Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

download Documentation and Slides at

Published in: Education, Technology
  • Login to see the comments


  1. 1. Network Security& Cryptography by D.Swathi(07631A0557) M.Tejaswi(07631A0558 )
  2. 2. Computer security is the process of preventing and detecting unauthorized use of your computer Prevention help to stop unauthorized users from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system.
  3. 4. PASS WORD SECURITY <ul><li>M ust contain 8 characters, at least 5 uppercase letters or 5 lowercase letters </li></ul><ul><li>Should contain at least 2 numbers </li></ul><ul><li>Should contain at least 1 special characters </li></ul><ul><li>Password Protection Guidelines: </li></ul><ul><li>Passwords gain access to a company systems should not used as passwords to access non-company accounts </li></ul><ul><li>If an employee knows his/her password has been compromised, it must be reported to the IT department and the password changed immediately. </li></ul>
  4. 5. E-mail Security <ul><li>Anti viruses software is the foundation of E-mail security </li></ul>Exchange Server Mail staging Anti Virus Scan (1) Anti Virus Scan (2) Some attachments removed . Outlook Client Anti-Virus Scan (3) Some attachments removed .
  5. 6. E-mail Protection <ul><li>E-mail “spoofing” :Is when an email message appears to have originated from one source when it actually was sent from another source </li></ul><ul><li>If you suspect that you may have received a spoofed email ,you should contact your service provider’s </li></ul><ul><li>E-mail borne viruses : </li></ul><ul><li>Viruses and other types malicious code are often spread as attachments to email messages </li></ul>
  6. 7. Evolving Threat Environment <ul><li>Blended Threats : Blended threats are increasingly design to get past point-solution security and target multiple vulnerabilities in clients and corporate networks. </li></ul><ul><li>Phasing attacks : The recent attacks of phasing attacks on banks and their online customers have opened both consumer and corporate eyes to the increasing dangers of corporate identity theft. </li></ul>
  7. 8. Cryptography <ul><li>Cryptography is a science of using mathematics to encrypt and decrypt the data. </li></ul><ul><li>Crptanalysis is the science of analyzing and breaking secure communication. </li></ul><ul><li>Both Cryptography and Cryptanalysis comes under Cryptology. </li></ul><ul><li>The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key. </li></ul>
  8. 9. Encryption and Decryption <ul><li>Encryption: The method of disguising plaintext in such a way as to hide its its substance. </li></ul><ul><li>Decryption: The process of reverting cipher text to its plain text. </li></ul>
  9. 10. Conventional Cryptography <ul><li>In this, one key is used both for encryption and decryption. </li></ul><ul><li>Caeser’s cipher: It is an example of conventional cryptography. It substitutes one piece of information of another. </li></ul><ul><li>Ex: Plain text: ABCDEFGHIJKLMNOPQRSTUVWXYZ </li></ul><ul><li>Cipher text: DEFGHIJKLMNOPQRSTUVWXYZABC. </li></ul>
  10. 11. Key Management And Conventional Encryption
  11. 12. Public Key Cryptography <ul><li>It is an asymmentric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private key for decryption. </li></ul><ul><li>Benefit: It allows people who have no preexisting security arrangement to exchange messages securely. </li></ul><ul><li>Anyone having public key can encrypt the data but cannot decrypt. </li></ul>
  12. 13. PGP <ul><li>It combines some of the best features of both conventional and public key cryptography. </li></ul>
  13. 14. Conclusion <ul><li>Security is every bodies business and only with everyone’s cooperation,an intelligent policy and consistent practices, will it be achievable. </li></ul><ul><li>References: </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>J.N.T.U website </li></ul><ul><li>Digit magazine </li></ul>
  14. 15. Thank you..
  15. 16. Queries ..?