SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
SECURE
COMMUNICATION
Anita Maharjan
Basanta kadel
Bhoj Raj Kafle
Bijay Raj Paudel
INTRODUCTION
 as we know in a network system, it is not possible that single user enjoy the
whole system all alone.
 because networking is used by most sector like
banking,entertainment, commercial,educational,etc.
what we think of networking and what
we want is
NETWORK SYSTEM
BUT ACTUALLY!!
Bankers
entertainer
educator
we Hacker
s!!
Secure communication in Networking
Secure communication in Networking
Secure communication in Networking
What is network security?
 network security refers to any activities designed to protect your network.
 Specifically, these activities protect the usability, reliability, integrity, and
safety of your network and data.
 Effective network security targets a variety of threats and stops them from
entering or spreading on your network.
 So, secure communication refers to a communication in secure
network whereby only the recipient of the message understands the
message, even if there are intruders who may intercept, read and perform
computations on whatever is being transmitted.
Properties of Secure
Communication in
Networking
Confidentiality
 Only the sender and the receiver should be able to understand the contents of the
transmitted message. B
 Because of intruders(eavesdropper), i.e. hackers, the message maybe encrypted (its data
disguised) so that the interceptor cannot understand the message.
Attack at
9pm.
12383084
093.
$h34#88
123830
84093.
$h34#8
8
Attack
at
9pm.
Move
Move
Authentication
 Process of providing identity
 Can be classified into three main categories:
 what do you know,
 what do you have and
 what you are
Username and Password
 User to access the information is provided with unique
user ID and password
 Can be for users and for computers that share data
 Based on what you know
Tokens
 Tokens are the security device that authenticates the
user by having the appropriate permissions embedded
into the token itself
 Token can be cards, RF ID tags etc.
 Based on what you have
Biometrics
 Uses the person’s unique character to authenticate them
 Based on what you are.
 Human characteristics that can be used for identification
includes:
 Fingerprint
 Hand
 Retina
 Face
 Voice, etc
Message integrity and nonrepudiation
 Even if the sender and receiver are able to authenticate each other, they also want to
ensure that the content of their communication is not altered, either maliciously or by
accident during transmission.
 Therefore message integrity can be ensured by extensions to the checksumming
techniques that we encounter in reliable transport and data link protocols.
The most common approach is to use
 a one-way hash function that combines all the bytes in the message with a secret key
and produces a message digest that is impossible to reverse.
 So the thing that will give the sender and the receiver the assurance,
 of untampered data is also a small fixed length data called MAC(Message
authentication code).
How to generate a MAC(Message Authentication Code)?
 Hash function is one of the method, that can be used to generate a message
authentication code.
 This is done with the help of a generating a hash value of secret key & and a message to
be authenticated.
 The message to be authenticated, can be of any length. But the output of the hash
function done on the message, will be of fixed length.
 this generated MAC, will also confirm the authenticity, because only the person that has
the secret key can open that MAC value for verifying the data(as mentioned before the
MAC is generated with the secret key value).
 As mentioned, the sender and the receiver will negotiate a secret key, before beginning
the communication. This is similar to symmetric encryption, where same keys are used to
decrypt at both the ends.
Secure communication in Networking
30873.
98
890
critical case like in banking..
transfer
$100 to
account
no.12399
transfer
$1000
to
account
no.
12399
Availability and access control
 The compelling need for network security has been made unbearable
over the past several years by numerous denial-of-access attacks that
have rendered a network host or other pieces of network infrastructure
unusable by legitimate users.
 The notion of access control ensures that entities seeking to gain access to
resources are allowed to do so only if they have the appropriate access
rights and perform their accesses in a well-defined manner
studen
t
identit
y
card
only acess
to external information
like school
programs,information
about courses,etc
acess to all
information, int
ernal as well a
external
princip
al
identity
card
Network Security
How are the Principles Implemented?
Layering
Passwords
Antivirus Softwares
Network Policies
Door Locks
Information
Limiting
 Limiting access to information reduces threat
 Only those who must use data should have access to it.
 The amount of access granted to someone must should
be limited to what the person needs to know or do.
Limiting Example
Obscurity
 Obscuring what goes on inside a system or organization
and avoiding clear patterns of behavior makes access
from outside difficult.
Simplicity
 Complex security system can be difficult to
understand, troubleshoot and feel secure about
 The aim is to make the system simple from inside and
complex from the outside
Authentication
 Process of providing identity
 Can be classified into three main categories:
 what do you know (Username and Password),
 what do you have(tokens, card)
 what you are(biometrics)
In Summary
Properties of Secure Communication:
Confidentiality
Authentication
Message Integrity
Access Control
THANK YOU

