0% found this document useful (0 votes)
8 views

Lecture 4 Network Security

The document outlines key concepts of network security, including cryptography, digital signatures, firewalls, and virtual private networks (VPNs). It explains various types of cryptography, the function of digital signatures in ensuring message integrity, and the role of firewalls in monitoring network traffic. Additionally, it describes how VPNs provide secure communication channels and their advantages in protecting user privacy and data security.

Uploaded by

iakambamu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Lecture 4 Network Security

The document outlines key concepts of network security, including cryptography, digital signatures, firewalls, and virtual private networks (VPNs). It explains various types of cryptography, the function of digital signatures in ensuring message integrity, and the role of firewalls in monitoring network traffic. Additionally, it describes how VPNs provide secure communication channels and their advantages in protecting user privacy and data security.

Uploaded by

iakambamu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

NETWORK SECURITY

Cryptography, Digital signature


Firewalls
Virtual private network
BY IRIMASO ALFRED 0771097982
DEFINITION

Network security is a set of measures designed to protect


data, devices, and networks from cyber threats such as
unauthorized access, hacking, malware, and data breaches. It
involves implementing security policies, protocols, and
technologies to safeguard sensitive information and maintain
the integrity, confidentiality, and availability of network
resources.

2
TYPES OF CRYPTOLOGY

➢ Symmetric Key Cryptography (Secret Key Encryption)


➢ Asymmetric Key Cryptography (Public Key Encryption)
➢ Hash Functions

3
Symmetric Key Cryptography (Secret Key
Encryption)

Example:
◼ Uses a single key for both encryption ▪ Alice wants to send a message,
and decryption. "HELLO," to Bob.
◼ Fast but less secure since sharing the ▪ She encrypts it using the secret
key is risky. key "XYZ123" → Ciphertext:
Example: Advanced Encryption Standard "NQXXQ."
(AES), Data Encryption Standard (DES). ▪ Bob decrypts the message using
the same key to get "HELLO."

4
Asymmetric Key Cryptography (Public Key
Encryption)

▪ Uses two keys: a public key (for Example:


encryption) and a private key (for ▪ Alice encrypts a message using
decryption). Bob’s public key.
▪ More secure but slower than ▪ Bob decrypts it using his private
symmetric encryption. key.
Example: RSA (Rivest-Shamir-
Adleman), ECC (Elliptic Curve
Cryptography).

5
Hash Functions

Example:
▪ Converts data into a fixed-length "password123" → SHA-256 hash:
hash value. ef92b778bafee4c8… (fixed-length
▪ Irreversible and used in encrypted output).
password security.
Example: SHA-256, MD5.

6
A Digital Signature is a cryptographic technique
used to verify the authenticity and integrity of a
digital message or document. It ensures that:
▪ The message was sent by a specific sender
Digital
(authentication).
Signatures ▪ The message was not altered during
transmission (integrity).
▪ The sender cannot deny sending the message
(non-repudiation).

7
How Digital Signatures Work

1. The sender hashes the message using a hash function (e.g., SHA-
256).
2. The hash is encrypted using the sender’s private key (this becomes
the digital signature).
3. The receiver decrypts the digital signature using the sender’s public
key.
4. The receiver calculates their own hash and compares it with the
decrypted hash. If they match, the message is verified.

Example Scenario:
•Alice signs an email with her digital signature.
•Bob receives the email and verifies it using Alice’s public key.
•If the signature is valid, Bob is assured that the email came from Alice
and was not altered.

8
A firewall is a security device or software that
monitors and controls incoming and outgoing
network traffic based on predefined security rules.
Firewalls It acts as a barrier between a trusted internal
network and untrusted external networks, such as
the internet.

9
Types of Firewalls:

Packet Filtering Firewall


•Inspects data packets and allows or blocks them based on rules (e.g., IP address,
port number).
Example: If a firewall rule blocks all traffic from IP 192.168.1.100, no packets from that IP will be allowed.

▪ Stateful Inspection Firewall


▪ Tracks active connections and only allows packets that are part of an
established connection.
▪ More secure than packet filtering.

10
Types of Firewalls:

Proxy Firewall
▪ Acts as an intermediary between users and the internet.
▪ Filters traffic at the application layer (e.g., HTTP, FTP).
▪ Example: A company may use a proxy firewall to block access to social media
websites.

Next-Generation Firewall (NGFW)


▪ Combines traditional firewall capabilities with advanced security features such
as Intrusion Detection and Prevention (IDS/IPS), malware filtering, and
deep packet inspection (DPI).
▪ Example: Cisco Firepower, Palo Alto Networks NGFW.

11
A firewall might have the following rules:

Firewall Rules 1. Allow port 80 (HTTP) for web browsing.


2. Block port 23 (Telnet) to prevent unauthorized
Example remote access.
3. Allow SSH (port 22) access only from specific
IPs.

12
A Virtual Private Network (VPN) is a secure
communication channel that encrypts internet
traffic and routes it through a remote server,
ensuring privacy and security.

How VPNs Work:


Virtual Private ▪ The user connects to a VPN server (e.g., in
Network (VPN) another country).
▪ The VPN encrypts data before it is transmitted
over the internet.
▪ The VPN server assigns a new IP address,
masking the user’s real location.
▪ The recipient receives the data as if it came
from the VPN server, not the original device.
13
Types of VPNs

1. Remote Access VPN


▪ Used by individuals to connect securely to a private network over the internet.
Example: Employees accessing company resources remotely.

2. Site-to-Site VPN
▪ Connects entire office networks over the internet.
Example: A company has offices in Uganda and Kenya. A site-to-site VPN
allows secure data sharing between the offices.

3. SSL/TLS VPN
▪ Uses Secure Sockets Layer (SSL) or Transport Layer Security (TLS) for
encryption.
▪ Example: VPN access through a web browser.

14
Advantages of VPNs

▪ Privacy – Hides real IP address Example of VPN Usage:


and encrypts data. ▪ John is working remotely from a
▪ Security – Protects against coffee shop.
hacking on public Wi-Fi ▪ He connects to his company's
networks. VPN to securely access internal
▪ Bypassing Geo-restrictions – files.
Allows access to blocked content ▪ The VPN encrypts his
(e.g., Netflix in different regions). connection, preventing hackers
on the public Wi-Fi from
intercepting his data.

15
Network security is crucial in today's digital world,
ensuring data confidentiality, integrity, and
availability.
▪ Cryptography protects data through encryption
and decryption.
Conclusion ▪ Digital signatures verify message authenticity.
▪ Firewalls act as a barrier between trusted and
untrusted networks.
▪ VPNs create secure tunnels for private
communication over the internet.

16
Thank you | Asante | Mwebare

17
BY IRIMASO ALFRED 0771097982

You might also like