SlideShare a Scribd company logo
Network Security  Cryptography & Steganograpy  By Nikhil
A Security History Of The World Goths,vandals,huns Burglar by hacker
Why do we need security?
Introduction What is Network Security:   Network security define the protection, safe guarding of the computers in the network by using security tools.
Who is vulnerable? Financial institutions and banks Internet service providers Government and Defense  services  Multinational corporations ANYONE ON THE NETWORK
Common security attacks and their countermeasures Finding a way into the network Firewalls TCP hijacking IPSec Packet sniffing Encryption (SSH, SSL, HTTPS)
Firewalls
TCP Attacks Say hello to sandy, Bob and Sam
TCP Attacks Sandy and Bob have an established TCP connection
TCP Attacks Sam lies on the path between Sandy and Bob on the network He can intercept all of their packets
TCP Attacks First, Sam must drop all of Sandy’s packets since they must not be delivered to Bob (why?) Packets The Void
TCP Attacks How do we prevent this? IPSec Provides source authentication, so Sam cannot pretend to be Sandy Encrypts data before transport, so Sam cannot talk to Bob without knowing what the session key is :-
Types of Secret Writing Secret writing Cryptography Steganography
Cryptography “ Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat . ” Sun Tzu 
Cryptography
example :-
Benefits  of Cryptographic Technologies Data secrecy Data integrity  Authentication of  message  originator Electronic certification and digital signature Non-repudiation
Potential Problems with Cryptographic Technologies? False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries
Steganography
Steganography –covered  writing – is an art of  hiding information Popular contemporary  Steganography  technologies hide  information in images
 
How   Secure   are   Today’s Encryption does not guarantee security! Many ways to beat a crypto system  NOT  dependent on cryptanalysis, such as: Viruses, worms, hackers, etc. Unauthorized physical access to secret keys Cryptography is only one of the elements of comprehensive computer security high overhead to hide relatively few info bits Technologies
Conclusion

More Related Content

PPTX
Cryptography
PPTX
Overview of cryptography
PPT
Cryptography and E-Commerce
PPTX
Cryptography and encryption
PDF
Cryptology - The practice and study of hiding information
PPT
Cryptography
PPTX
Cryptography and Network Security
PPT
Information Security & Cryptography
Cryptography
Overview of cryptography
Cryptography and E-Commerce
Cryptography and encryption
Cryptology - The practice and study of hiding information
Cryptography
Cryptography and Network Security
Information Security & Cryptography

What's hot (20)

PPT
Cryptography basices
PDF
Cryptology - Antônio Lacerda
PPTX
Caesar cipher
PPTX
Cryptography ppt by vaishnavi khandelwal
ODP
Encryption presentation final
PDF
Applied Cryptography
PDF
What is Cryptography?
PPTX
Cryptography
PPTX
Cryptography
PPTX
Basic Cryptography unit 4 CSS
PPTX
Cryptography
PPTX
Cryptography Presentation
PPT
Network security cryptography ppt
PPT
6. cryptography
PPTX
Cryptography
PPTX
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
PDF
Presentation on Cryptography
PPTX
Advanced cryptography and implementation
PPTX
Crytography
Cryptography basices
Cryptology - Antônio Lacerda
Caesar cipher
Cryptography ppt by vaishnavi khandelwal
Encryption presentation final
Applied Cryptography
What is Cryptography?
Cryptography
Cryptography
Basic Cryptography unit 4 CSS
Cryptography
Cryptography Presentation
Network security cryptography ppt
6. cryptography
Cryptography
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
Presentation on Cryptography
Advanced cryptography and implementation
Crytography
Ad

Viewers also liked (20)

PPTX
Cryptography & Steganography
PPTX
Cryptography.ppt
PPT
Network Security and Cryptography
PPTX
Cryptography and network security
PPTX
cryptography
PPTX
Cryptography
PPT
Network security
PPTX
PPT steganography
PPTX
Internet Issues (How to Deal on Internet Security)
PPT
Information Security
PPTX
Cryptography and network security
PPT
Wireless Device and Network level security
PDF
Designing Virtual Network Security Architectures
DOCX
Network security engineer performance appraisal
PPTX
Computer and network security
PPT
Lecture 11
PPTX
Ethical Hacking & Network Security
PPTX
Contaminacion del aire y de las aguas
PPTX
Party pronto pres new
PPT
Networksecurity&cryptography
Cryptography & Steganography
Cryptography.ppt
Network Security and Cryptography
Cryptography and network security
cryptography
Cryptography
Network security
PPT steganography
Internet Issues (How to Deal on Internet Security)
Information Security
Cryptography and network security
Wireless Device and Network level security
Designing Virtual Network Security Architectures
Network security engineer performance appraisal
Computer and network security
Lecture 11
Ethical Hacking & Network Security
Contaminacion del aire y de las aguas
Party pronto pres new
Networksecurity&cryptography
Ad

