際際滷

際際滷Share a Scribd company logo
The Security that we render towards a
NETWORK is called
Bh Durga Adithya Varma , CSE-A , 12N31A0532
1. Cryptography
2. Types of Cryptography
3. Steganography
4. Cyber Crime/Attack
5. Ethical Hacking
6. Fire Walling
7. Security Mechanisms
8. Security Services
9. Security Threats
Bh Durga Adithya Varma , CSE-A , 12N31A0532
CRYPTOGRAPHY
SUBSTITUTION CIPHERS
(replaces the original text with secret text, keeping the order as it is)
TRANSPOSITION CIPHERS
(replaces the original text with secret text, but changing its order)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Plain Text Letters:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher Text Letters:
Q W R T Y U I O P A S D F G H J K L Z X C V B N M
The text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM
Bh Durga Adithya Varma , CSE-A , 12N31A0532
The text MEET ME AFTER SCHOOL BEHIND THE GYM
Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO
Bh Durga Adithya Varma , CSE-A , 12N31A0532
1.SECRET KEY CRYPTOGRAPHY
2.PUBLIC KEY CRYPTOGRAPHY
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Plain Text Cipher Text
Cipher text Plain Text
Key
Encryption
Decryption
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Encryption
Plain Text Cipher Text
Cipher text Plain Text
Decryption
Public Key
Private Key
Bh Durga Adithya Varma , CSE-A , 12N31A0532
(Crime is an illegal act if it is done in NETWORKING it is CYBER CRIME)
Security System that protect your PCs or NETWORK from
HACKERS,INTRUDERS &MALICIOUS CODE
Bh Durga Adithya Varma , CSE-A , 12N31A0532
A mechanism that is designed to detect, prevent,
or recover from a security attack
Bh Durga Adithya Varma , CSE-A , 12N31A0532
1. Normal Flow
2. Interruption
3. Interception
4. Modification
5. Fabrication
Bh Durga Adithya Varma , CSE-A , 12N31A0532
SECURITY THREATS
PASSIVE ATTACKS
(In this the goal of the attacker is to obtain information that is
being transmitted)
ACTIVE ATTACKS
(These attacks involve some modification of the Original Data Stream or
creation of False Stream)
Bh Durga Adithya Varma , CSE-A , 12N31A0532
CONCLUSION
Security is to be given to each and every Environments whether it is our
Personal Computing Environment
(or)
Time Sharing Environment
(or)
Client-Server Environment
(or)
Distributed Computing Environment.
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Bh Durga Adithya Varma , CSE-A , 12N31A0532
Ad

Recommended

Password policies
Password policies
Ari Elias-Bachrach
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
CSCJournals
Honeypot and Steganography
Honeypot and Steganography
Preeti Yadav
Steganography
Steganography
sandeipz
Steganography
Steganography
Sonam M
Steganography and watermarking
Steganography and watermarking
sudip nandi
Steganalysis ppt
Steganalysis ppt
Om Vishnoi
Image Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
OS ppt Modified.pptx
OS ppt Modified.pptx
StudyvAbhi
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
Communication Networ ks Lecture 20.ppsx
Communication Networ ks Lecture 20.ppsx
lakshman110405
Cryptography and Network Security SESSION 1.pptx
Cryptography and Network Security SESSION 1.pptx
KehkashHayat1
IEDA 3302 e-commerce_secure-communications.pptx
IEDA 3302 e-commerce_secure-communications.pptx
ssuser6d0da2
chapter 31 security of commun networks
chapter 31 security of commun networks
MohammedAbbas653737
Network security
Network security
ABHISHEK KUMAR
Encryption by fastech
Encryption by fastech
Abdulafeez Fasasi
Chapter 1 information assurance and security
Chapter 1 information assurance and security
garedew32
Cryptography
Cryptography
Abhi Prithi
Cryptography-PART-1.pdf,taught in nitw 2025
Cryptography-PART-1.pdf,taught in nitw 2025
kc22csb0a13
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.ppt
navidkamrava
Computer and Network Security
Computer and Network Security
Muhammad Yousuf Abdul Qadir
Information security
Information security
Sina Bagherinezhad
Crpto ppt
Crpto ppt
Asmita Pal
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
karthikaparthasarath
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
chapter 7.pptx
chapter 7.pptx
MelkamtseganewTigabi1
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
20CE404-Soil Mechanics - 際際滷 Share PPT
20CE404-Soil Mechanics - 際際滷 Share PPT
saravananr808639

More Related Content

Similar to Network Security (20)

