Presentation is loading. Please wait.

Presentation is loading. Please wait.

CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.

Similar presentations


Presentation on theme: "CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM."— Presentation transcript:

1 CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM

2 NETWORK SECURITY It is concerned with people trying to access remote services that they are not authorized to use.

3 NETWORK SECURITY PROBLEMS They are roughly divided into four Secrecy Authentication Nonrepudiation Integrity control

4 NETWORK SECURITY PROBLEMS SECRECY: Keeping information out of the hands of unauthorized users. AUTHENTICATION: Deals with determining whom you are talking to before revealing sensitive information or entering into a business deal.

5 NETWORK SECURITY PROBLEMS NONREPUDIATION: Deals with signatures. INTEGRITY CONTROL: Deals with how you be sure that a message you received was really the one sent and not something that a malicious adversary modified in transit or concocted.

6 COMPONENTS OF INFORMATION SECURITY CONFIDENTIALITY: Preventing unauthorized disclosure and use of information INTEGRITY: Preventing unauthorized creation, modification, or deletion of information AVAILABILITY: preventing unauthorized delay of information

7 ISSUES SURROUNDING SECURITY The technology is not foolproof Attacks through the network Attacks from within the organization itself Security in networks

8 SECURITY MEASURES Transmit information securely Present information for use in a secure and protected way Back up information appropriately Store information properly Protect information from outsiders Protect Transmissions sent over the internet

9 CRYPTOGRAPHY The art of protecting information by transforming (encrypting) it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text.

10 CRYPTANALYSIS The art of breaking ciphers is called cryptanalysis.

11 CRYPTOLOGY The art of devising ciphers (cryptography) and breaking them (cryptanalysis) is collectively known as cryptology.

12 PUBLIC KEY ENCRYPTION An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them.

13 PUBLIC KEY ALGORITHMS DIFFIE-HELLMAN RSA (RIVEST, SHAMIR AND ADLEMAN) PGP (PRETTY GOOD PRIVACY)

14 SECRET KEY ALGORITHMS DES (DATA ENCRYPTION STANDARD) DES CHAINING

15 OTHER ALGORITHMS RC4 IDEA RIPEM PGPHONE UNIX CRYPT


Download ppt "CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM."

Similar presentations


Ads by Google