SlideShare a Scribd company logo
Name of the Staff : M.FLORENCE DAYANA
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Cryptography and Network Security
Principles of Information
Security, 5th Edition
2
 The quality or state of being secure—to be free
from danger”
 A successful organization should have multiple
layers of security in place:
 Physical security
 Personal security
 Operations security
 Communications security
 Network security
 Information security
What is Security
 Plaintext – Original Message
 Ciphertext – Coded Message
 Cipher – Algorithm for transforming plaintext to ciphertext
 Key – Information used in cipher known only to sender /
receiver
 Encipher (encrypt) – Converting plaintext to ciphertext
 Decipher(decrypt) – Converting ciphertext to plaintext
 Cryptography – Study of encryption principles/ methods
 Cryptanalysis (Code breaking) – Study of principles /
methods of deciphering ciphertext without knowing key
 Cryptology – Field of both cryptography and cryptanalysis
Some Basic Terminologies
 The protection afforded to an automated
information system in order to attain the
applicable objectives of preserving the
integrity, availability and confidentiality of
information system resources (includes
hardware, software, firmware,
information/data, and telecommunications)
Computer Security
 Computer Security - generic name for the collection
of tools designed to protect data and to thwart
hackers
 Network Security - measures to protect data during
their transmission
 Internet Security - measures to protect data during
their transmission over a collection of interconnected
networks
Definitions
Principles of Information
Security, 5th Edition
6
 The value of information comes from the
characteristics it possesses:
 Availability
 Accuracy
 Authenticity
 Confidentiality
 Integrity
 Utility
 Possession
Critical Characteristics of Information
 The principles of access control determines who
should be able to access what.
 Access control specifies and controls who can
access what.
 Eg: User X can write to file P, but can only update
files R and S
Access Control
Key Security Concepts
 can define 3 levels of impact from a security
breach
 Low
 Moderate
 High
Levels of Impact
 The loss could be expected to have a limited adverse effect on
organizational operations, organizational assets, or individuals.
 A limited adverse effect means that, for example, the loss of
confidentiality, integrity, or availability might
 (i) cause a degradation in mission capability to an extent
and duration that the organization is able to perform its
primary functions, but the effectiveness of the functions is
noticeably reduced;
 (ii) result in minor damage to organizational assets;
 (iii) result in minor financial loss; or
 (iv) result in minor harm to individuals.
Low Impact
 The loss could be expected to have a serious adverse effect on
organizational operations, assets, or individuals.
 A serious adverse effect means that, e.g., the loss might
 (i) cause a significant degradation in mission capability to an
extent and duration that the organization is able to perform its
primary functions, but the effectiveness of the functions is
significantly reduced;
 (ii) result in significant damage to organizational assets;
 (iii) result in significant financial loss; or
 (iv) result in significant harm to individuals that does not
involve loss of life or serious, life-threatening injuries.
Moderate Impact
 The loss could be expected to have a severe or catastrophic
adverse effect on organizational operations, organizational
assets, or individuals.
 A severe or catastrophic adverse effect means that, for
example, the loss might
 (i) cause a severe degradation in or loss of mission
capability to an extent and duration that the organization is
not able to perform one or more of its primary functions;
 (ii) result in major damage to organizational assets;
 (iii) result in major financial loss; or
 (iv) result in severe or catastrophic harm to individuals
involving loss of life or serious life threatening injuries.
High Impact
 confidentiality – student grades
 integrity – patient information
 availability – authentication service
 authenticity – admission ticket
 non-repudiation – stock sell order
Examples of Security Requirements
 Confidentiality (privacy)
 Authentication (who created or sent the data)
 Integrity (has not been altered)
 Non-repudiation (the order is final)
 Access control (prevent misuse of resources)
 Availability (permanence, non-erasure)
 Denial of Service Attacks
 Virus that deletes files
Security Services
1. not simple – easy to get it wrong
2. must consider potential attacks
3. procedures used counter-intuitive
4. involve algorithms and secret info
5. must decide where to deploy mechanisms
6. battle of wits between attacker / admin
7. not perceived to be of benefit until it fails
8. requires regular monitoring a process, not an event
Computer Security Challenges
 consider 3 aspects of information security:
 security attack
 security mechanism (control)
 security service
 note terms
 threat – a potential for violation of security
 vulnerability – a way by which loss can happen
 attack – an assault on system security, a deliberate
attempt to evade security services
Aspects of Security
Attacks, Services and Mechanisms
 Security Attack: Any action that compromises the security
of information.
 Security Mechanism: A mechanism that is designed to
detect, prevent, or recover from a security attack.
 Security Service: A service that enhances the security of
data processing systems and information transfers. A
security service makes use of one or more security
mechanisms.
Passive Attack - Interception
Observe traffic pattern
Passive Attack: Traffic Analysis
Block delivery of message
Active Attack: Interruption
Fabricate message
Active Attack: Fabrication
Active Attack: Replay
Modify message
Active Attack: Modification
 Passive attacks – focus on Prevention
• Easy to stop
• Hard to detect
 Active attacks – focus on Detection and Recovery
• Hard to stop
• Easy to detect
Handling Attacks
 a.k.a. control
 feature designed to detect, prevent, or recover
from a security attack
 no single mechanism that will support all
services required
 however one particular element underlies
many of the security mechanisms in use:
 cryptographic techniques
 hence our focus on this topic
Security Mechanism
Model for Network Security
 using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used by
the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to use
the transformation and secret information for a
security service
Model for Network Security
Model for Network Access Security
Model for Network Access Security
 using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated information or
resources
 note that model does not include:
1. monitoring of system for successful penetration
2. monitoring of authorized users for misuse
3. audit logging for forensic uses, etc.
Model for Network Access Security
Thank You..