Contenu connexe

Tendances

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Network security
Network securityNetwork security
Network securitytoamma
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 
Protection models
Protection modelsProtection models
Protection modelsG Prachi
 

Tendances (20)

Data encryption
Data encryptionData encryption
Data encryption
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Email security
Email securityEmail security
Email security
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Web Security
Web SecurityWeb Security
Web Security
 
SSL
SSLSSL
SSL
 
Network security
Network securityNetwork security
Network security
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
User authentication
User authenticationUser authentication
User authentication
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Protection models
Protection modelsProtection models
Protection models
 

En vedette

Secure Communication
Secure CommunicationSecure Communication
Secure CommunicationKoen Van Impe
 
wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013wolfSSL
 
Secure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSSecure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSwolfSSL
 
MISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISPMISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISPKoen Van Impe
 
Secure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETSecure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETAnkit Gupta
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 

En vedette (7)

Secure Communication
Secure CommunicationSecure Communication
Secure Communication
 
wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013
 
Secure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSSecure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLS
 
MISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISPMISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISP
 
Secure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETSecure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANET
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 

Similaire à Secure communication in Networking

Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security andIaetsd Iaetsd
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
A Chat Room Assignment For Teaching Network Security
A Chat Room Assignment For Teaching Network SecurityA Chat Room Assignment For Teaching Network Security
A Chat Room Assignment For Teaching Network SecuritySandra Long
 
Different Types Of Attacks
Different Types Of AttacksDifferent Types Of Attacks
Different Types Of AttacksKatie Fernandez
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Private Key Infrastructure Advantages And Disadvantages
Private Key Infrastructure Advantages And DisadvantagesPrivate Key Infrastructure Advantages And Disadvantages
Private Key Infrastructure Advantages And DisadvantagesAlison Hall
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Amit Fogla
 
Vantura Partners Case Study
Vantura Partners Case StudyVantura Partners Case Study
Vantura Partners Case StudyLucie Nicolas
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityShitiz Upreti
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCSantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCAbbyWhyte974
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security Tawhid Rahman
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Wireless Sensor Networks Is Growing Rapidly Over The Few...
Wireless Sensor Networks Is Growing Rapidly Over The Few...Wireless Sensor Networks Is Growing Rapidly Over The Few...
Wireless Sensor Networks Is Growing Rapidly Over The Few...Sasha Jones
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 

Similaire à Secure communication in Networking (20)

Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
A Chat Room Assignment For Teaching Network Security
A Chat Room Assignment For Teaching Network SecurityA Chat Room Assignment For Teaching Network Security
A Chat Room Assignment For Teaching Network Security
 
Different Types Of Attacks
Different Types Of AttacksDifferent Types Of Attacks
Different Types Of Attacks
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Phil Zimmerman Research Paper
Phil Zimmerman Research PaperPhil Zimmerman Research Paper
Phil Zimmerman Research Paper
 
Private Key Infrastructure Advantages And Disadvantages
Private Key Infrastructure Advantages And DisadvantagesPrivate Key Infrastructure Advantages And Disadvantages
Private Key Infrastructure Advantages And Disadvantages
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11
 
