You are on page 1of 19

NETWORK

SECURITY
Ms. Mousmi Pawar
OVERVIEW
1. Need for Security
2. Goals of Security
3. Famous Malwares and Phishing
4. Cryptography
NEED FOR SECURITY
GOALS OF SECURITY
Integrity
Confendtiality

Authentication

Non-Repudiation

Availability

Access Control
INTEGRITY

Transfer `1000 Ideal route of the message


To
B Protect the information INTEGRITY

This type of attack Modification


is called`1000
Transfer
To
C
Actual route of the message

X
CONFIDENTIALITY
Guarantee Data Confidentiality

This type of Attack is called Interception.

To:aaa@gmail.com
ATM pin is 9876

X
AUTHENTICATION

Absence of proper authentication is called Fabrication.

I am user A
Transfer `5000
to X

X
NON-REPUDIATION
Transfer
`1000
To
B

A
I never
requested to
transfer `1000
to B

A
AVAILABILITY & ACCESS CONTROL
This type of attack is called Interruption.

username:
aaa@gmail.com
Password: ********

Read
-----
-----
Read, Write -----
-----
-----
Read ----
FAMOUS MALWARES
Viruses
Worms

Trojan Horse
VIRUS
A virus is a piece of program code that attaches itself to
legitimate program code and runs when the legitimate
program runs.

Sum=a+b; Delete all files


Sum=a+b; Print sum; Send copy of myself
Print sum; Virus Code to all using users
End. End. address book.

Original Code
Virus code
Original Code
+ Virus code
WORM
A worm does not modify the program, instead it
replicates itself again and again. Resource eating
Resource and no destruction
eating and no
destruction Resource eating
Resource and no
eating and destruction
no
Resource Resource eating
destruction
eating and no and no
destruction destruction

Resource eating
and no destruction
TROJAN HORSE

It provides the attacker with unauthorized remote


access to a compromised computer, infects files and
damages the system, or steals user sensitive
information.

username:
aaa@gmail.com
Password: ********
Trojan Program

X
X
PHISHING
Attacker set up fake website which looks like real
website to obtain your details.
CRYPTOGRAPHY
Cryptography is the science of achieving security by
encoding messages to make them non-readable.
Encryption: The process of encoding plain text message
into cipher text message is called as encryption.
Decryption: the reverse process of transforming cipher
text to plain text is called decryption.
CRYPTOGRAPHY MECHANISM
Every Encryption and Decryption process has 2 aspects:
the algorithm and the key used for encryption.
Symmetric key Cryptography: If the same key is used for
encryption and decryption.(e.g. DES)
Asymmetric key Cryptography/Public Key
Cryptography: if two different keys are used for
encryption and decryption process(e.g. RSA)
REFERENCES
Cryptography and Network Security, Atul Kahate,
Tata McGraw Hill.
http://en.wikipedia.org/wiki/Cryptography.-

Wikipedia.
THANK YOU

You might also like