0% found this document useful (0 votes)
25 views

Network Security and Cryptography

The document provides a comprehensive overview of network security and cryptography, highlighting the importance of protecting digital networks from unauthorized access and cyber threats. It discusses common threats, key components, best practices, and encryption methods essential for ensuring data security and maintaining business continuity. The document also emphasizes the financial implications of cyberattacks and the necessity of compliance with data security regulations.

Uploaded by

rhyahsan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Network Security and Cryptography

The document provides a comprehensive overview of network security and cryptography, highlighting the importance of protecting digital networks from unauthorized access and cyber threats. It discusses common threats, key components, best practices, and encryption methods essential for ensuring data security and maintaining business continuity. The document also emphasizes the financial implications of cyberattacks and the necessity of compliance with data security regulations.

Uploaded by

rhyahsan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

A Comprehensive Overview Of

Network Security And


Cryptography
By

Kaysarul Anas Apurba


A special project requested
by Prof. W.W. Koczkodaj
for CP5207 HIU
Table of Contents
1. Introduction
2. Current State of Affairs
3. Common Threats in Network Security
4. Key Components in Network Security
5. Network Security Best Practices
6. Encryption in Network Security
7. References
1. Introduction to Network Security

Definition:

Network security involves measures to protect digital networks


from unauthorized access, cyber threats, and attacks.

Importance:
Prevents data breaches
Ensures privacy and confidentiality
Maintains integrity of communication
2.1 Current State of Affairs
■ Networks Are Targets

Why Networks Are Under Attack?

• Increasing cybercrime costs (estimated $8 trillion


in damages globally in 2023)
• Rise of ransomware and phishing attacks
• IoT devices introducing more vulnerabilities

Example:

The SolarWinds Attack (2020) affected major


corporations and government agencies.
2.2 Current State of Affairs
Why is Network Security Important?

• Prevents Financial Loss – Cyberattacks can cost businesses millions in


damages, lawsuits, and lost revenue.
• Protects Sensitive Data – Ensures personal, financial, and business
data remain secure from cybercriminals.
• Maintains Business Continuity – Attacks like ransomware can disrupt
operations, leading to downtime and loss of productivity.
• Ensures Customer Trust – Organizations with strong security practices
retain customer confidence and credibility.
• Compliance with Regulations – Many industries (finance, healthcare)
must follow strict data security laws like GDPR and HIPAA.
2.3 Current State of Affairs
Vectors of Network Attacks

What is an Attack Vector?


An attack vector is a method hackers use to gain
unauthorized access to a system.

🔸
Types of Attack Vectors:

🔸
Internet-based (DDoS attacks, phishing)
Internal threats (disgruntled employees, weak

🔸
passwords)
Exploited vulnerabilities (unpatched software, zero-
day attacks)
2.4 Current State of Affairs
■ Data Loss
• Email & Social Media – IMs and emails can be intercepted, exposing
confidential data.
• Unencrypted Devices – Stolen laptops with unencrypted data pose a
security risk.
• Cloud Storage – Weak security settings can lead to unauthorized access
and data loss.
• Removable Media – USB drives can be lost or misused for unauthorized
data transfer.
• Hard Copy – Improper disposal of sensitive documents can lead to data
leaks.
• Access Control – Weak or stolen passwords allow unauthorized access
to critical data.
3. Common Threats in Network Security

• Malware – Viruses, worms, trojans


• Phishing – Fraudulent emails to steal credentials
• DoS/DDoS Attacks – Overloading systems to shut them down
• Man-in-the-Middle (MITM) Attacks – Intercepting
communication
• Ransomware – Encrypting user data for ransom
4. Key Components of Network
Security

• Firewall: monitors and controls network traffic.


• Intrusion Detection and Prevention Systems (IDPS): Detects and
blocks malicious activity.
• Virtual Private Networks (VPNs): Secures remote access and
encrypts data.
• SSL/TLS Encryption: Ensures secure communication over the
internet.
• Endpoint Security: Protects individual devices from threats.
5. Network Security Best Practices

• Multi-Factor Authentication (MFA): Adds an extra layer of


security.
• Regular software updates: Fixes vulnerabilities.
• Network segmentation: Limits damage from breaches.
• Employee security training: Reduces human error risks.
• Zero Trust Security Model: Assumes no trust in internal or
external networks.
6.1 Encryption in Network Security

Symmetric vs. Asymmetric Encryption


• Symmetric: Uses a single key for encryption & decryption (e.g., AES).
• Asymmetric: Uses public & private keys (e.g., RSA).

Comparison Table:

Feature Symmetric Encryption Asymmetric Encryption

Keys Used Single key Public & private key

Speed Faster Slower

Security Less secure More secure


6.2 Encryption in Network Security

Common Encryption Algorithms


• AES (Advanced Encryption Standard): Fast and secure, used in
government and industry.
• RSA (Rivest-Shamir-Adleman): Commonly used for secure data
transmission.
• ECC (Elliptic Curve Cryptography): Provides strong security with
smaller key sizes.
6.3 Encryption in Network Security

Secure Communication Protocols

• HTTPS (HyperText Transfer Protocol Secure): Encrypts web


communication. [wikipedia link? Cost?]
• IPsec (Internet Protocol Security): Secures IP communications with
authentication and encryption.
• SSH (Secure Shell): Provides encrypted remote login and secure
file transfers.
References
■ Slide 3: Reference: Stallings, W. (2020). Network Security Essentials: Applications and Standards. Pearson.
■ Slide(4-7) : Module 1: Securing Networks by Cisco.
■ Slide 8: Reference: Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your
World. Norton.
■ Slide 10: Kizza, J. M. (2020). Guide to Computer Network Security. Springer.
■ Slide 11: NIST Special Publication 800-207 (2020). Zero Trust Architecture
■ Slide (12-14): Stallings, W. (2019). Cryptography and Network Security: Principles and Practice. Pearson.

Add

https://link.springer.com/article/10.1007/s11205-018-1837-z

You might also like