Network Security  Cryptography & Steganograpy  By Nikhil
A Security History Of The World Goths,vandals,huns Burglar by hacker
Why do we need security?
Introduction What is Network Security:   Network security define the protection, safe guarding of the computers in the network by using security tools.
Who is vulnerable? Financial institutions and banks Internet service providers Government and Defense  services  Multinational corporations ANYONE ON THE NETWORK
Common security attacks and their countermeasures Finding a way into the network Firewalls TCP hijacking IPSec Packet sniffing Encryption (SSH, SSL, HTTPS)
Firewalls
TCP Attacks Say hello to sandy, Bob and Sam
TCP Attacks Sandy and Bob have an established TCP connection
TCP Attacks Sam lies on the path between Sandy and Bob on the network He can intercept all of their packets
TCP Attacks First, Sam must drop all of Sandy’s packets since they must not be delivered to Bob (why?) Packets The Void
TCP Attacks How do we prevent this? IPSec Provides source authentication, so Sam cannot pretend to be Sandy Encrypts data before transport, so Sam cannot talk to Bob without knowing what the session key is :-
Types of Secret Writing Secret writing Cryptography Steganography
Cryptography “ Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat . ” Sun Tzu 
Cryptography
example :-
Benefits  of Cryptographic Technologies Data secrecy Data integrity  Authentication of  message  originator Electronic certification and digital signature Non-repudiation
Potential Problems with Cryptographic Technologies? False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries
Steganography
Steganography –covered  writing – is an art of  hiding information Popular contemporary  Steganography  technologies hide  information in images
 
How   Secure   are   Today’s Encryption does not guarantee security! Many ways to beat a crypto system  NOT  dependent on cryptanalysis, such as: Viruses, worms, hackers, etc. Unauthorized physical access to secret keys Cryptography is only one of the elements of comprehensive computer security high overhead to hide relatively few info bits Technologies
Conclusion

More Related Content

PPTX
Cryptography
PPTX
Overview of cryptography
PPT
Cryptography and E-Commerce
PPTX
Cryptography and encryption
PDF
Cryptology - The practice and study of hiding information
PPT
Cryptography
PPTX
Cryptography and Network Security
PPT
Information Security & Cryptography
Cryptography
Overview of cryptography
Cryptography and E-Commerce
Cryptography and encryption
Cryptology - The practice and study of hiding information
Cryptography
Cryptography and Network Security
Information Security & Cryptography

What's hot (20)

PPT
Cryptography basices
PDF
Cryptology - Antônio Lacerda
PPTX
Caesar cipher
PPTX
Cryptography ppt by vaishnavi khandelwal
ODP
Encryption presentation final
PDF
Applied Cryptography
PDF
What is Cryptography?
PPTX
Cryptography
PPTX
Cryptography
PPTX
Basic Cryptography unit 4 CSS
PPTX
Cryptography
PPTX
Cryptography Presentation
PPT
Network security cryptography ppt
PPT
6. cryptography
PPTX
Cryptography
PPTX
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
PDF
Presentation on Cryptography
PPTX
Advanced cryptography and implementation
PPTX
Crytography
Cryptography basices
Cryptology - Antônio Lacerda
Caesar cipher
Cryptography ppt by vaishnavi khandelwal
Encryption presentation final
Applied Cryptography
What is Cryptography?
Cryptography
Cryptography
Basic Cryptography unit 4 CSS
Cryptography
Cryptography Presentation
Network security cryptography ppt
6. cryptography
Cryptography
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
Presentation on Cryptography
Advanced cryptography and implementation
Crytography
Ad

Viewers also liked (20)

PPTX
Cryptography & Steganography
PPTX
Cryptography.ppt
PPT
Network Security and Cryptography
PPTX
Cryptography and network security
PPTX
cryptography
PPTX
Cryptography
PPT
Network security
PPTX
PPT steganography
PPTX
Internet Issues (How to Deal on Internet Security)
PPT
Information Security
PPTX
Cryptography and network security
PPT
Wireless Device and Network level security
PDF
Designing Virtual Network Security Architectures
DOCX
Network security engineer performance appraisal
PPTX
Computer and network security
PPT
Lecture 11
PPTX
Ethical Hacking & Network Security
PPTX
Contaminacion del aire y de las aguas
PPTX
Party pronto pres new
PPT
Networksecurity&cryptography
Cryptography & Steganography
Cryptography.ppt
Network Security and Cryptography
Cryptography and network security
cryptography
Cryptography
Network security
PPT steganography
Internet Issues (How to Deal on Internet Security)
Information Security
Cryptography and network security
Wireless Device and Network level security
Designing Virtual Network Security Architectures
Network security engineer performance appraisal
Computer and network security
Lecture 11
Ethical Hacking & Network Security
Contaminacion del aire y de las aguas
Party pronto pres new
Networksecurity&cryptography
Ad

