Network Security and Cryptography: Lect. Engr. Mariam Naseem

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 14

Network security and

cryptography

Lect. Engr. Mariam Naseem


Computer security

 The generic name for the collection of tools


designed to protect data and to thwart
hackers.
Network security

It’s a measure to protect data during their


transmission.
And it covers the use of cryptographic
algorithms in network protocol and
network application.
Internet security

 Measures to protect data during their


transmission over a collection of
interconnected networks.
Cryptology
 This is the study of technique for ensuring the
secrecy and/or authenticity of information.
 The two main branches of cryptology are:

1.Cryptography, which is the study of the design of


such techniques
2.Cryptanalysis,which deals with the defeating such
techniques, to recover information or forging
information that will be accepted as authentic.
OSI (open system interconnection)

 OSI security architecture provides a


systematic framework for defining:
-security attacks
-security mechanism
-security services
OSI (open system interconnection)

OSI security
architecture

Security Security Security


attacks mechanism services
OSI security architecture

 ITU-T2 X.800, security architecture for OSI,


defines such a systematic approach. The OSI
security architecture is useful to managers
as a way of organizing the task of providing
security.
 Because this architecture was developed as
an international standard, computer and
services that relates to this structured
definition of services and mechanisms.
Security attacks
 Any action that compromises the security of the
information owned by an organization
 Information security is about how to prevent from
attacks or weakening that by detect the attacks on
information-based system

 NOTE: often threats & attacks means same.


Threats:

A potential for the violation of security,


which exist when there is a circumstances,
capabilities, action or event that could breach
security and cause harm. That is possible
danger that might exploit a vulnerability.
Attack

 An assault on system security that devices


from an intelligent threat. Its an intelligent act
that is a deliberate attempt to evade security
services and violate the security policy of a
system.
Security Mechanism

 A process that is designed to detect, prevent


or recover from a security attack.
 No single mechanism that will support all
functions, however one particular element
under lies many of the security mechanisms
in use:
Cryptographic technique
Security Services

 X.800 defines it as : a service provided a


protocol layer of communication open
systems, which ensures adequate security of
the systems or of data transfers.
 RFC 2828 defines it as: a processing or
communication service provided by a system
to give a specific kind of protection to system
resources.
THE END…

You might also like