Vantura Partners Case Study
Vantura Partners Case StudyVantura Partners Case Study
Vantura Partners Case Study
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
XML Signature Essay
XML Signature EssayXML Signature Essay
XML Signature Essay
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Wireless Sensor Networks Is Growing Rapidly Over The Few...
Wireless Sensor Networks Is Growing Rapidly Over The Few...Wireless Sensor Networks Is Growing Rapidly Over The Few...
Wireless Sensor Networks Is Growing Rapidly Over The Few...
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 

Dernier

Advanced Additive Manufacturing by Sumanth A.pptx
Advanced Additive Manufacturing by Sumanth A.pptxAdvanced Additive Manufacturing by Sumanth A.pptx
Advanced Additive Manufacturing by Sumanth A.pptxSumanth A
 
PhD summary of Luuk Brederode, presented at 2023-10-17 to Veitch Lister Consu...
PhD summary of Luuk Brederode, presented at 2023-10-17 to Veitch Lister Consu...PhD summary of Luuk Brederode, presented at 2023-10-17 to Veitch Lister Consu...
PhD summary of Luuk Brederode, presented at 2023-10-17 to Veitch Lister Consu...Luuk Brederode
 
pulse modulation technique (Pulse code modulation).pptx
pulse modulation technique (Pulse code modulation).pptxpulse modulation technique (Pulse code modulation).pptx
pulse modulation technique (Pulse code modulation).pptxNishanth Asmi
 
Final PPT.ppt about human detection and counting
Final PPT.ppt  about human detection and countingFinal PPT.ppt  about human detection and counting
Final PPT.ppt about human detection and countingArbazAhmad25
 
Injection Power Cycle - The most efficient power cycle
Injection Power Cycle - The most efficient power cycleInjection Power Cycle - The most efficient power cycle
Injection Power Cycle - The most efficient power cyclemarijomiljkovic1
 
عناصر نباتية PDF.pdfbotanical elements..
عناصر نباتية PDF.pdfbotanical elements..عناصر نباتية PDF.pdfbotanical elements..
عناصر نباتية PDF.pdfbotanical elements..mennamohamed200y
 
The Journey of Process Safety Management: Past, Present, and Future Trends
The Journey of Process Safety Management: Past, Present, and Future TrendsThe Journey of Process Safety Management: Past, Present, and Future Trends
The Journey of Process Safety Management: Past, Present, and Future Trendssoginsider
 
Navigating Process Safety through Automation and Digitalization in the Oil an...
Navigating Process Safety through Automation and Digitalization in the Oil an...Navigating Process Safety through Automation and Digitalization in the Oil an...
Navigating Process Safety through Automation and Digitalization in the Oil an...soginsider
 
Flutter GDE session GDSC ZHCET AMU, aligarh
Flutter GDE session GDSC ZHCET AMU, aligarhFlutter GDE session GDSC ZHCET AMU, aligarh
Flutter GDE session GDSC ZHCET AMU, aligarhjamesbond00714
 
Field Report on present condition of Ward 1 and Ward 2 of Pabna Municipality
Field Report on present condition of Ward 1 and Ward 2 of Pabna MunicipalityField Report on present condition of Ward 1 and Ward 2 of Pabna Municipality
Field Report on present condition of Ward 1 and Ward 2 of Pabna MunicipalityMorshed Ahmed Rahath
 
Tekom Netherlands | The evolving landscape of Simplified Technical English b...
Tekom Netherlands | The evolving landscape of Simplified Technical English  b...Tekom Netherlands | The evolving landscape of Simplified Technical English  b...
Tekom Netherlands | The evolving landscape of Simplified Technical English b...Shumin Chen
 