More Related Content

PPT
Ch01 overview nemo
PDF
Computer security priciple and practice
PDF
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
PPTX
Review of Information Security Concepts
PDF
Defense In Depth Using NIST 800-30
PPT
SegurançA Da InformaçãO Faat V1 4
PPTX
Ancaman & kelemahan server
PPTX
Basic Security Requirements
Ch01 overview nemo
Computer security priciple and practice
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Review of Information Security Concepts
Defense In Depth Using NIST 800-30
SegurançA Da InformaçãO Faat V1 4
Ancaman & kelemahan server
Basic Security Requirements

What's hot (20)

PDF
Certified Information Systems Security Professional (cissp) Domain “access co...
PPTX
What is penetration testing and why is it important for a business to invest ...
PPTX
Security architecture, engineering and operations
PPTX
Database Threats - Information System Security
PPT
Layered Approach - Information Security Recommendations
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PPTX
Information security principles
PPT
002.itsecurity bcp v1
PDF
Security Policy Checklist
PDF
Understanding security operation.pptx
PPTX
Skills that make network security training easy
PDF
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
PPTX
Malware detection how to spot infections early with alien vault usm
PPT
Isl awareness training
PPTX
Ics & computer security for nuclear facilities
PPT
Overview
PPTX
Logging, monitoring and auditing
PPTX
Network Security Risk
PPTX
Cyber Security # Lec 3
PPTX
SNIA2015 - Solo, Indonesia - Sarwono sutikno + yoko acc Cybersecurity Risk a...
Certified Information Systems Security Professional (cissp) Domain “access co...
What is penetration testing and why is it important for a business to invest ...
Security architecture, engineering and operations
Database Threats - Information System Security
Layered Approach - Information Security Recommendations
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Information security principles
002.itsecurity bcp v1
Security Policy Checklist
Understanding security operation.pptx
Skills that make network security training easy
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Malware detection how to spot infections early with alien vault usm
Isl awareness training
Ics & computer security for nuclear facilities
Overview
Logging, monitoring and auditing
Network Security Risk
Cyber Security # Lec 3
SNIA2015 - Solo, Indonesia - Sarwono sutikno + yoko acc Cybersecurity Risk a...
Ad

Similar to M.Florence Dayana/Cryptography and Network security (20)

PDF
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
PPTX
Chapter- I introduction
PDF
Chapter-I introduction
PPT
ch01_nemo-Pendahuluan.ppt
PPT
ch01_overview_bywillialmstallings_nemo.ppt
PPT
ch01_overview_nemo cryptography concepts.ppt
PPT
ch01_overview.ppt
PPT
ch01_overview.ppt
PPT
ch01_overview_nemo.ppt
PPT
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
PPT
ch01_overview_nemo.ppt
PPT
ch01_overview_nemo.ppt
PPT
ch1-1.ppt
PPTX
CH01-CompSec4e.pptx
PPTX
1. Introduction to Information Security.pptx
PPTX
Introduction to Computer Security
PDF
Information Security in term of computer science
PDF
IS-Intro.pdf
PPTX
02 fundamental aspects of security
PPTX
IT.pptx
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
Chapter- I introduction
Chapter-I introduction
ch01_nemo-Pendahuluan.ppt
ch01_overview_bywillialmstallings_nemo.ppt
ch01_overview_nemo cryptography concepts.ppt
ch01_overview.ppt
ch01_overview.ppt
ch01_overview_nemo.ppt
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo.ppt
ch01_overview_nemo.ppt
ch1-1.ppt
CH01-CompSec4e.pptx
1. Introduction to Information Security.pptx
Introduction to Computer Security
Information Security in term of computer science
IS-Intro.pdf
02 fundamental aspects of security
IT.pptx
Ad

