Network and Data Security

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
RSA Exponentiation cipher
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 1 Overview.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Cryptography Week-6.
CS110: Computers and the Internet Encryption and Certificates.
LIS508 last lecture: Cryptography & Security Thomas Krichel
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Symmetric-Key Cryptography
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Encryption CS110: Computer Science and the Internet.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
How the internet works Cryptography. LO: Define the terms encryption and decryption Construct a secure message using encryption LO: Define the terms encryption.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Encryption with Keys and Passwords
MANAGEMENT OF INFORMATION SYSTEMS
Lesson 2-18 AP Computer Science Principles
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
CIT 380: Securing Computer Systems
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Encryption
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
Networks Encryption.
Topic 1: Data, information, knowledge and processing
Lesson 4-5 AP Computer Science Principles
Topic 3: Data Encryption.
M3: Encryption r By Andrew Stringer.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Chapter 3:Cryptography (16M)
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
NET 311D Information Security
Cryptography and Network Security
برگرفته از اسلایدهای © University of Glamorgan
Simple Encryption- Lesson 5
Keep It Safe! Secure Your Secrets
Digital Communications
Basic Network Encryption
GCSE COMPUTER SCIENCE Topic 3 - Data 3.10 Encryption.
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
Introduction to Encryption Technology
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Network and Data Security Igcseict.info

Network and Data Security If your computer is connected to a network, other people can connect to your computer. A person who gains unauthorised access to a computer system is often called a hacker.

Physical Security The first thing to make sure of is that no unauthorised people can physically access (sit down in front of) any of the computers on your network. For example, by keeping office doors locked.

Username and Password Effective passwords must be chosen that are not easy to guess Passwords should be a random combination of lowercase letters, uppercase letters and numbers (and symbols if this is allowed) Weak’ passwords: password, 123456, david, 27dec1992 ‘Strong’ passwords: s63gRdd1, G66ew$dQ, gdr298783X

Tips Creating A Strong Password Think of a phrase that you will never forget “My favourite food is chocolate ice cream” Take the first letter of each word mfficic Change some letters to similar numbers: I to 1, o to 0, s to 5, etc. and make some letters (e.g. the first and last) uppercase Mff1c1C

Securing Your Data Often we have data that is private or confidential. This data needs to be protected from being viewed by unauthorised people. This is especially true if the data is to be sent via a public network such as The Internet. The best way to protect data is to encrypt it

Data Encryption Encryption is the process of converting information into a form that is meaningless to anyone except holders of a ‘key’. For example, if Alice wants to send important, personal messages to Bob, she must go through the following steps...

Data Encryption First Alice needs to generate a secret ‘key’. The key is usually a very long, random number.

Data Encryption Alice must then give a copy of this key to Bob. She must make sure that nobody else can get to the key

Data Encryption Now that Bob has a copy of the key, each time Alice needs to send him a message she starts by encrypting it using special encryption software and the secret key. The encrypted message now looks like a jumble of random letters and numbers.

Data Encryption Alice then sends the encrypted message to Bob. She can use a public network like the Internet, since, even if it gets stolen, the encrypted message cannot be read or understood without the key.

Data Encryption When Bob receives the message, he uses special decryption software and his copy of the secret key to decrypt the message. Bob can now read the original message from Alice.

Codes and Ciphers :: Caesar Cipher It is a Substitution Cipher that involves replacing each letter of the secret message with a different letter of the alphabet. Example : In this example, each letter in the plaintext message has been shifted 3 letters down in the alphabet. Plaintext: This is a secret message Ciphertext: wklv lv d vhfuhw phvvdjh

Codes and Ciphers :: Atbash Cipher The Atbash cipher is a very specific case of a substitution cipher where the letters of the alphabet are reversed. In otherwords, all As are replaced with Zs, all Bs are replaced with Ys, and so on. Example Plaintext: Surabaya kota pahlawan Ciphertext: Hfizyzbz plgz kzsozdzm

Codes and Ciphers :: Keyword Cipher The Keyword cipher is identical to the Caesar Cipher with the exception that the substitution alphabet used can be represented with a keyword. ABCDEFGHIJKLMNOPQRSTUVWXYZ KEYWORDABCFGHIJLMNPQSTUVXZ To encipher a plaintext message, you convert all letters from the top row to their correspondng letter on the bottom row (A to K, B to E, etc).

Codes and Ciphers :: Polybius Square Plain text : sekolah cita hati Cipher text : 43152534311123 13244411 23114424

Exercise : Crack the Code 52231144 543445 431515 2443 52231144 543445 25333452 Key=7 : ilyzfbrbysho khsht zlnhsh ohs Atbash : yvigvpfmozs wzozn wlz Key = 3234454315 czoz cvizir yvkznzd lhwv Hints = tqe mromqc