EJECTOR REFRIGERATION CYCLE WITH THE INJECTION OF A HIGH DENSITY FLUID INTO A...
EJECTOR REFRIGERATION CYCLE WITH THE INJECTION OF A HIGH DENSITY FLUID INTO A...EJECTOR REFRIGERATION CYCLE WITH THE INJECTION OF A HIGH DENSITY FLUID INTO A...
EJECTOR REFRIGERATION CYCLE WITH THE INJECTION OF A HIGH DENSITY FLUID INTO A...marijomiljkovic1
 
Investigating the Efficiency of Drinking Water Treatment Sludge and Iron-Base...
Investigating the Efficiency of Drinking Water Treatment Sludge and Iron-Base...Investigating the Efficiency of Drinking Water Treatment Sludge and Iron-Base...
Investigating the Efficiency of Drinking Water Treatment Sludge and Iron-Base...J. Agricultural Machinery
 
Research paper publications: Meaning of Q1 Q2 Q3 Q4 Journal
Research paper publications: Meaning of Q1 Q2 Q3 Q4 JournalResearch paper publications: Meaning of Q1 Q2 Q3 Q4 Journal
Research paper publications: Meaning of Q1 Q2 Q3 Q4 JournalDr. Manjunatha. P
 
Road to GDSC (Become the next GDSC lead)
Road to GDSC (Become the next GDSC lead)Road to GDSC (Become the next GDSC lead)
Road to GDSC (Become the next GDSC lead)GDSCNiT
 
Evaluation Methods for Social XR Experiences
Evaluation Methods for Social XR ExperiencesEvaluation Methods for Social XR Experiences
Evaluation Methods for Social XR ExperiencesMark Billinghurst
 
Caltrans District 8 Update for the CalAPA Spring Asphalt Conference 2024
Caltrans District 8 Update for the CalAPA Spring Asphalt Conference 2024Caltrans District 8 Update for the CalAPA Spring Asphalt Conference 2024
Caltrans District 8 Update for the CalAPA Spring Asphalt Conference 2024California Asphalt Pavement Association
 
First Review Group 1 PPT.pptx with slide
First Review Group 1 PPT.pptx with slideFirst Review Group 1 PPT.pptx with slide
First Review Group 1 PPT.pptx with slideMonika860882
 
introduction to python, fundamentals and basics
introduction to python, fundamentals and basicsintroduction to python, fundamentals and basics
introduction to python, fundamentals and basicsKNaveenKumarECE
 

Dernier (20)

Advanced Additive Manufacturing by Sumanth A.pptx
Advanced Additive Manufacturing by Sumanth A.pptxAdvanced Additive Manufacturing by Sumanth A.pptx
Advanced Additive Manufacturing by Sumanth A.pptx
 
PhD summary of Luuk Brederode, presented at 2023-10-17 to Veitch Lister Consu...
PhD summary of Luuk Brederode, presented at 2023-10-17 to Veitch Lister Consu...PhD summary of Luuk Brederode, presented at 2023-10-17 to Veitch Lister Consu...
PhD summary of Luuk Brederode, presented at 2023-10-17 to Veitch Lister Consu...
 
pulse modulation technique (Pulse code modulation).pptx
pulse modulation technique (Pulse code modulation).pptxpulse modulation technique (Pulse code modulation).pptx
pulse modulation technique (Pulse code modulation).pptx
 
Final PPT.ppt about human detection and counting
Final PPT.ppt  about human detection and countingFinal PPT.ppt  about human detection and counting
Final PPT.ppt about human detection and counting
 
Injection Power Cycle - The most efficient power cycle
Injection Power Cycle - The most efficient power cycleInjection Power Cycle - The most efficient power cycle
Injection Power Cycle - The most efficient power cycle
 
عناصر نباتية PDF.pdfbotanical elements..
عناصر نباتية PDF.pdfbotanical elements..عناصر نباتية PDF.pdfbotanical elements..
عناصر نباتية PDF.pdfbotanical elements..
 