More from Dr.Florence Dayana (20)

PDF
Dr.M.Florence Dayana-Cloud Computing Architecture.pdf
PDF
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
PDF
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
PPTX
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
PDF
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
PDF
M.FLORENCE DAYANA/electronic mail security.pdf
PDF
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
PPTX
Professional English - Reading
PPTX
Professional English - Speaking
PPTX
Professional English - Listening
PDF
INPUT AND OUTPUT DEVICES.pdf
PPTX
NETWORK SECURITY-SET.pptx
PPTX
Network Security- Secure Socket Layer
PPT
M.florence dayana dream weaver
PDF
M.florence dayana computer networks transport layer
PDF
M.Florence Dayana Computer Networks Types
PDF
M.Florence Dayana Computer Networks Introduction
PPTX
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
PDF
M.Florence Dayana
PPT
M.Florence Dayana / Basics of C Language
Dr.M.Florence Dayana-Cloud Computing Architecture.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
Professional English - Reading
Professional English - Speaking
Professional English - Listening
INPUT AND OUTPUT DEVICES.pdf
NETWORK SECURITY-SET.pptx
Network Security- Secure Socket Layer
M.florence dayana dream weaver
M.florence dayana computer networks transport layer
M.Florence Dayana Computer Networks Types
M.Florence Dayana Computer Networks Introduction
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M.Florence Dayana
M.Florence Dayana / Basics of C Language

Recently uploaded (20)

PDF
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
PPTX
NOI Hackathon - Summer Edition - GreenThumber.pptx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Software Engineering BSC DS UNIT 1 .pptx
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
PDF
Types of Literary Text: Poetry and Prose
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PDF
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
PDF
Module 3: Health Systems Tutorial Slides S2 2025
PDF
Cell Biology Basics: Cell Theory, Structure, Types, and Organelles | BS Level...
PPTX
Skill Development Program For Physiotherapy Students by SRY.pptx
PDF
LDMMIA Reiki Yoga S2 L3 Vod Sample Preview
PDF
What Is Coercive Control? Understanding and Recognizing Hidden Abuse
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
PPTX
Congenital Hypothyroidism pptx
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
PPTX
How to Manage Global Discount in Odoo 18 POS
PDF
Sunset Boulevard Student Revision Booklet
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
NOI Hackathon - Summer Edition - GreenThumber.pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Software Engineering BSC DS UNIT 1 .pptx
The Final Stretch: How to Release a Game and Not Die in the Process.
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
Types of Literary Text: Poetry and Prose
Open Quiz Monsoon Mind Game Prelims.pptx
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
Module 3: Health Systems Tutorial Slides S2 2025
Cell Biology Basics: Cell Theory, Structure, Types, and Organelles | BS Level...
Skill Development Program For Physiotherapy Students by SRY.pptx
LDMMIA Reiki Yoga S2 L3 Vod Sample Preview
What Is Coercive Control? Understanding and Recognizing Hidden Abuse
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
Congenital Hypothyroidism pptx
Cardiovascular Pharmacology for pharmacy students.pptx
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
How to Manage Global Discount in Odoo 18 POS
Sunset Boulevard Student Revision Booklet

