data encryption-ciphers
TRANSCRIPT
Network Security
SECURITY to prevent unauthorized interceptors from accessing data
NETWORK any set of interlinking components resembling a net
Need for Network Security
Theft and misuse of confidential business information… Malicious attacks from Internet- borne viruses… Illegal Data Modification
To prevent..,
Who is vulnerable….?Financial institutions and banksInternet service providersGovernment and defense agenciesContractors to various government agenciesMultinational corporationsANYONE ON THE NETWORK
Means of Protection
Firewalls Strong passwords Suitable Antivirus
software etc..,
Of them , one of the essential aspect for secure data transfer
is “cryptography”
Principles of CryptographyEncryption transforms a message that it becomes unintelligible to any one who does not have the key.
Decryption transforms a message into original message to any one who have the key.
cipher The transformation represented by an encryption function and its corresponding decryption function is called a cipher.
Types of ciphers
Symmetric Key Ciphers
Public Key Ciphers
Symmetric Key Ciphers
Public Key Ciphers
ADVANTAGES
Protects against internal and external network attacks
Ensures privacy of all communications, at any place at any time.
Makes you more reliable.
Controls access to information by accurately identifying users and their systems.
ie.., the network security will be able to function as an immune system.
ATTACK AND BUILD ITSELF TO FIGHT AGAINST TOUGHER ENEMIES