The Journey of Process Safety Management: Past, Present, and Future Trends
The Journey of Process Safety Management: Past, Present, and Future TrendsThe Journey of Process Safety Management: Past, Present, and Future Trends
The Journey of Process Safety Management: Past, Present, and Future Trends
 
Navigating Process Safety through Automation and Digitalization in the Oil an...
Navigating Process Safety through Automation and Digitalization in the Oil an...Navigating Process Safety through Automation and Digitalization in the Oil an...
Navigating Process Safety through Automation and Digitalization in the Oil an...
 
Flutter GDE session GDSC ZHCET AMU, aligarh
Flutter GDE session GDSC ZHCET AMU, aligarhFlutter GDE session GDSC ZHCET AMU, aligarh
Flutter GDE session GDSC ZHCET AMU, aligarh
 
Field Report on present condition of Ward 1 and Ward 2 of Pabna Municipality
Field Report on present condition of Ward 1 and Ward 2 of Pabna MunicipalityField Report on present condition of Ward 1 and Ward 2 of Pabna Municipality
Field Report on present condition of Ward 1 and Ward 2 of Pabna Municipality
 
Tekom Netherlands | The evolving landscape of Simplified Technical English b...
Tekom Netherlands | The evolving landscape of Simplified Technical English  b...Tekom Netherlands | The evolving landscape of Simplified Technical English  b...
Tekom Netherlands | The evolving landscape of Simplified Technical English b...
 
EJECTOR REFRIGERATION CYCLE WITH THE INJECTION OF A HIGH DENSITY FLUID INTO A...
EJECTOR REFRIGERATION CYCLE WITH THE INJECTION OF A HIGH DENSITY FLUID INTO A...EJECTOR REFRIGERATION CYCLE WITH THE INJECTION OF A HIGH DENSITY FLUID INTO A...
EJECTOR REFRIGERATION CYCLE WITH THE INJECTION OF A HIGH DENSITY FLUID INTO A...
 
Caltrans view on recycling of in-place asphalt pavements
Caltrans view on recycling of in-place asphalt pavementsCaltrans view on recycling of in-place asphalt pavements
Caltrans view on recycling of in-place asphalt pavements
 
Investigating the Efficiency of Drinking Water Treatment Sludge and Iron-Base...
Investigating the Efficiency of Drinking Water Treatment Sludge and Iron-Base...Investigating the Efficiency of Drinking Water Treatment Sludge and Iron-Base...
Investigating the Efficiency of Drinking Water Treatment Sludge and Iron-Base...
 
Research paper publications: Meaning of Q1 Q2 Q3 Q4 Journal
Research paper publications: Meaning of Q1 Q2 Q3 Q4 JournalResearch paper publications: Meaning of Q1 Q2 Q3 Q4 Journal
Research paper publications: Meaning of Q1 Q2 Q3 Q4 Journal
 
Road to GDSC (Become the next GDSC lead)
Road to GDSC (Become the next GDSC lead)Road to GDSC (Become the next GDSC lead)
Road to GDSC (Become the next GDSC lead)
 
Evaluation Methods for Social XR Experiences
Evaluation Methods for Social XR ExperiencesEvaluation Methods for Social XR Experiences
Evaluation Methods for Social XR Experiences
 
Caltrans District 8 Update for the CalAPA Spring Asphalt Conference 2024
Caltrans District 8 Update for the CalAPA Spring Asphalt Conference 2024Caltrans District 8 Update for the CalAPA Spring Asphalt Conference 2024
Caltrans District 8 Update for the CalAPA Spring Asphalt Conference 2024
 
First Review Group 1 PPT.pptx with slide
First Review Group 1 PPT.pptx with slideFirst Review Group 1 PPT.pptx with slide
First Review Group 1 PPT.pptx with slide
 
introduction to python, fundamentals and basics
introduction to python, fundamentals and basicsintroduction to python, fundamentals and basics
introduction to python, fundamentals and basics
 

