Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14
Network security and
cryptography
Lect. Engr. Mariam Naseem
Computer security
The generic name for the collection of tools
designed to protect data and to thwart hackers. Network security
It’s a measure to protect data during their
transmission. And it covers the use of cryptographic algorithms in network protocol and network application. Internet security
Measures to protect data during their
transmission over a collection of interconnected networks. Cryptology This is the study of technique for ensuring the secrecy and/or authenticity of information. The two main branches of cryptology are:
1.Cryptography, which is the study of the design of
such techniques 2.Cryptanalysis,which deals with the defeating such techniques, to recover information or forging information that will be accepted as authentic. OSI (open system interconnection)
OSI security architecture provides a
systematic framework for defining: -security attacks -security mechanism -security services OSI (open system interconnection)
OSI security architecture
Security Security Security
attacks mechanism services OSI security architecture
ITU-T2 X.800, security architecture for OSI,
defines such a systematic approach. The OSI security architecture is useful to managers as a way of organizing the task of providing security. Because this architecture was developed as an international standard, computer and services that relates to this structured definition of services and mechanisms. Security attacks Any action that compromises the security of the information owned by an organization Information security is about how to prevent from attacks or weakening that by detect the attacks on information-based system
NOTE: often threats & attacks means same.
Threats:
A potential for the violation of security,
which exist when there is a circumstances, capabilities, action or event that could breach security and cause harm. That is possible danger that might exploit a vulnerability. Attack
An assault on system security that devices
from an intelligent threat. Its an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system. Security Mechanism
A process that is designed to detect, prevent
or recover from a security attack. No single mechanism that will support all functions, however one particular element under lies many of the security mechanisms in use: Cryptographic technique Security Services
X.800 defines it as : a service provided a
protocol layer of communication open systems, which ensures adequate security of the systems or of data transfers. RFC 2828 defines it as: a processing or communication service provided by a system to give a specific kind of protection to system resources. THE END…