This document discusses network security and cryptography. It begins by defining a network and common network threats. It then discusses network security, including transit and traffic security. It covers problems and attacks like secrecy, authentication, and integrity control. The document introduces cryptography and its use in encryption and decryption to securely transmit data. It describes algorithms like RSA, substitution ciphers, and transposition ciphers. It also covers advantages and disadvantages of cryptography along with a proposed concept to strengthen encryption security.