Professional Documents
Culture Documents
Unit-5 NETWORK & INFORMATION SECURITY
Unit-5 NETWORK & INFORMATION SECURITY
NETWORK &
INFORMATION SECURITY
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Why is Data Privacy important?
• Business Asset Management: Data is perhaps the most important asset a
business owns. We live in a data economy where companies find enormous
value in collecting, sharing and using data about customers or users, especially
from social media.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Data Storage
• Data storage is the recording (storing) of information (data) in
a storage medium.
• Handwriting, phonographic recording, magnetic tape, and optical
discs are all examples of storage media. Biological molecules such
as RNA and DNA are considered by some as data storage.
• Recording may be accomplished with virtually any form of energy.
Electronic data storage requires electrical power to store and retrieve
data.
• Data storage in a digital, machine-readable medium is sometimes
called digital data. Computer data storage is one of the core functions
of a general-purpose computer.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
What is encryption?
• Encryption means that the sender converts original information into
another form and sends the unintelligible message over the network.
• It helps us to secure data that we send, receives, and store.
• Data can be text messages saved on our cell phone, logs stored on our
fitness watch, and details of banking sent by your online account.
• It is the procedure of taking ordinary text, such as a text or email, and
transforming it into an unreadable type of format known as "cipher
text."
• The ciphertext is converted back to the real form when the recipient
accesses the message, which is known as decryption.
• It helps to protect the digital information either saved on or spread
through a network such as an internet on computer systems
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Symmetric Encryption
• Symmetric encryption encrypts and decrypts the information using a
single password.
• In this encryption technique, the message is encrypted with a key, and
the same key is used for decrypting the message.
• It is the simplest and commonly known encryption technique. It makes
it easy to use but less secure.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Symmetric Encryption
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Asymmetric Encryption
• Asymmetric encryption uses two keys for encryption and decryption.
• It is based on the technique of public and private keys. A public key,
which is interchanged between more than one user. Data is decrypted
by a private key, which is not exchanged.
• It is slower but more secure. The public key used in this encryption
technique is available to everyone, but the private key used in it is not
disclosed.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Asymmetric Encryption
• The drawback of this encryption is that it takes more time than the
symmetric encryption process.
• Asymmetric encryption is slower than secret-key encryption because,
in secret key encryption, a single shared key is used to encrypt and
decrypt the message, while in public-key encryption, two different
keys are used, both related to each other by a complex mathematical
process.
• Therefore, we can say that encryption and decryption take more time
in public-key encryption.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Diffie-Hellman Key Exchange
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Where is Diffie-Hellman Key Exchange Used?
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Where is Diffie-Hellman Key Exchange Used?
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
1. Digital Certificate
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
2. Certifying Authority (CA)
• The key functions of a CA are as follows −
• Generating key pairs − The CA may generate a key pair
independently or jointly with the client.
• Issuing digital certificates − The CA could be thought of as the PKI
equivalent of a passport agency − the CA issues a certificate after
client provides the credentials to confirm his identity. The CA then
signs the certificate to prevent modification of the details contained in
the certificate.
• Publishing Certificates − The CA need to publish certificates so that
users can find them. There are two ways of achieving this. One is to
publish certificates in the equivalent of an electronic telephone
directory. The other is to send your certificate out to those people you
think might need it by one means or another.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
3. Certifying Authority (CA)
• The key functions of a CA are as follows −
• Verifying Certificates − The CA makes its public key available in
environment to assist verification of his signature on clients’ digital
certificate.
• Revocation of Certificates − At times, CA revokes the certificate
issued due to some reason such as compromise of private key by user
or loss of trust in the client. After revocation, CA maintains the list of
all revoked certificate that is available to the environment.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
4. Registration Authority (RA)
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
5. Certificate Management System (CMS)
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
6. Private Key Tokens
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Why is user authentication important?
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
1. Kerberos
• Kerberos is a type of protocol that is used to authenticate users.
• It validates the client and server during networking with the help of a
cryptographic key.
• It is designed to strongly authenticate the users during the reporting of
the application.
• All the proposals of Kerberos are available at MIT.
• The main use of the Kerberos is in the product-based companies.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
2. Lightweight Directory Access Protocol(LDAP)
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
3. OAuth2
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
3. SAML
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
3. RADIUS
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
PGP (Pretty Good Privacy)
• PGP stands for Pretty Good Privacy (PGP) which is invented by Phil
Zimmermann.
• PGP was designed to provide all four aspects of security, i.e., privacy,
integrity, authentication, and non-repudiation in the sending of email.
• PGP uses a digital signature (a combination of hashing and public key
encryption) to provide integrity, authentication, and non-repudiation.
• PGP uses a combination of secret key encryption and public key
encryption to provide privacy.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
PGP (Pretty Good Privacy)
• PGP is an open source and freely available software package for email
security.
• PGP provides authentication through the use of Digital Signature.
• It provides confidentiality through the use of symmetric block
encryption.
• It provides compression by using the ZIP algorithm, and EMAIL
compatibility using the radix-64 encoding scheme.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
IPSec (Internet Protocol Security)
• IP Security (IPSec) is a collection of protocols which is designed by
Internet Engineering Task Force (IETF) to provide security for a
packet at the network level.
• It helps to create confidential and authenticated and packets for the IP
layer as shown in below diagram −
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Firewalls
• A firewall can be defined as a special type of network security device
or a software program that monitors and filters incoming and outgoing
network traffic based on a defined set of security rules.
• It acts as a barrier between internal private networks and external
sources (such as the public Internet).
• The primary purpose of a firewall is to allow non-threatening traffic
and prevent malicious or unwanted data traffic for protecting the
computer from viruses and attacks.
• A firewall is a cybersecurity tool that filters network traffic and helps
users block malicious software from accessing the Internet in infected
computers.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Firewalls
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
SOAR- Security orchestration,
automation and response
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
SOAR
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Edge Computing
• Edge Computing is a buzzword such as cloud, IoT, and Artificial
Intelligence.
• Simply saying, Edge Computing brings the decentralization of
networks.
• Edge Computing is the upcoming enhancement and advancement in
technology.
• The literal meaning of the word 'Edge' is the geographic location on
the planet to deliver services in a distributed manner.
• Edge Computing is a distributed computing system that allows to
bring computation of data and storage too close to the source (where
data is required).
• It brings computing as much close as possible so as to minimize the
bandwidth, improve response time, and use of latency.
• Instead of locating the data at a centralized place, the concept of edge
computing believes in distributing the computing process of the data.
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Challenges in Edge Computing
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Applications of Edge Computing
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Benefits of Edge Computing
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
References
Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale