0% found this document useful (1 vote)
188 views17 pages

Network Security and Cryptography

The document discusses network security and cryptography. It introduces network security, the need for security, types of attacks, and types of network security including transit security and traffic regulation. It then discusses firewalls in more detail, including definitions, diagram, uses, and types. Finally, it covers different threats to networks and provides an introduction to cryptography along with cryptographic functions.

Uploaded by

tharun
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
188 views17 pages

Network Security and Cryptography

The document discusses network security and cryptography. It introduces network security, the need for security, types of attacks, and types of network security including transit security and traffic regulation. It then discusses firewalls in more detail, including definitions, diagram, uses, and types. Finally, it covers different threats to networks and provides an introduction to cryptography along with cryptographic functions.

Uploaded by

tharun
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 17

GOOD MORNING

TO
ONE AND ALL
OUR TEAM

VENKATESH
THARUN
SADIK
FROM
AVANTHI ENGG. COLLEGE
OUR TOPIC
NETWORK-SECURITY

CRYPTOGRAPHY
NETWORK-SECURITY
• INTRODUCTION FOR SECURITY

• WHAT IS MEANT BY NETWORK-


SECURITY ?

• NEED FOR THE SECURITY ?


NEED FOR SECURITY
• Protect valuable or sensitive
organizational information while making it
readily available.

• System administrators need to understand


the various aspects of security to develop
measures and policies to protect assets
and limit their vulnerabilities.
TYPES OF ATTACKS

INTERRUPTION

INTERCEPTION

MODIFICATION

FABRICATION
TYPES
OF
NETWORK-SECURITY

TRANSIT TRAFFIC
SECURITY REGULATION
TRANSIT SECURITY

VIRTUAL PRIVATE
NETWORK

PACKET LEVEL
ENCRYPTION
TRAFFIC REGULATIONS
TYPES OF DEFINITIONS :

 ROUTER TRAFFIC REGULATION

 FIREWALL TRAFFIC REGULATION

 HOST TRAFFIC REGULATION


FIREWALLS
INTRODUCTION :

 Firewalls make it possible to filter incoming and


outgoing traffic that flows through your system.
 The rules of a firewall can inspect one or more
characteristics of the packets, including but not
limited to the protocol type, the source or
destination host address, and the source or
destination port.
 Firewalls can greatly enhance the security of a
host or a network.
Diagrammatic representation
of a Firewall

GLOBAL
FIREWALL
INTERNET

INSIDE OUTSIDE
USES OF FIREWALLS
 To protect and insulate the applications and
services of your internal network from unwanted
traffic coming in from the public Internet.
 To limit or disable access from hosts of the
internal network to services of the public
Internet.
 To support network address translation (NAT),
which allows your internal network to use private
IP addresses and share a single connection to
the public Internet
TYPES OF FIREWALLS

APPLICATION
GATEWAYS

HYBRID
SYSTEM

PACKET
FILTERING
DIFFERENT TYPES OF THREATS
TO NETWORK
 E-MAIL BOMBS

 MACRO’S

 VIRUSES

 SPAM
CRYPTOGRAPHY
 What is cryptography?

 SERVICES

• Decryption is the reverse of encryption, and Hash


functions-it involves the use of zero keys.
• Secret key functions-it involves the use of one key.
• Public key functions-it involves the use of two keys.
TYPES OF CRYPTOGRAPHIC
FUNCTIONS
• Decryption is the reverse of encryption,
and Hash functions-it involves the use of
zero keys.
• Secret key functions-it involves the use of
one key.
• Public key functions-it involves the use of
two keys.

You might also like