SlideShare a Scribd company logo
Network  Security& Cryptography  by D.Swathi(07631A0557) M.Tejaswi(07631A0558 )
Computer security is the process of preventing and detecting unauthorized use of your computer Prevention help to stop unauthorized users from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system.
 
PASS WORD SECURITY M ust contain 8 characters, at least 5 uppercase letters or 5 lowercase letters Should contain at least 2 numbers Should contain at least 1 special characters Password Protection Guidelines: Passwords gain access to a company systems should not used as passwords to access non-company accounts If an employee knows his/her password has been compromised, it must be reported to the IT department and the password changed immediately.
E-mail Security Anti viruses software is the foundation of E-mail security Exchange  Server Mail staging Anti Virus Scan (1) Anti   Virus   Scan (2) Some attachments removed . Outlook Client Anti-Virus Scan (3) Some attachments removed .
E-mail Protection E-mail “spoofing”  :Is when an email message appears to have originated from one source when it actually was sent from another source If you suspect that you may have received a spoofed email ,you should contact your service provider’s E-mail borne viruses : Viruses and other types malicious code are often spread as attachments to email messages
Evolving Threat Environment Blended Threats : Blended threats are increasingly design to get past point-solution security and target multiple vulnerabilities in clients and corporate networks. Phasing attacks : The recent attacks of phasing attacks on banks and their online customers have opened both consumer and corporate eyes to the increasing dangers of corporate identity theft.
Cryptography Cryptography is a science of using mathematics to encrypt and decrypt the data. Crptanalysis is the science of analyzing and breaking secure communication. Both Cryptography and Cryptanalysis comes under Cryptology. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key.
Encryption and Decryption Encryption: The method of disguising plaintext in such a way as to hide its its substance. Decryption: The process of reverting cipher text to its plain text.
Conventional Cryptography In this, one key is used both for encryption and decryption. Caeser’s cipher: It is an example of conventional cryptography. It substitutes one piece of information of another. Ex: Plain text: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher text: DEFGHIJKLMNOPQRSTUVWXYZABC.
Key Management And Conventional Encryption
Public Key Cryptography It is an asymmentric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private key for decryption. Benefit: It allows people who have no preexisting security arrangement to exchange messages securely. Anyone having public key can encrypt the data but cannot decrypt.
PGP It combines some of the best features of both conventional and public key cryptography.
Conclusion Security is every bodies business and only with everyone’s cooperation,an intelligent policy and consistent practices, will it be achievable. References: www.google.com www.microsoft.com J.N.T.U website Digit magazine
Thank  you..
Queries ..?

More Related Content

PPTX
Network security & cryptography
PPTX
Steganography
PDF
Bt0088 cryptography and network security1
PDF
Bt0088 cryptography and network security2
PDF
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
PDF
Chapter 1 2
PDF
Modified RSA-based algorithm: a double secure approach
Network security & cryptography
Steganography
Bt0088 cryptography and network security1
Bt0088 cryptography and network security2
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Chapter 1 2
Modified RSA-based algorithm: a double secure approach

What's hot (20)

PPTX
Security in Data Communication and Networking
PPT
Network Security
ODP
Network Security
PDF
Communication Security
PPTX
Security services and mechanisms
PDF
Performance Comparison of File Security System using TEA and Blowfish Algorithms
DOCX
J KHAN CV
PDF
N45028390
PDF
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
PPTX
Sankar jayam
PPTX
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PDF
Beating ips 34137
PDF
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
PDF
Computer Security (Cryptography) Ch01
PDF
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
PPT
Information Security & Cryptography
PDF
Securing information in wireless sensor networks
PPT
Ch01
 
Security in Data Communication and Networking
Network Security
Network Security
Communication Security
Security services and mechanisms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
J KHAN CV
N45028390
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
Sankar jayam
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
Beating ips 34137
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
Computer Security (Cryptography) Ch01
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Information Security & Cryptography
Securing information in wireless sensor networks
Ch01
 
Ad

Viewers also liked (20)

PDF
Basic Network Security_Primer
PPTX
Contaminacion del aire y de las aguas
PPTX
Party pronto pres new
PPTX
Presentation1 new (1) (1)cf
PPTX
E securty
PPT
Network Security Tools and applications
PPTX
Network security & cryptography
PPT
Celebrity Cricket League 2016 - http://ccl5.com/
PPT
Rashed al kamdah network security threats
PPT
Cryptography and network security
PPTX
Presentation network security
PPTX
Network security and cryptography
PPTX
Network and network security
PPTX
Nymble: Blocking System
PPS
network security, cryptography,steganography
PPTX
Network security - Basic concepts
PPTX
Pgp security mule
PPT
Pgp smime
PPTX
Cryptography and network security
PPT
key distribution in network security
Basic Network Security_Primer
Contaminacion del aire y de las aguas
Party pronto pres new
Presentation1 new (1) (1)cf
E securty
Network Security Tools and applications
Network security & cryptography
Celebrity Cricket League 2016 - http://ccl5.com/
Rashed al kamdah network security threats
Cryptography and network security
Presentation network security
Network security and cryptography
Network and network security
Nymble: Blocking System
network security, cryptography,steganography
Network security - Basic concepts
Pgp security mule
Pgp smime
Cryptography and network security
key distribution in network security
Ad

Similar to Networksecurity&cryptography (20)

