Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Presentation for B.

Tech seminar
Network Security and Cryptography

Madan Mohan Malaviya University Of Technology,


Gorakhpur (U.P) - 273010

Presented by :-
Mahatejeshwar Singh
(2021021043)
B.Tech. 3rd Year (CSE)
mahatejeshwarsingh@gmail.com
Madan Mohan Malaviya University Of Technology, Gorakhpur

Contents
● Introduction to Network Security
● Network Security Model
● Types of Network Security
● Importance of Network Security
● Application of Network Security
● Cryptography
● Cryptography Block Diagram
● Features of Cryptography
● Types of Cryptography
● Importance of Cryptography
● Applications of Cryptography
● Conclusion
● References
1.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Introduction to Network Security


❖ Network security is defined as the activity created to protect the integrity of your network and data.
❖ Computer network security consists of measures taken by business or some organizations to monitor
and prevent unauthorized access from the outside attackers.
❖ Every organization, regardless of size, industry or infrastructure, requires a degree of network security
solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.
❖ The most common example of network security is password protection which the user of network
chooses.
❖ The network security solutions protects various vulnerabilities of the computer systems.

2.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Network Security Model

3.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Types of Network Security


The few types of network securities are discussed below :
1) Firewall protection :- A firewall is either a software program or a hardware device that prevents
unauthorized users from accessing your network, stopping suspicious traffic from entering while allowing
legitimate traffic to flow through.
2) Antivirus and Anti-malware Software :- This type of network security ensures that any malicious software
does not enter the network and threaten the security of the data.
3) Access control :- Not every person should have a complete allowance for the accessibility to the network or
its data.
4) Intrusion prevention systems :- It is a network security application that monitors network or system
activities for malicious activity to actively block attacks.
5) Data loss prevention :- Organizations must make sure that their staff does not send sensitive information
outside the network. Data loss prevention, or DLP, technologies can stop people from uploading,
forwarding, or even printing critical information in an unsafe manner.
6) Virtual Private Networks (VPNs) :- A virtual private network (VPN) is software that protects a user’s
identity by encrypting their data and masking their IP address and location.
4.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Importance of Network Security


1. Protects Confidential Information: Network security safeguards sensitive data such as personal
information, financial records, and intellectual property from unauthorized access or theft.
2. Prevents Unauthorized Access: It prevents unauthorized users from accessing the network, thereby
safeguarding against breaches, data leaks, and cyberattacks.
3. Maintains Business Continuity: Effective network security measures ensure uninterrupted operation of
critical systems and services, minimizing downtime caused by cyber incidents.
4. Preserves Reputation: A breach can damage an organization's reputation and erode trust among
customers, partners, and stakeholders. Network security helps maintain a positive brand image.
5. Ensures Compliance: Many industries have regulations and standards regarding data protection.
Network security measures help organizations comply with these regulations and avoid legal penalties.
6. Facilitates Trust in Digital Transactions: Secure networks enable safe online transactions, including e-
commerce, banking, and communication, fostering trust among users.

5.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Application of Network Security

• Protection of network.
• Protection from intrusions.
• To protect from threats.
• Protection of data from breaches.

6.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Cryptography
❖ Cryptography is the practice and study of techniques for secure communication in the presence of
third parties, often referred to as adversaries.

❖ It encompasses the methods used to encrypt and decrypt data, ensuring that only authorized parties
can access and understand the information while keeping it confidential and secure from
unauthorized access or tampering.
❖ Cryptography consists of two process : Encryption and Decryption.
➢ Encryption :- It is the process of converting plaintext or any other type of data into a ciphertext
that cannot be understood by unauthorized users. It uses algorithms and keys to scramble the
original data, making it unreadable without the corresponding decryption key.
➢ Decryption :- It is the process of converting ciphertext back into its original plaintext form. It
involves using the correct decryption key to reverse the encryption process, thereby restoring
the original data for authorized users to access and understand.
7.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Block Diagram

8.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Features Of Cryptography
Features Of Cryptography are as follows :
1. Confidentiality : Keep the contents of data confidential.
2. Integrity : It ensures that data remains accurate and consistent over its whole transmission process.
3. Scalability : Cryptographic algorithms and protocols should be scalable to support a wide range of
applications, from securing individual messages to protecting large-scale networks and systems.
4. Performance : Cryptography should be efficient and not introduce significant overhead in terms of
processing time and resource consumption, especially in real-time applications.
5. Resistance to Attacks : Cryptography aims to withstand various types of attacks, including brute-force
attacks, cryptanalysis, and side-channel attacks, to maintain the security of encrypted data.

9.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Types of CryptoGraphy
In general there are three types Of cryptography:
1) Symmetric Key Cryptography (Private Key Cryptography)
2) Asymmetric Key Cryptography (Public Key Cryptography)
1) Symmetric Key Cryptography :- It is an encryption system where the sender and receiver of message
use a single common key to encrypt and decrypt messages.

10.
Madan Mohan Malaviya University Of Technology, Gorakhpur

2) Asymmetric Key Cryptography :- Under this system a pair of keys is used to encrypt and decrypt
information. A public key is used for encryption and a private key is used for decryption. Public key
and Private Key are different.

11.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Importance of Cryptography

● Cryptography enables individuals to protect their privacy by encrypting personal communications,


files, and online activities. It helps maintain confidentiality and control over sensitive information in
an increasingly interconnected digital world

● Cryptography ensures that sensitive information remains confidential by encrypting it, making it
unreadable to unauthorized users. This is crucial for protecting personal, financial, and business data
from eavesdropping, espionage, and theft.

● To safeguard personal information.


● For the protection of data from unauthorized access.

12.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Applications of Cryptography
• Secure Communication :- Encryption is used to secure email communication, instant messaging, voice
calls, and video conferencing, ensuring that only authorized parties can access the content.
• Digital Currencies :- To safeguard transactions and prevent fraud, digital currencies like Bitcoin also
use cryptography.
• Data Protection :- Cryptography is used to encrypt data stored on devices like computers,
smartphones, and external drives, protecting it from unauthorized access in case of theft or loss.
• Authentication :- Cryptography is used for authentication in many different situations, such as when
accessing a bank account, logging into a computer, or using a secure network.
• End-to-End Encryption :- End-to-end encryption is used to protect two-way communications like
video conversations, instant messages, and email. End-to-end encryption is widely used in
communication apps like WhatsApp and Signal, and it provides a high level of security and privacy
for users.
13.
Madan Mohan Malaviya University Of Technology, Gorakhpur

Conclusion

• Cryptography and network security are two of the networking terms used for the protection and
security of data and network.
• Network security protects the sensitive data of clients and it protects the network from ransomware.
• Cryptography ensures data confidentiality and provides data protection from unauthorized access.
• Confidentiality, Data Integrity, Authentication, and Non-Repudiation are the main principles of
cryptography.
• Cryptography is used to protect the private information shared between two communicating parties
from a third party.
• Network security is the actions taken or procedures followed to protect the computer network.

14.
Madan Mohan Malaviya University Of Technology, Gorakhpur

References

• https://www.tutorialspoint.com/cryptography/cryptosystems.htm

• https://www.javatpoint.com/computer-network-security

• https://en.wikipedia.org/wiki/Network_security
• https://www.scaler.com/topics/computer-network/cryptography-and-network-security/
• https://www.geeksforgeeks.org/cryptography-and-network-security-principles/

15.
THANK YOU

You might also like