network security fundamental

19
NETWORK SECURITY Ms. Mousmi Pawar

Upload: mousmi-pawar

Post on 11-Jul-2015

190 views

Category:

Software


0 download

TRANSCRIPT

Page 1: Network Security Fundamental

NETWORK SECURITY

Ms. Mousmi Pawar

Page 2: Network Security Fundamental

OVERVIEW

1. Need for Security

2. Goals of Security

3. Famous Malwares and Phishing

4. Cryptography

Page 3: Network Security Fundamental

NEED FOR SECURITY

Page 4: Network Security Fundamental

GOALS OF SECURITY

Integrity

Confendtiality

Authentication

Non-Repudiation

Availability

Access Control

Page 5: Network Security Fundamental

INTEGRITY

Protect the information INTEGRITY

This type of attack is called Modification

Transfer `1000

To

B

Transfer `1000

To

C

Ideal route of the message

Actual route of the message

A

X

Page 6: Network Security Fundamental

CONFIDENTIALITY

Guarantee Data Confidentiality

To:[email protected]

ATM pin is 9876

This type of Attack is called Interception.

X

A

Page 7: Network Security Fundamental

AUTHENTICATION

Absence of proper authentication is called Fabrication.

A

X

I am user A

Transfer `5000 to

X

Page 8: Network Security Fundamental

NON-REPUDIATION

Transfer `1000

To

B

I never

requested to

transfer `1000

to B

A

A

Page 9: Network Security Fundamental

AVAILABILITY & ACCESS CONTROL

username: [email protected]

Password: ********

-----

-----

-----

-----

-----

----

Read

Read, Write

Read

This type of attack is called Interruption.

Page 10: Network Security Fundamental

FAMOUS MALWARES

Viruses

Worms

Trojan Horse

Page 11: Network Security Fundamental

VIRUS

A virus is a piece of program code that attaches itself to

legitimate program code and runs when the legitimate

program runs.

Sum=a+b;

Print sum;

End.

Sum=a+b;

Print sum;

Virus Code

End.

Original Code

Original Code

+ Virus code

Delete all files

Send copy of myself

to all using user’s

address book.

Virus code

Page 12: Network Security Fundamental

WORM

A worm does not modify the program, instead it

replicates itself again and again.

Resource

eating and

no

destruction

Resource eating

and no destruction

Resource

eating and no

destruction

Resource

eating and no

destruction

Resource eating

and no destruction

Resource eating

and no destruction

Resource eating

and no destruction

Page 13: Network Security Fundamental

TROJAN HORSE

It provides the attacker with unauthorized remote access to

a compromised computer, infects files and damages the

system, or steals user sensitive information.

username: [email protected]

Password: ********

Trojan Program

A

X

Page 14: Network Security Fundamental

X

Page 15: Network Security Fundamental

PHISHING

Attacker set up fake website which looks like real

website to obtain your details.

Page 16: Network Security Fundamental

CRYPTOGRAPHY

Cryptography is the science of achieving security by

encoding messages to make them non-readable.

Encryption: The process of encoding plain text message

into cipher text message is called as encryption.

Decryption: the reverse process of transforming cipher

text to plain text is called decryption.

Page 17: Network Security Fundamental

CRYPTOGRAPHY MECHANISM

Every Encryption and Decryption process has 2 aspects:

the algorithm and the key used for encryption.

Symmetric key Cryptography: If the same key is used for

encryption and decryption.(e.g. DES)

Asymmetric key Cryptography/Public Key Cryptography: if

two different keys are used for encryption and decryption

process(e.g. RSA)

Page 18: Network Security Fundamental

REFERENCES

Cryptography and Network Security, Atul Kahate, Tata

McGraw Hill.

http://en.wikipedia.org/wiki/Cryptography.- Wikipedia.

Page 19: Network Security Fundamental

THANK YOU