M.Florence Dayana/Cryptography and Network security

  • 1. Name of the Staff : M.FLORENCE DAYANA Head, Dept. of CA Bon Secours College For Women Thanjavur. Cryptography and Network Security
  • 2. Principles of Information Security, 5th Edition 2  The quality or state of being secure—to be free from danger”  A successful organization should have multiple layers of security in place:  Physical security  Personal security  Operations security  Communications security  Network security  Information security What is Security
  • 3.  Plaintext – Original Message  Ciphertext – Coded Message  Cipher – Algorithm for transforming plaintext to ciphertext  Key – Information used in cipher known only to sender / receiver  Encipher (encrypt) – Converting plaintext to ciphertext  Decipher(decrypt) – Converting ciphertext to plaintext  Cryptography – Study of encryption principles/ methods  Cryptanalysis (Code breaking) – Study of principles / methods of deciphering ciphertext without knowing key  Cryptology – Field of both cryptography and cryptanalysis Some Basic Terminologies
  • 4.  The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) Computer Security
  • 5.  Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers  Network Security - measures to protect data during their transmission  Internet Security - measures to protect data during their transmission over a collection of interconnected networks Definitions
  • 6. Principles of Information Security, 5th Edition 6  The value of information comes from the characteristics it possesses:  Availability  Accuracy  Authenticity  Confidentiality  Integrity  Utility  Possession Critical Characteristics of Information
  • 7.  The principles of access control determines who should be able to access what.  Access control specifies and controls who can access what.  Eg: User X can write to file P, but can only update files R and S Access Control
  • 9.  can define 3 levels of impact from a security breach  Low  Moderate  High Levels of Impact
  • 10.  The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.  A limited adverse effect means that, for example, the loss of confidentiality, integrity, or availability might  (i) cause a degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced;  (ii) result in minor damage to organizational assets;  (iii) result in minor financial loss; or  (iv) result in minor harm to individuals. Low Impact
  • 11.  The loss could be expected to have a serious adverse effect on organizational operations, assets, or individuals.  A serious adverse effect means that, e.g., the loss might  (i) cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced;  (ii) result in significant damage to organizational assets;  (iii) result in significant financial loss; or  (iv) result in significant harm to individuals that does not involve loss of life or serious, life-threatening injuries. Moderate Impact
  • 12.  The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.  A severe or catastrophic adverse effect means that, for example, the loss might  (i) cause a severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions;  (ii) result in major damage to organizational assets;  (iii) result in major financial loss; or  (iv) result in severe or catastrophic harm to individuals involving loss of life or serious life threatening injuries. High Impact
  • 13.  confidentiality – student grades  integrity – patient information  availability – authentication service  authenticity – admission ticket  non-repudiation – stock sell order Examples of Security Requirements
  • 14.  Confidentiality (privacy)  Authentication (who created or sent the data)  Integrity (has not been altered)  Non-repudiation (the order is final)  Access control (prevent misuse of resources)  Availability (permanence, non-erasure)  Denial of Service Attacks  Virus that deletes files Security Services
  • 15. 1. not simple – easy to get it wrong 2. must consider potential attacks 3. procedures used counter-intuitive 4. involve algorithms and secret info 5. must decide where to deploy mechanisms 6. battle of wits between attacker / admin 7. not perceived to be of benefit until it fails 8. requires regular monitoring a process, not an event Computer Security Challenges
  • 16.  consider 3 aspects of information security:  security attack  security mechanism (control)  security service  note terms  threat – a potential for violation of security  vulnerability – a way by which loss can happen  attack – an assault on system security, a deliberate attempt to evade security services Aspects of Security
  • 17. Attacks, Services and Mechanisms  Security Attack: Any action that compromises the security of information.  Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.  Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.
  • 18. Passive Attack - Interception
  • 19. Observe traffic pattern Passive Attack: Traffic Analysis
  • 20. Block delivery of message Active Attack: Interruption
  • 24.  Passive attacks – focus on Prevention • Easy to stop • Hard to detect  Active attacks – focus on Detection and Recovery • Hard to stop • Easy to detect Handling Attacks
  • 25.  a.k.a. control  feature designed to detect, prevent, or recover from a security attack  no single mechanism that will support all services required  however one particular element underlies many of the security mechanisms in use:  cryptographic techniques  hence our focus on this topic Security Mechanism
  • 26. Model for Network Security
  • 27.  using this model requires us to: 1. design a suitable algorithm for the security transformation 2. generate the secret information (keys) used by the algorithm 3. develop methods to distribute and share the secret information 4. specify a protocol enabling the principals to use the transformation and secret information for a security service Model for Network Security
  • 28. Model for Network Access Security
  • 29. Model for Network Access Security  using this model requires us to: 1. select appropriate gatekeeper functions to identify users 2. implement security controls to ensure only authorised users access designated information or resources  note that model does not include: 1. monitoring of system for successful penetration 2. monitoring of authorized users for misuse 3. audit logging for forensic uses, etc. Model for Network Access Security