Similar to network security, cryptography,steganography (20)

PPT
Network Security R U Secure???
PPT
Network seurity
PPTX
Network Security
PPT
lec security
PPT
IT Security for the Physical Security Professional
PPT
Infomation System Security
PDF
The ultimate privacy guide
PPTX
Ethical hacking
PPT
Introduction To PKI Technology
PPT
It security &_ethical_hacking
PPTX
Ethical hacking for information security
PPTX
Secrity project keyvan
PDF
Need for cyber security
PDF
Dark Web Presentation - 1.pdf about internet which will help you to get to kn...
PPTX
Blockchain in cyber security
PPT
New internet security
PPT
NewIinternet security
PPTX
Cyber Crime And Security
PDF
Nt1310 Unit 6 Powerpoint
PDF
Chapter 1 2
Network Security R U Secure???
Network seurity
Network Security
lec security
IT Security for the Physical Security Professional
Infomation System Security
The ultimate privacy guide
Ethical hacking
Introduction To PKI Technology
It security &_ethical_hacking
Ethical hacking for information security
Secrity project keyvan
Need for cyber security
Dark Web Presentation - 1.pdf about internet which will help you to get to kn...
Blockchain in cyber security
New internet security
NewIinternet security
Cyber Crime And Security
Nt1310 Unit 6 Powerpoint
Chapter 1 2

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
1. Introduction to Computer Programming.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Getting Started with Data Integration: FME Form 101
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Assigned Numbers - 2025 - Bluetooth® Document
Agricultural_Statistics_at_a_Glance_2022_0.pdf
cuic standard and advanced reporting.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Tartificialntelligence_presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
“AI and Expert System Decision Support & Business Intelligence Systems”
1. Introduction to Computer Programming.pptx
Spectral efficient network and resource selection model in 5G networks
Getting Started with Data Integration: FME Form 101
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25-Week II

network security, cryptography,steganography

  • 1. Network Security Cryptography & Steganograpy By Nikhil
  • 2. A Security History Of The World Goths,vandals,huns Burglar by hacker
  • 3. Why do we need security?
  • 4. Introduction What is Network Security: Network security define the protection, safe guarding of the computers in the network by using security tools.
  • 5. Who is vulnerable? Financial institutions and banks Internet service providers Government and Defense services Multinational corporations ANYONE ON THE NETWORK
  • 6. Common security attacks and their countermeasures Finding a way into the network Firewalls TCP hijacking IPSec Packet sniffing Encryption (SSH, SSL, HTTPS)
  • 8. TCP Attacks Say hello to sandy, Bob and Sam
  • 9. TCP Attacks Sandy and Bob have an established TCP connection
  • 10. TCP Attacks Sam lies on the path between Sandy and Bob on the network He can intercept all of their packets
  • 11. TCP Attacks First, Sam must drop all of Sandy’s packets since they must not be delivered to Bob (why?) Packets The Void
  • 12. TCP Attacks How do we prevent this? IPSec Provides source authentication, so Sam cannot pretend to be Sandy Encrypts data before transport, so Sam cannot talk to Bob without knowing what the session key is :-
  • 13. Types of Secret Writing Secret writing Cryptography Steganography
  • 14. Cryptography “ Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat . ” Sun Tzu 
  • 17. Benefits of Cryptographic Technologies Data secrecy Data integrity Authentication of message originator Electronic certification and digital signature Non-repudiation
  • 18. Potential Problems with Cryptographic Technologies? False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries
  • 20. Steganography –covered writing – is an art of hiding information Popular contemporary Steganography technologies hide information in images
  • 21.  
  • 22. How Secure are Today’s Encryption does not guarantee security! Many ways to beat a crypto system NOT dependent on cryptanalysis, such as: Viruses, worms, hackers, etc. Unauthorized physical access to secret keys Cryptography is only one of the elements of comprehensive computer security high overhead to hide relatively few info bits Technologies

Editor's Notes

  • #12: Alice can send a RESET