PPTX
Fundamental Concept of Cryptography in Computer Security
PPTX
Mis jaiswal-chapter-11
PPTX
Chapter 1 information assurance and security
PPTX
Information Security and Privacy-Unit-2.pptx
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PPTX
Network security & cryptography
PPTX
Cryptography and Network Security-ch1-4.pptx
PDF
information technology cryptography Msc chapter 1-4.pdf
PDF
chapter 1-4.pdf
PPTX
Security.pptx
PPTX
Cryptography and Network Security Principles.pptx
PPT
information security importance and use.ppt
PPT
formintroduction to ISF.ppt ination security fundamentals
PPT
Lecture15.ppt
PPT
Infomation System Security
PPTX
Unit - I cyber security fundamentals part -1.pptx
PPT
Info security & crypto
PPTX
Security management and tools
PPT
Cryptography ppt
PPTX
Introduction to cryptography part1-final
Fundamental Concept of Cryptography in Computer Security
Mis jaiswal-chapter-11
Chapter 1 information assurance and security
Information Security and Privacy-Unit-2.pptx
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
Network security & cryptography
Cryptography and Network Security-ch1-4.pptx
information technology cryptography Msc chapter 1-4.pdf
chapter 1-4.pdf
Security.pptx
Cryptography and Network Security Principles.pptx
information security importance and use.ppt
formintroduction to ISF.ppt ination security fundamentals
Lecture15.ppt
Infomation System Security
Unit - I cyber security fundamentals part -1.pptx
Info security & crypto
Security management and tools
Cryptography ppt
Introduction to cryptography part1-final

More from Presentaionslive.blogspot.com (20)

PPSX
Cloud Computing Introduction
PPT
PPT
PPT
Brain computer interface
PPT
Information Security
DOC
4g magic communication
PPT
Spattern matching using biometric techniques
PPT
Novel architecture
PPT
PPT
Multimedia and gaming
PPTX
PPT
A multimodal interaction framework for pervasive game applications
PPT
1 spattern matching using biometric techniques
PPT
Unique p mail-addressing 97-03
PPT
Brain Computer Interface
Cloud Computing Introduction
Brain computer interface
Information Security
4g magic communication
Spattern matching using biometric techniques
Novel architecture
Multimedia and gaming
A multimodal interaction framework for pervasive game applications
1 spattern matching using biometric techniques
Unique p mail-addressing 97-03
Brain Computer Interface

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Structure & Organelles in detailed.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
01-Introduction-to-Information-Management.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Insiders guide to clinical Medicine.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
master seminar digital applications in india
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Structure & Organelles in detailed.
Final Presentation General Medicine 03-08-2024.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
O7-L3 Supply Chain Operations - ICLT Program
PPH.pptx obstetrics and gynecology in nursing
Microbial disease of the cardiovascular and lymphatic systems
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
01-Introduction-to-Information-Management.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Insiders guide to clinical Medicine.pdf
Complications of Minimal Access Surgery at WLH
master seminar digital applications in india
Anesthesia in Laparoscopic Surgery in India
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Computing-Curriculum for Schools in Ghana
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf

Networksecurity&cryptography

  • 1. Network Security& Cryptography by D.Swathi(07631A0557) M.Tejaswi(07631A0558 )
  • 2. Computer security is the process of preventing and detecting unauthorized use of your computer Prevention help to stop unauthorized users from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system.
  • 3.  
  • 4. PASS WORD SECURITY M ust contain 8 characters, at least 5 uppercase letters or 5 lowercase letters Should contain at least 2 numbers Should contain at least 1 special characters Password Protection Guidelines: Passwords gain access to a company systems should not used as passwords to access non-company accounts If an employee knows his/her password has been compromised, it must be reported to the IT department and the password changed immediately.
  • 5. E-mail Security Anti viruses software is the foundation of E-mail security Exchange Server Mail staging Anti Virus Scan (1) Anti Virus Scan (2) Some attachments removed . Outlook Client Anti-Virus Scan (3) Some attachments removed .
  • 6. E-mail Protection E-mail “spoofing” :Is when an email message appears to have originated from one source when it actually was sent from another source If you suspect that you may have received a spoofed email ,you should contact your service provider’s E-mail borne viruses : Viruses and other types malicious code are often spread as attachments to email messages
  • 7. Evolving Threat Environment Blended Threats : Blended threats are increasingly design to get past point-solution security and target multiple vulnerabilities in clients and corporate networks. Phasing attacks : The recent attacks of phasing attacks on banks and their online customers have opened both consumer and corporate eyes to the increasing dangers of corporate identity theft.
  • 8. Cryptography Cryptography is a science of using mathematics to encrypt and decrypt the data. Crptanalysis is the science of analyzing and breaking secure communication. Both Cryptography and Cryptanalysis comes under Cryptology. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key.
  • 9. Encryption and Decryption Encryption: The method of disguising plaintext in such a way as to hide its its substance. Decryption: The process of reverting cipher text to its plain text.
  • 10. Conventional Cryptography In this, one key is used both for encryption and decryption. Caeser’s cipher: It is an example of conventional cryptography. It substitutes one piece of information of another. Ex: Plain text: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher text: DEFGHIJKLMNOPQRSTUVWXYZABC.
  • 11. Key Management And Conventional Encryption
  • 12. Public Key Cryptography It is an asymmentric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private key for decryption. Benefit: It allows people who have no preexisting security arrangement to exchange messages securely. Anyone having public key can encrypt the data but cannot decrypt.
  • 13. PGP It combines some of the best features of both conventional and public key cryptography.
  • 14. Conclusion Security is every bodies business and only with everyone’s cooperation,an intelligent policy and consistent practices, will it be achievable. References: www.google.com www.microsoft.com J.N.T.U website Digit magazine