SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
NETWORK SECURITY 
Ms. Mousmi Pawar
OVERVIEW 
1. Need for Security 
2. Goals of Security 
3. Famous Malwares and Phishing 
4. Cryptography
NEED FOR SECURITY
GOALS OF SECURITY 
 Integrity 
 Confendtiality 
 Authentication 
 Non-Repudiation 
 Availability 
 Access Control
INTEGRITY 
 Protect the information INTEGRITY 
This type of attack is called Modification 
Transfer `1000 
To 
B 
Ideal route of the message 
Transfer `1000 
To 
C 
Actual route of the message 
A 
X
CONFIDENTIALITY 
 Guarantee Data Confidentiality 
This type of Attack is called Interception. 
To:aaa@gmail.com 
ATM pin is 9876 
X 
A
AUTHENTICATION 
Absence of proper authentication is called Fabrication. 
A 
I am user A 
Transfer `5000 to 
X 
X
NON-REPUDIATION 
Transfer `1000 
To 
B 
I never 
requested to 
transfer `1000 
to B 
A 
A
AVAILABILITY & ACCESS CONTROL 
This type of attack is called Interruption. 
username: aaa@gmail.com 
Password: ******** 
----- 
----- 
----- 
----- 
----- 
---- 
Read 
Read, Write 
Read
FAMOUS MALWARES 
 Viruses 
 Worms 
 Trojan Horse
VIRUS 
 A virus is a piece of program code that attaches itself to 
legitimate program code and runs when the legitimate 
program runs. 
Sum=a+b; 
Print sum; 
End. 
Sum=a+b; 
Print sum; 
Virus Code 
End. 
Original Code 
Original Code 
+ Virus code 
Delete all files 
Send copy of myself 
to all using user’s 
address book. 
Virus code
WORM 
 A worm does not modify the program, instead it 
replicates itself again and again. 
Resource 
eating and 
no 
destruction 
Resource eating 
and no destruction 
Resource eating 
and no destruction 
Resource eating 
and no destruction 
Resource 
eating and no 
destruction 
Resource 
eating and no 
destruction 
Resource eating 
and no destruction
TROJAN HORSE 
 It provides the attacker with unauthorized remote access to 
a compromised computer, infects files and damages the 
system, or steals user sensitive information. 
username: aaa@gmail.com 
Password: ******** 
Trojan Program 
A 
X
X
PHISHING 
 Attacker set up fake website which looks like real 
website to obtain your details.
CRYPTOGRAPHY 
 Cryptography is the science of achieving security by 
encoding messages to make them non-readable. 
 Encryption: The process of encoding plain text message 
into cipher text message is called as encryption. 
 Decryption: the reverse process of transforming cipher 
text to plain text is called decryption.
CRYPTOGRAPHY MECHANISM 
 Every Encryption and Decryption process has 2 aspects: 
the algorithm and the key used for encryption. 
 Symmetric key Cryptography: If the same key is used for 
encryption and decryption.(e.g. DES) 
 Asymmetric key Cryptography/Public Key Cryptography: if 
two different keys are used for encryption and decryption 
process(e.g. RSA)
REFERENCES 
 Cryptography and Network Security, Atul Kahate, Tata 
McGraw Hill. 
 http://en.wikipedia.org/wiki/Cryptography.- Wikipedia.
THANK YOU

More Related Content

PPT
Network Security
MAJU
 
PDF
Thick Application Penetration Testing: Crash Course
Scott Sutherland
 
PPTX
Social engineering presentation
pooja_doshi
 
PPSX
Web application security
Akhil Raj
 
PPTX
Chapter 1_Cyber Security.pptx
PrinceKumar851167
 
PPTX
Hacker tooltalk: Social Engineering Toolkit (SET)
Chris Hammond-Thrasher
 
PDF
Social Engineering
William Gregorian
 
PDF
MITRE ATT&CK Framework
n|u - The Open Security Community
 
Network Security
MAJU
 
Thick Application Penetration Testing: Crash Course
Scott Sutherland
 
Social engineering presentation
pooja_doshi
 
Web application security
Akhil Raj
 
Chapter 1_Cyber Security.pptx
PrinceKumar851167
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Chris Hammond-Thrasher
 
Social Engineering
William Gregorian
 
MITRE ATT&CK Framework
n|u - The Open Security Community
 

What's hot (20)

PPSX
Brute force attack
Jamil Ali Ahmed
 
PPTX
Wireless Attacks
primeteacher32
 
PPTX
Web Hacking With Burp Suite 101
Zack Meyers
 
PDF
Social Engineering Attacks & Principles
LearningwithRayYT
 
PPT
DDoS Attacks
Jignesh Patel
 
PDF
Social Engineering Basics
Luke Rusten
 
PPTX
Brute force-attack presentation
Mahmoud Ibra
 
PDF
Pentesting with Metasploit
Prakashchand Suthar
 
PPTX
Sql injection - security testing
Napendra Singh
 
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
PPTX
Social engineering: A Human Hacking Framework
Jahangirnagar University
 
