A Mock Exam 9_ Attempt review.pdf.
Lesson notes of climatology university.
Empowerment Technology for Senior High School Guide
Final Presentation General Medicine 03-08-2024.pptx
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
1_English_Language_Set_2.pdf probationary
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx

Network security & cryptography

  • 2. We are living in the information age. We need to keep information about every aspect of our lives. In other words, information is an asset that has a value like any other asset. As an asset, information needs to be secured from attacks. To be secured, information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and available to an authorized entity when it is needed (availability).
  • 3. In the computer industry, the term security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization •Confidentiality: only sender, intended receiver should “understand” message contents •Authentication: sender, receiver want to confirm identity of each other • Message integrity: sender, receiver want to ensure message not altered without detection. •Access and availability: services must be accessible and available to users
  • 4. Network security refers to any activities designed to protect your network. Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network
  • 5. The most common include : 1 Viruses, worms, and Trojan horses 2 Spyware and adware 3 Zero-day attacks, also called zero-hour attacks 4 Hacker attacks 5 Denial of service attacks 6 Data interception and theft 7 Identity theft
  • 6. Network security is accomplished through hardware and software. Network security components often include: • Anti-virus and anti-spyware • Firewall, to block unauthorized access to your network • Intrusion prevention systems (IPS), to identify fastspreading threats, such as zero-day or zero-hour attacks • Virtual Private Networks (VPNs), to provide secure remote access
  • 7.  Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained.  Network infrastructure : Switches and routers have hardware and software features that support secure connectivity, intrusion protection, identity services, and security management.  Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.
  • 8.  Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys.  Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.  Security management : This is the glue that holds together the other building blocks of a strong security solution  Virtual private networks : These networks provide access control and data encryption between two different computers on a network.
  • 9. A set of mathematical functions with a set of nice properties. A common mechanism for enforcing policies. Encrypt clear text into cipher text, and vice versa . Properties of good encryption techniques encryption scheme depends not on secrecy of algorithm but on parameter of algorithm .
  • 10. 1) symmetric key algorithm: one shared by a pair of users used for both encryption and decryption 2) Asymmetric or public/private key algorithms are based on each user having two keys: public key – in public private key – key known only to individual user
  • 11. Private key cryptography:Traditional private key cryptography uses one key • shared by both sender and receiver • if this key is disclosed communications are compromised • also is symmetric, because parties are equal •hence does not protect sender from receiver forging a message & claiming is sent by sender Public key cryptography:Requires sender, receiver know shared secret key radically different approach sender, receiver do not share secret key public encryption key known to all private decryption key known only to receiver
  • 13.  Asymmetric cryptography involves the use of two keys:  A public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures  A private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures is asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures
  • 16.  Information security is increasingly important .  Have varying degrees of sensitivity of information.  So we need to secure our data. As I said in this presentation there are different ways for securing our network.