Cryptography & Security Implementation in Network Computing Environment

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Cryptography & Security Implementation in

Network Computing Environment

By: Babar Naseer


Research Paper Reference

Presented by Rajanikant Pandey and Vinay Kumar


Pandey in 2016 International Conference on
Computing for Sustainable Global Development.
OBJECTIVES

Objective of this research is to understand the implementation


of Cryptography and Security in Network Computing
Environments like industries that can be manufacturing,
media, finance or any other industry where there is need to
secure the Organizational and Business data from the outside
world.
First part of this includes possible threats, attacks and
vulnerabilities in Network Computing environment.

Second part includes techniques and services to prevent these


threats.
ATTACKS
Components of Information Security like
Confidentiality, Integrity and Availability can be
threatened by threats classified into three
categories.
TECHNIQUES & SERVICES

Cryptography
Symmetric-Key Cipher and Asymmetric-Key
Cipher.
Digital Signature
Hashing
Secure Socket Layer Protocol
HASHING
In the process of cryptographic has function, it creates
compressed image of the document or message,
called digest that can be used like fingerprint, to
check the integrity of document, one has to run
cryptographic function again and compare with
previous one.
Digital Signature
Secure Socket Layer Protocol Stack
Conclusion

This approach of using these prevention methods to


protect the important organizational data is very
helpful and can be used to secure those network
computing environments where the data needs to be
secured.
Thank You.

You might also like