Download - network security, cryptography,steganography
![Page 1: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/1.jpg)
Network Security Cryptography & Steganograpy
By
Nikhil
![Page 2: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/2.jpg)
A Security History Of The WorldGoths,vandals,huns
Burglar by hacker
![Page 3: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/3.jpg)
Why do we need security?
![Page 4: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/4.jpg)
Introduction
●What is Network Security:
Network security define the protection, safe guarding of the computers in the network by using security tools.
![Page 5: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/5.jpg)
Who is vulnerable?
•Financial institutions and banks
•Internet service providers Government and Defense services
•Multinational corporations
ANYONE ON THE NETWORK
![Page 6: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/6.jpg)
Common security attacks and their
countermeasures
• Finding a way into the network– Firewalls
• TCP hijacking– IPSec
• Packet sniffing– Encryption (SSH, SSL, HTTPS)
![Page 7: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/7.jpg)
Firewalls
![Page 8: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/8.jpg)
TCP Attacks
• Say hello to sandy, Bob and Sam
![Page 9: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/9.jpg)
TCP Attacks• Sandy and Bob have an established TCP
connection
![Page 10: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/10.jpg)
TCP Attacks
• Sam lies on the path between Sandy and Bob on the network– He can intercept all of their packets
![Page 11: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/11.jpg)
TCP Attacks
• First, Sam must drop all of Sandy’s packets since they must not be delivered to Bob (why?)
Packets
The Void
![Page 12: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/12.jpg)
TCP Attacks
• How do we prevent this?
• IPSec– Provides source authentication, so Sam
cannot pretend to be Sandy– Encrypts data before transport, so Sam
cannot talk to Bob without knowing what the session key is :-
![Page 13: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/13.jpg)
Types of Secret Writing
Secret writing
Cryptography Steganography
![Page 14: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/14.jpg)
Cryptography“Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat.”
Sun Tzu
![Page 15: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/15.jpg)
Cryptography
![Page 16: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/16.jpg)
example :-
![Page 17: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/17.jpg)
Benefits of Cryptographic Technologies
• Data secrecy
• Data integrity
• Authentication of message originator
• Electronic certification and digital signature
• Non-repudiation
![Page 18: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/18.jpg)
Potential Problems with Cryptographic Technologies?
• False sense of security if badly implemented
• Government regulation of cryptographic technologies/export restrictions
• Encryption prohibited in some countries
![Page 19: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/19.jpg)
Steganography
![Page 20: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/20.jpg)
•Steganography –covered writing – is an art of hiding information
•Popular contemporary Steganography technologies hide information in images
![Page 21: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/21.jpg)
![Page 22: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/22.jpg)
How Secure are Today’s
• Encryption does not guarantee security!• Many ways to beat a crypto system NOT
dependent on cryptanalysis, such as:– Viruses, worms, hackers, etc.– Unauthorized physical access to secret keys
• Cryptography is only one of the elements of comprehensive computer security• high overhead to hide relatively few info bits
Technologies
![Page 23: network security, cryptography,steganography](https://reader034.vdocuments.mx/reader034/viewer/2022052622/558fbf111a28ab7b488b45be/html5/thumbnails/23.jpg)
Conclusion