Professional Documents
Culture Documents
Project By-Anurag Arya
Project By-Anurag Arya
Project By-Anurag Arya
Security and
Cryptograph
y
Project by-
Anurag Arya
Introduction
Network security is the actions taken or procedures
followed to protect the computer network.
Cryptography ensures data confidentiality and
provides data protection from unauthorized access.
Network security protects the sensitive data of clients
and it protects the network from ransomware.
Features :-
1.Confidentiality
2.Data Integrity
3.Authentication
4.Non-Repudiation
CSS
About us
This presentation will allow students and people to
get a glimpse of what network security and
cryptography is all about.
Importance of Network Security and
Cryptography
Network security is critical because Cryptography ensures confidentiality by
it prevents cybercriminals from gaining encrypting sent messages using an
access to valuable data and sensitive algorithm with a key only known to the
information. When hackers get hold of sender and recipient. A common example
such data, they can cause a variety of of this is the messaging tool WhatsApp,
problems, including identity theft, stolen which encrypts conversations between
assets and reputational harm. people to ensure they cannot be hacked
or intercepted.
“Every secret
T creates a
potential failure
point.”
— Bruce
Schneier
Geographical data
Active trends
The average time to
identify a breach is
207 days. (IBM)
Active trends
74% of breaches
involved a human
element in 2023.
(Verizon)
Advantages of Network Security and
Cryptography
•Builds trust. ...
•Mitigates risk. ...
•Protects proprietary information. ...
•Enables a more modern workplace. ...
•Access control. ...
•Antivirus and anti-malware software. ...
•Application security. ...
•Behavioral analytics.
Disadvantages of Network Security
and Cryptography
•High Cost of Implementation. ...
•Complex Management. ...
•Potential False Sense of Security. ...
•Compatibility Issues. ...
•Inconvenience to Users. ...
•Evolving Threat Landscape. ...
•Human Error. ...
•Limited Effectiveness Against Insider
Threats.
Real life use of Cryptpgraphy