PPT
SQL Injection
Adhoura Academy
 
PPT
Ethical hacking
RamchandraRegmi
 
PPTX
Firewall presentation
TayabaZahid
 
PPT
Introduction to Web Server Security
JITENDRA KUMAR PATEL
 
PPTX
Social engineering-Attack of the Human Behavior
James Krusic
 
PPTX
Introduction to penetration testing
Nezar Alazzabi
 
PDF
Social engineering attacks
Ramiro Cid
 
PPT
Social engineering and Phishing
thecorrosiveone
 
PPTX
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Brute force attack
Jamil Ali Ahmed
 
Wireless Attacks
primeteacher32
 
Web Hacking With Burp Suite 101
Zack Meyers
 
Social Engineering Attacks & Principles
LearningwithRayYT
 
DDoS Attacks
Jignesh Patel
 
Social Engineering Basics
Luke Rusten
 
Brute force-attack presentation
Mahmoud Ibra
 
Pentesting with Metasploit
Prakashchand Suthar
 
Sql injection - security testing
Napendra Singh
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Social engineering: A Human Hacking Framework
Jahangirnagar University
 
SQL Injection
Adhoura Academy
 
Ethical hacking
RamchandraRegmi
 
Firewall presentation
TayabaZahid
 
Introduction to Web Server Security
JITENDRA KUMAR PATEL
 
Social engineering-Attack of the Human Behavior
James Krusic
 
Introduction to penetration testing
Nezar Alazzabi
 
Social engineering attacks
Ramiro Cid
 
Social engineering and Phishing
thecorrosiveone
 
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Ad

Viewers also liked (19)

PPTX
Chapter 1
kparthjadhav
 
PPTX
9 things about indian cyber law prashant mali
Adv Prashant Mali
 
PPT
Networking Java Socket Programming
Mousmi Pawar
 
PPTX
Internet security protocol
Mousmi Pawar
 
PPTX
Cyber law In India: its need & importance
Aditya Shukla
 
PPT
Software Testing
Mousmi Pawar
 
PPTX
Software testing ppt
Heritage Institute Of Tech,India
 
PDF
WHITEPAPER-7_years_of_Indian_Cyber_Law
guest66dc5f
 
PPTX
EDLD804 Constitutional Law Chapter 1 Presentation
Paul Gruhn
 
PPTX
The information technology act,2000
Saranya Babu Rajendran
 
PDF
Cyber Laws
mayur_ceh
 
PDF
Software Project Management
Ayaz Shariff
 
PDF
software engineering
Ahmed Elshahat Mohamed
 
PDF
Software engineering lecture notes
Siva Ayyakutti
 
PPTX
Software Project Management ppt
Andreea Usatenco
 
PPTX
Introduction of software project management
REHMAT ULLAH
 
PPTX
Software engineering project management
jhudyne
 
PPTX
Software testing life cycle
Garuda Trainings
 
PPT
Introduction to Cyber Law
n|u - The Open Security Community
 
Chapter 1
kparthjadhav
 
9 things about indian cyber law prashant mali
Adv Prashant Mali
 
Networking Java Socket Programming
Mousmi Pawar
 
Internet security protocol
Mousmi Pawar
 
Cyber law In India: its need & importance
Aditya Shukla
 
Software Testing
Mousmi Pawar
 
Software testing ppt
Heritage Institute Of Tech,India
 
WHITEPAPER-7_years_of_Indian_Cyber_Law
guest66dc5f
 
EDLD804 Constitutional Law Chapter 1 Presentation
Paul Gruhn
 
The information technology act,2000
Saranya Babu Rajendran
 
Cyber Laws
mayur_ceh
 
Software Project Management
Ayaz Shariff
 
software engineering
Ahmed Elshahat Mohamed
 
Software engineering lecture notes
Siva Ayyakutti
 
Software Project Management ppt
Andreea Usatenco
 
Introduction of software project management
REHMAT ULLAH
 
Software engineering project management
jhudyne
 
Software testing life cycle
Garuda Trainings
 
Introduction to Cyber Law
n|u - The Open Security Community
 
Ad

Similar to Network Security Fundamental (20)

PDF
Cryptography networkcns subject notes
mrudulareddy226
 
PPTX
COMPUTER SECURITY in Information Security
EdFeranil
 
PPTX
Network security and cryptography
Pavithra renu
 
PPT
Sunanda cryptography ppt
Soma Subbama
 
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
abduganiyevbekzod011
 
PPTX
An An Exploration Into the Cyber Security
sivasakthin2022cse
 
PPTX
Computer security 7.pptx
Khappiyo
 
PPT
Tutorial 09 - Security on the Internet and the Web
dpd
 
PPTX
Cyber security
ankit yadav
 
PPTX
Cyber security beginner level presentation slide
Md. Ismiel Hossen Abir
 
PPT
Network Security
Ramasubbu .P
 
PPTX
Introduction Ethical hacking by eslam hussein
Eslam Hussein
 
PPTX
small example which is created by a gamma ai
PavitraVaishnavi
 
DOCX
Cryptographic technologies are used to keep our data private and.docx
write12
 
DOCX
Cryptographic technologies are used to keep our data private and.docx
write12
 
PDF
E Commerce security
Mayank Kashyap
 
PDF
NIS Unit-1(PPT)jbdjjdcbjbchdhbchbjch.pdf
MohdKhalidShaikh2
 
PPTX
Common Cyberthreats and How to Prevent Them (2019)
Evan Clark
 
PPTX
Lecture2-InforSec-Computer and Internet security.pptx
markhorid1
 
PPTX
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
Cryptography networkcns subject notes
mrudulareddy226
 
COMPUTER SECURITY in Information Security
EdFeranil
 
Network security and cryptography
Pavithra renu
 
Sunanda cryptography ppt
Soma Subbama
 
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
abduganiyevbekzod011
 
An An Exploration Into the Cyber Security
sivasakthin2022cse
 
Computer security 7.pptx
Khappiyo
 
Tutorial 09 - Security on the Internet and the Web
dpd
 
Cyber security
ankit yadav
 
Cyber security beginner level presentation slide
Md. Ismiel Hossen Abir
 
Network Security
Ramasubbu .P
 
Introduction Ethical hacking by eslam hussein
Eslam Hussein
 
small example which is created by a gamma ai
PavitraVaishnavi
 
Cryptographic technologies are used to keep our data private and.docx
write12
 
Cryptographic technologies are used to keep our data private and.docx
write12
 
E Commerce security
Mayank Kashyap
 
NIS Unit-1(PPT)jbdjjdcbjbchdhbchbjch.pdf
MohdKhalidShaikh2
 
Common Cyberthreats and How to Prevent Them (2019)
Evan Clark
 
Lecture2-InforSec-Computer and Internet security.pptx
markhorid1
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 

Recently uploaded (20)

PPTX
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
PDF
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PPTX
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PDF
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PPTX
Presentation about variables and constant.pptx
kr2589474
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
PPTX
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
Presentation about variables and constant.pptx
kr2589474
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 

Network Security Fundamental

  • 1. NETWORK SECURITY Ms. Mousmi Pawar
  • 2. OVERVIEW 1. Need for Security 2. Goals of Security 3. Famous Malwares and Phishing 4. Cryptography
  • 4. GOALS OF SECURITY  Integrity  Confendtiality  Authentication  Non-Repudiation  Availability  Access Control
  • 5. INTEGRITY  Protect the information INTEGRITY This type of attack is called Modification Transfer `1000 To B Ideal route of the message Transfer `1000 To C Actual route of the message A X
  • 6. CONFIDENTIALITY  Guarantee Data Confidentiality This type of Attack is called Interception. To:[email protected] ATM pin is 9876 X A
  • 7. AUTHENTICATION Absence of proper authentication is called Fabrication. A I am user A Transfer `5000 to X X
  • 8. NON-REPUDIATION Transfer `1000 To B I never requested to transfer `1000 to B A A
  • 9. AVAILABILITY & ACCESS CONTROL This type of attack is called Interruption. username: [email protected] Password: ******** ----- ----- ----- ----- ----- ---- Read Read, Write Read
  • 10. FAMOUS MALWARES  Viruses  Worms  Trojan Horse
  • 11. VIRUS  A virus is a piece of program code that attaches itself to legitimate program code and runs when the legitimate program runs. Sum=a+b; Print sum; End. Sum=a+b; Print sum; Virus Code End. Original Code Original Code + Virus code Delete all files Send copy of myself to all using user’s address book. Virus code
  • 12. WORM  A worm does not modify the program, instead it replicates itself again and again. Resource eating and no destruction Resource eating and no destruction Resource eating and no destruction Resource eating and no destruction Resource eating and no destruction Resource eating and no destruction Resource eating and no destruction
  • 13. TROJAN HORSE  It provides the attacker with unauthorized remote access to a compromised computer, infects files and damages the system, or steals user sensitive information. username: [email protected] Password: ******** Trojan Program A X
  • 14. X
  • 15. PHISHING  Attacker set up fake website which looks like real website to obtain your details.
  • 16. CRYPTOGRAPHY  Cryptography is the science of achieving security by encoding messages to make them non-readable.  Encryption: The process of encoding plain text message into cipher text message is called as encryption.  Decryption: the reverse process of transforming cipher text to plain text is called decryption.
  • 17. CRYPTOGRAPHY MECHANISM  Every Encryption and Decryption process has 2 aspects: the algorithm and the key used for encryption.  Symmetric key Cryptography: If the same key is used for encryption and decryption.(e.g. DES)  Asymmetric key Cryptography/Public Key Cryptography: if two different keys are used for encryption and decryption process(e.g. RSA)
  • 18. REFERENCES  Cryptography and Network Security, Atul Kahate, Tata McGraw Hill.  http://en.wikipedia.org/wiki/Cryptography.- Wikipedia.