Similar to network security, cryptography,steganography (20)

PPTX
Cryptography and Encryptions,Network Security,Caesar Cipher
PPTX
Chapter 1 information assurance and security
PDF
Network Security and Cryptography.pdf
PDF
Cryptography-PART-1.pdf,taught in nitw 2025
PPTX
cryptography introduction.pptx
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
PPTX
Cryptography and Network Security-ch1-4.pptx
PPTX
Information Assurance and Security all in One Handout.pptx
PPTX
Information Security and Privacy-Unit-2.pptx
PDF
chapter 1-4.pdf
PDF
information technology cryptography Msc chapter 1-4.pdf
PDF
MSc CS - I - 19PCSC203 - Cryptography and Network Security.pdf
PPTX
Security in network computing
PPT
Securityand encryption
PDF
Security in computer systems fundamentals
PPT
CNS Unit-I_final.ppt
PDF
Chapter 1 2
PPTX
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
PPTX
Steganography ppt
PPTX
Network security & cryptography
Cryptography and Encryptions,Network Security,Caesar Cipher
Chapter 1 information assurance and security
Network Security and Cryptography.pdf
Cryptography-PART-1.pdf,taught in nitw 2025
cryptography introduction.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Cryptography and Network Security-ch1-4.pptx
Information Assurance and Security all in One Handout.pptx
Information Security and Privacy-Unit-2.pptx
chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
MSc CS - I - 19PCSC203 - Cryptography and Network Security.pdf
Security in network computing
Securityand encryption
Security in computer systems fundamentals
CNS Unit-I_final.ppt
Chapter 1 2
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
Steganography ppt
Network security & cryptography

Recently uploaded (20)

PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
CloudStack 4.21: First Look Webinar slides
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
STKI Israel Market Study 2025 version august
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
Geologic Time for studying geology for geologist
PDF
giants, standing on the shoulders of - by Daniel Stenberg
Microsoft Excel 365/2024 Beginner's training
Credit Without Borders: AI and Financial Inclusion in Bangladesh
CloudStack 4.21: First Look Webinar slides
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
sbt 2.0: go big (Scala Days 2025 edition)
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Consumable AI The What, Why & How for Small Teams.pdf
TEXTILE technology diploma scope and career opportunities
4 layer Arch & Reference Arch of IoT.pdf
STKI Israel Market Study 2025 version august
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
UiPath Agentic Automation session 1: RPA to Agents
Taming the Chaos: How to Turn Unstructured Data into Decisions
Convolutional neural network based encoder-decoder for efficient real-time ob...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Geologic Time for studying geology for geologist
giants, standing on the shoulders of - by Daniel Stenberg

network security, cryptography,steganography

  • 1. Network Security Cryptography & Steganograpy By Nikhil
  • 2. A Security History Of The World Goths,vandals,huns Burglar by hacker
  • 3. Why do we need security?
  • 4. Introduction What is Network Security: Network security define the protection, safe guarding of the computers in the network by using security tools.
  • 5. Who is vulnerable? Financial institutions and banks Internet service providers Government and Defense services Multinational corporations ANYONE ON THE NETWORK
  • 6. Common security attacks and their countermeasures Finding a way into the network Firewalls TCP hijacking IPSec Packet sniffing Encryption (SSH, SSL, HTTPS)
  • 8. TCP Attacks Say hello to sandy, Bob and Sam
  • 9. TCP Attacks Sandy and Bob have an established TCP connection
  • 10. TCP Attacks Sam lies on the path between Sandy and Bob on the network He can intercept all of their packets
  • 11. TCP Attacks First, Sam must drop all of Sandy’s packets since they must not be delivered to Bob (why?) Packets The Void
  • 12. TCP Attacks How do we prevent this? IPSec Provides source authentication, so Sam cannot pretend to be Sandy Encrypts data before transport, so Sam cannot talk to Bob without knowing what the session key is :-
  • 13. Types of Secret Writing Secret writing Cryptography Steganography
  • 14. Cryptography “ Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat . ” Sun Tzu 
  • 17. Benefits of Cryptographic Technologies Data secrecy Data integrity Authentication of message originator Electronic certification and digital signature Non-repudiation
  • 18. Potential Problems with Cryptographic Technologies? False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries
  • 20. Steganography –covered writing – is an art of hiding information Popular contemporary Steganography technologies hide information in images
  • 21.  
  • 22. How Secure are Today’s Encryption does not guarantee security! Many ways to beat a crypto system NOT dependent on cryptanalysis, such as: Viruses, worms, hackers, etc. Unauthorized physical access to secret keys Cryptography is only one of the elements of comprehensive computer security high overhead to hide relatively few info bits Technologies

Editor's Notes

  • #12: Alice can send a RESET