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
OS ppt Modified.pptx
OS ppt Modified.pptx
StudyvAbhi
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
Communication Networ ks Lecture 20.ppsx
Communication Networ ks Lecture 20.ppsx
lakshman110405
Cryptography and Network Security SESSION 1.pptx
Cryptography and Network Security SESSION 1.pptx
KehkashHayat1
IEDA 3302 e-commerce_secure-communications.pptx
IEDA 3302 e-commerce_secure-communications.pptx
ssuser6d0da2
chapter 31 security of commun networks
chapter 31 security of commun networks
MohammedAbbas653737
Network security
Network security
ABHISHEK KUMAR
Encryption by fastech
Encryption by fastech
Abdulafeez Fasasi
Chapter 1 information assurance and security
Chapter 1 information assurance and security
garedew32
Cryptography
Cryptography
Abhi Prithi
Cryptography-PART-1.pdf,taught in nitw 2025
Cryptography-PART-1.pdf,taught in nitw 2025
kc22csb0a13
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.ppt
navidkamrava
Computer and Network Security
Computer and Network Security
Muhammad Yousuf Abdul Qadir
Information security
Information security
Sina Bagherinezhad
Crpto ppt
Crpto ppt
Asmita Pal
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
karthikaparthasarath
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
chapter 7.pptx
chapter 7.pptx
MelkamtseganewTigabi1
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
OS ppt Modified.pptx
OS ppt Modified.pptx
StudyvAbhi
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
Communication Networ ks Lecture 20.ppsx
Communication Networ ks Lecture 20.ppsx
lakshman110405
Cryptography and Network Security SESSION 1.pptx
Cryptography and Network Security SESSION 1.pptx
KehkashHayat1
IEDA 3302 e-commerce_secure-communications.pptx
IEDA 3302 e-commerce_secure-communications.pptx
ssuser6d0da2
chapter 31 security of commun networks
chapter 31 security of commun networks
MohammedAbbas653737
Chapter 1 information assurance and security
Chapter 1 information assurance and security
garedew32
Cryptography-PART-1.pdf,taught in nitw 2025
Cryptography-PART-1.pdf,taught in nitw 2025
kc22csb0a13
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.ppt
navidkamrava
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
karthikaparthasarath
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR

Recently uploaded (20)

A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
20CE404-Soil Mechanics - 際際滷 Share PPT
20CE404-Soil Mechanics - 際際滷 Share PPT
saravananr808639
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
Cadastral Maps
Cadastral Maps
Google
David Boutry - Mentors Junior Developers
David Boutry - Mentors Junior Developers
David Boutry
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
Fundamentals of Digital Design_Class_12th April.pptx
Fundamentals of Digital Design_Class_12th April.pptx
drdebarshi1993
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
NEW Strengthened Senior High School Gen Math.pptx
NEW Strengthened Senior High School Gen Math.pptx
DaryllWhere
machine learning is a advance technology
machine learning is a advance technology
ynancy893
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
Fundamentals of Digital Design_Class_21st May - Copy.pptx
Fundamentals of Digital Design_Class_21st May - Copy.pptx
drdebarshi1993
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
ijab2
ElysiumPro Company Profile 2025-2026.pdf
ElysiumPro Company Profile 2025-2026.pdf
info751436
Mechanical Vibration_MIC 202_iit roorkee.pdf
Mechanical Vibration_MIC 202_iit roorkee.pdf
isahiliitr
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
20CE404-Soil Mechanics - 際際滷 Share PPT
20CE404-Soil Mechanics - 際際滷 Share PPT
saravananr808639
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
Cadastral Maps
Cadastral Maps
Google
David Boutry - Mentors Junior Developers
David Boutry - Mentors Junior Developers
David Boutry
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
Fundamentals of Digital Design_Class_12th April.pptx
Fundamentals of Digital Design_Class_12th April.pptx
drdebarshi1993
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
NEW Strengthened Senior High School Gen Math.pptx
NEW Strengthened Senior High School Gen Math.pptx
DaryllWhere
machine learning is a advance technology
machine learning is a advance technology
ynancy893
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
Fundamentals of Digital Design_Class_21st May - Copy.pptx
Fundamentals of Digital Design_Class_21st May - Copy.pptx
drdebarshi1993
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
ijab2
ElysiumPro Company Profile 2025-2026.pdf
ElysiumPro Company Profile 2025-2026.pdf
info751436
Mechanical Vibration_MIC 202_iit roorkee.pdf
Mechanical Vibration_MIC 202_iit roorkee.pdf
isahiliitr
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
Ad

Network Security

  • 1. The Security that we render towards a NETWORK is called Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 2. 1. Cryptography 2. Types of Cryptography 3. Steganography 4. Cyber Crime/Attack 5. Ethical Hacking 6. Fire Walling 7. Security Mechanisms 8. Security Services 9. Security Threats Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 3. CRYPTOGRAPHY SUBSTITUTION CIPHERS (replaces the original text with secret text, keeping the order as it is) TRANSPOSITION CIPHERS (replaces the original text with secret text, but changing its order) Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 4. Plain Text Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher Text Letters: Q W R T Y U I O P A S D F G H J K L Z X C V B N M The text MEET ME AFTER SCHOOL BEHIND THE GYM Is converted as DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 5. The text MEET ME AFTER SCHOOL BEHIND THE GYM Is converted as EAMTN FTDIE EHTER HMEMB YESCG LOHO Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 6. 1.SECRET KEY CRYPTOGRAPHY 2.PUBLIC KEY CRYPTOGRAPHY Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 7. Plain Text Cipher Text Cipher text Plain Text Key Encryption Decryption Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 8. Encryption Plain Text Cipher Text Cipher text Plain Text Decryption Public Key Private Key Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 9. (Crime is an illegal act if it is done in NETWORKING it is CYBER CRIME)
  • 10. Security System that protect your PCs or NETWORK from HACKERS,INTRUDERS &MALICIOUS CODE Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 11. A mechanism that is designed to detect, prevent, or recover from a security attack Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 12. 1. Normal Flow 2. Interruption 3. Interception 4. Modification 5. Fabrication Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 13. SECURITY THREATS PASSIVE ATTACKS (In this the goal of the attacker is to obtain information that is being transmitted) ACTIVE ATTACKS (These attacks involve some modification of the Original Data Stream or creation of False Stream) Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 14. CONCLUSION Security is to be given to each and every Environments whether it is our Personal Computing Environment (or) Time Sharing Environment (or) Client-Server Environment (or) Distributed Computing Environment. Bh Durga Adithya Varma , CSE-A , 12N31A0532
  • 15. Bh Durga Adithya Varma , CSE-A , 12N31A0532