23
Network Security Cryptography & Steganograpy By Nikh il

network security, cryptography,steganography

Embed Size (px)

DESCRIPTION

this will very useful for ppts were you have less time for presentation

Citation preview

Page 1: network security, cryptography,steganography

Network Security Cryptography & Steganograpy

By

Nikhil

Page 2: network security, cryptography,steganography

A Security History Of The WorldGoths,vandals,huns

Burglar by hacker

Page 3: network security, cryptography,steganography

Why do we need security?

Page 4: network security, cryptography,steganography

Introduction

●What is Network Security:

Network security define the protection, safe guarding of the computers in the network by using security tools.

Page 5: network security, cryptography,steganography

Who is vulnerable?

•Financial institutions and banks

•Internet service providers Government and Defense services

•Multinational corporations

ANYONE ON THE NETWORK

Page 6: network security, cryptography,steganography

Common security attacks and their

countermeasures

• Finding a way into the network– Firewalls

• TCP hijacking– IPSec

• Packet sniffing– Encryption (SSH, SSL, HTTPS)

Page 7: network security, cryptography,steganography

Firewalls

Page 8: network security, cryptography,steganography

TCP Attacks

• Say hello to sandy, Bob and Sam

Page 9: network security, cryptography,steganography

TCP Attacks• Sandy and Bob have an established TCP

connection

Page 10: network security, cryptography,steganography

TCP Attacks

• Sam lies on the path between Sandy and Bob on the network– He can intercept all of their packets

Page 11: network security, cryptography,steganography

TCP Attacks

• First, Sam must drop all of Sandy’s packets since they must not be delivered to Bob (why?)

Packets

The Void

Page 12: network security, cryptography,steganography

TCP Attacks

• How do we prevent this?

• IPSec– Provides source authentication, so Sam

cannot pretend to be Sandy– Encrypts data before transport, so Sam

cannot talk to Bob without knowing what the session key is :-

Page 13: network security, cryptography,steganography

Types of Secret Writing

Secret writing

Cryptography Steganography

Page 14: network security, cryptography,steganography

Cryptography“Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat.”

Sun Tzu 

Page 15: network security, cryptography,steganography

Cryptography

Page 16: network security, cryptography,steganography

example :-

Page 17: network security, cryptography,steganography

Benefits of Cryptographic Technologies

• Data secrecy

• Data integrity

• Authentication of message originator

• Electronic certification and digital signature

• Non-repudiation

Page 18: network security, cryptography,steganography

Potential Problems with Cryptographic Technologies?

• False sense of security if badly implemented

• Government regulation of cryptographic technologies/export restrictions

• Encryption prohibited in some countries

Page 19: network security, cryptography,steganography

Steganography

Page 20: network security, cryptography,steganography

•Steganography –covered writing – is an art of hiding information

•Popular contemporary Steganography technologies hide information in images

Page 21: network security, cryptography,steganography
Page 22: network security, cryptography,steganography

How Secure are Today’s

• Encryption does not guarantee security!• Many ways to beat a crypto system NOT

dependent on cryptanalysis, such as:– Viruses, worms, hackers, etc.– Unauthorized physical access to secret keys

• Cryptography is only one of the elements of comprehensive computer security• high overhead to hide relatively few info bits

Technologies

Page 23: network security, cryptography,steganography

Conclusion