Secure communication in Networking

  • 2. INTRODUCTION  as we know in a network system, it is not possible that single user enjoy the whole system all alone.  because networking is used by most sector like banking,entertainment, commercial,educational,etc.
  • 3. what we think of networking and what we want is NETWORK SYSTEM
  • 8. What is network security?  network security refers to any activities designed to protect your network.  Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data.  Effective network security targets a variety of threats and stops them from entering or spreading on your network.  So, secure communication refers to a communication in secure network whereby only the recipient of the message understands the message, even if there are intruders who may intercept, read and perform computations on whatever is being transmitted.
  • 10. Confidentiality  Only the sender and the receiver should be able to understand the contents of the transmitted message. B  Because of intruders(eavesdropper), i.e. hackers, the message maybe encrypted (its data disguised) so that the interceptor cannot understand the message.
  • 12. Authentication  Process of providing identity  Can be classified into three main categories:  what do you know,  what do you have and  what you are
  • 13. Username and Password  User to access the information is provided with unique user ID and password  Can be for users and for computers that share data  Based on what you know
  • 14. Tokens  Tokens are the security device that authenticates the user by having the appropriate permissions embedded into the token itself  Token can be cards, RF ID tags etc.  Based on what you have
  • 15. Biometrics  Uses the person’s unique character to authenticate them  Based on what you are.  Human characteristics that can be used for identification includes:  Fingerprint  Hand  Retina  Face  Voice, etc
  • 16. Message integrity and nonrepudiation  Even if the sender and receiver are able to authenticate each other, they also want to ensure that the content of their communication is not altered, either maliciously or by accident during transmission.  Therefore message integrity can be ensured by extensions to the checksumming techniques that we encounter in reliable transport and data link protocols. The most common approach is to use  a one-way hash function that combines all the bytes in the message with a secret key and produces a message digest that is impossible to reverse.  So the thing that will give the sender and the receiver the assurance,  of untampered data is also a small fixed length data called MAC(Message authentication code).
  • 17. How to generate a MAC(Message Authentication Code)?  Hash function is one of the method, that can be used to generate a message authentication code.  This is done with the help of a generating a hash value of secret key & and a message to be authenticated.  The message to be authenticated, can be of any length. But the output of the hash function done on the message, will be of fixed length.  this generated MAC, will also confirm the authenticity, because only the person that has the secret key can open that MAC value for verifying the data(as mentioned before the MAC is generated with the secret key value).  As mentioned, the sender and the receiver will negotiate a secret key, before beginning the communication. This is similar to symmetric encryption, where same keys are used to decrypt at both the ends.
  • 20. critical case like in banking.. transfer $100 to account no.12399 transfer $1000 to account no. 12399
  • 21. Availability and access control  The compelling need for network security has been made unbearable over the past several years by numerous denial-of-access attacks that have rendered a network host or other pieces of network infrastructure unusable by legitimate users.  The notion of access control ensures that entities seeking to gain access to resources are allowed to do so only if they have the appropriate access rights and perform their accesses in a well-defined manner
  • 22. studen t identit y card only acess to external information like school programs,information about courses,etc acess to all information, int ernal as well a external princip al identity card
  • 23. Network Security How are the Principles Implemented?
  • 25. Limiting  Limiting access to information reduces threat  Only those who must use data should have access to it.  The amount of access granted to someone must should be limited to what the person needs to know or do.
  • 27. Obscurity  Obscuring what goes on inside a system or organization and avoiding clear patterns of behavior makes access from outside difficult.
  • 28. Simplicity  Complex security system can be difficult to understand, troubleshoot and feel secure about  The aim is to make the system simple from inside and complex from the outside
  • 29. Authentication  Process of providing identity  Can be classified into three main categories:  what do you know (Username and Password),  what do you have(tokens, card)  what you are(biometrics)
  • 30. In Summary Properties of Secure Communication: Confidentiality Authentication Message Integrity Access Control