Sei sulla pagina 1di 12

 Introduction

 Network security
 Problems and attacks
 Cryptography
 Principles of cryptography
 Services of cryptography
 Encryption and Decryption
 Conclusion
Network security consists of the policies and practices adopted
to prevent and monitor unauthorized access, misuse, modification,
or denial of a computer network and network-accessible resources.
Network security involves the authorization of access to data in a
network, which is controlled by the network administrator. Users
choose or are assigned an ID and password or other authenticating
information that allows them access to information and programs
within their authority. Network security covers a variety of
computer networks, both public and private, that are used in
everyday jobs; conducting transactions and communications
among businesses, government agencies and individuals.
Networks can be private, such as within a company, and others
which might be open to public access. Network security is involved
in organizations, enterprises, and other types of institutions. It
does as its title explains: it secures the network, as well as
protecting and overseeing operations being done
Network security starts with authentication, commonly with a
username and a password. Since this requires just one detail
authenticating the user name—i.e., the password—this is
sometimes termed one-factor authentication. With two-factor
authentication, something the user 'has' is also used (e.g.,
a security token or 'dongle', an ATM card, or a mobile phone); and
with three-factor authentication, something the user 'is' is also
used (e.g., a fingerprint or retinal scan).
Once authenticated, a firewall enforces access policies such as what
services are allowed to be accessed by the network users.[1] Though
effective to prevent unauthorized access, this component may fail to
check potentially harmful content such as computer
worms or Trojans being transmitted over the network. ]
1. Computer virus
We’ve all heard about them, and we all have our fears. For everyday
Internet users, computer viruses are one of the most common threats to
cybersecurity.
2. Rogue security software
Leveraging the fear of computer viruses, scammers have a found a new
way to commit Internet fraud.
Rogue security software is malicious software that mislead users to
believe there is a computer virus installed on their computer or that their
security measures are not up to date.

3.Trojan horse
Metaphorically, a “Trojan horse” refers to tricking someone into inviting
an attacker into a securely protected area. In computing, it holds a very
similar meaning — a Trojan horse, or “Trojan,” is a malicious bit of
attacking code or software that tricks users into running it willingly, by
hiding behind a legitimate program.
4. Adware and spyware
By “adware” we consider any software that is designed to track data of
your browsing habits and, based on that, show you advertisements and
pop-ups.Works similarly to adware, but is installed on your computer without
your knowledge. It can contain keyloggers that record personal information
including email addresses, passwords, even credit card numbers, making it
dangerous because of the high risk of identity theft.
5. Computer worm
Computer worms are pieces of malware programs that replicate quickly
and spread from one computer to another. A worm spreads from an
infected computer by sending itself to all of the computer’s contacts, then
immediately to the contacts of the other computers.

6. Phishing
Phishing is a method of a social engineering with the goal of obtaining
sensitive data such as passwords, usernames, credit card numbers.
The attacks often come in the form of instant messages or phishing emails
designed to appear legitimate.
Cryptography is a method of protecting information and communications through the use of
codes so that only those for whom the information is intended can read and process it. The
pre-fix "crypt" means "hidden" or "vault" and the suffix "graphy" stands for "writing."
In computer science, cryptography refers to secure information and communication
techniques derived from mathematical concepts and a set of rule-based calculations called
algorithms to transform messages in ways that are hard to decipher. These deterministic
algorithms are used for cryptographic key generation and digital signing and verification to
protect data privacy, web browsing on the internet and confidential communications such as
credit card transactions and email.
Cryptography techniques
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes
techniques such as microdots, merging words with images, and other ways to hide
information in storage or transit.
Principle 1 — the first step in solving any cryptographic problem is the
formulation of a rigorous and precise definition of security.
Principle 2 — when the security of a cryptographic construction relies
on an unproven assumption, this assumption must be precisely
stated. Furthermore, the assumption should be as minimal as
possible
Principle 3 — cryptographic constructions should be accompanied by a
rigorous proof of security with respect to a definition formulated
according to principle 1, and relative to an assumption stated as in
principle 2 (if an assumption is needed at all). We now discuss each
of these principles in greater depth
Public networks such as the Internet do not provide a means of secure
communication between entities. Communication over such networks is
susceptible to being read or even modified by unauthorized third
parties. Cryptography helps protect data from being viewed, provides
ways to detect whether data has been modified, and helps provide a
secure means of communication over otherwise nonsecure channels.
For example, data can be encrypted by using a cryptographic algorithm,
transmitted in an encrypted state, and later decrypted by the intended
party. If a third party intercepts the encrypted data, it will be difficult
to decipher.
In the .NET Framework, the classes in
the System.Security.Cryptography namespace manage many details of
cryptography for you. Some are wrappers for the unmanaged Microsoft
Cryptography API (CryptoAPI), while others are purely managed
implementations. You do not need to be an expert in cryptography to
use these classes. When you create a new instance of one of the
encryption algorithm classes, keys are autogenerated for ease of use,
and default properties are as safe and secure as possible.
Encryption is the process of translating plain text data (plaintext) into
something that appears to be random and meaningless (ciphertext).
Decryption is the process of converting ciphertext back to plaintext.
To encrypt more than a small amount of data, symmetric encryption is
used. A symmetric key is used during both the encryption and
decryption processes. To decrypt a particular piece of ciphertext, the
key that was used to encrypt the data must be used.
The goal of every encryption algorithm is to make it as difficult as
possible to decrypt the generated ciphertext without using the key. If a
really good encryption algorithm is used, there is no technique
significantly better than methodically trying every possible key. For
such an algorithm, the longer the key, the more difficult it is to decrypt
a piece of ciphertext without possessing the key.
It is difficult to determine the quality of an encryption algorithm.
Algorithms that look promising sometimes turn out to be very easy to
break, given the proper attack.
 The internet is not created with security in mind.

 Comn can be altered examines and exploited.

 There is a growing need to protect private info crossing the


public networks that make up the internet infrastructure.

 A network security policy an auditing procedure and a


violation plan must all be in place to deal with any breach or
breakdown of network security before it occurs.
THANK
YOU…
PRESENTATION BY :-

SONIYA SHAHI…

Potrebbero piacerti anche