0% found this document useful (0 votes)
5 views4 pages

Network Security in Ccna

Uploaded by

nzya76017
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Network Security in Ccna

Uploaded by

nzya76017
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Network Security in ccna

Name student: Abdullah Farhan Alanazi

Number student: 4431179

Dr.Bahaa Eldin Hamouda


Principles and Application:
Cryptography in Network Security :
cryptography in network is used to ensure confidentiality, integrity,
authentication, and non-repudiation in communication systems.
confidentiality :
Confidentiality ensures that information is accessible only to authorized
individuals or systems and remains private from unauthorized access. It
prevents the disclosure of sensitive data to anyone who is not
authorized to view it.
example confidentiality in Netowrk Security:
of when transmitting sensitive information like credit card numbers
over the internet, encryption algorithms such as AES ensure that only
the recipient can read the data .
Integrity:
data is complete, trustworthy and has not been modified or accidentally
altered by an unauthorised user, The integrity of data can be
compromised unintentionally by errors in entering data, a system
malfunction, or forgetting to maintain an up-to-date backup.

example Integrity in Netowrk Security:


Integrity is often maintained using hash functions such as SHA-256 or
digital signatures. For example, if a file is sent over a network, a hash
value is computed for the original file.
Authentication:
Authentication is the process of verifying the identity of users, devices,
or systems in a network. It ensures that the entity requesting access to
a system or data is who they claim to be.

example Authentication in Netowrk Security:


when logging into an online account, the user is authenticated by
entering a correct password, and possibly a second factor like an OTP
(One-Time Password) or a fingerprint scan.

Non-repudiation:
that ensures a user cannot deny having performed a transaction It
combines authentication and integrity to authenticate the identity of a
user who performs a transaction and ensures the integrity of that
transaction

example Non-repudiation in Netowrk Security:


in an email system, the sender can sign an email with a digital signature,
ensuring that they cannot deny having sent it later
Cryptographic Systems :

Cryptographic Protocols:

TLS/SSL Transport Layer Security/Secure Sockets Layer:


Discuss how these protocols secure web traffic and their use of
cryptographic techniques RSA, AES, and hash functions.

SSH Secure Shell:


SSH for secure remote communication and its cryptographic
components.

HTTPS Secure Hypertext Transfer Protocol:


HTTPS is the secure version of HTTP, using SSL/TLS to encrypt the data
exchanged between a web browser and a web server.

IPsec Internet Protocol Security :


IPsec is a secure network suite that authenticates and encrypts packets
of data to provide secure encrypted communication between two
computers over an Internet Protocol network. It is used in virtual
private networks (VPNs).

You might also like