bridgecourse-CRYPTOGRAPHYANDNETWORKSECURITY.pptx

ShivakumarM3 8 views 32 slides Sep 02, 2024
Slide 1
Slide 1 of 32
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32

About This Presentation

COURSE CONTENTS AND DESCRIPTION


Slide Content

CAMBRIDGE INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING Bridge Course CRYPTOGRAPHY Prof. PREETHI S Dept. of ISE CiTech , Bengaluru Date : 15 th September 2022

AGENDA CYBER SECURITY CRYPTOGRAPHY FIREWALL

CYBER SECURITY The term cyber security is used to refer to the security offered through on-line services to protect your online information.

TO UNDERSTAND MEANING OF CYBER NEED OF CYBER SECURITY SECURITY PROBLEMS IN CYBER FIELD MAINTAIN SECURITY OF A CYBER FIELD

MEANING OF CYBER It is a combining form relating to information technology , the Internet and virtual reality.

NEED OF CYBER SECURITY It helps in securing data from threats such as data theft or misuse, also safeguard your system from viruses.

SECURITY PROBLEMS IN CYBER FIELD MAJOR SECURITY PROBLEMS Virus Hacker Malware Trojan Horses Password Cracking

VIRUS Virus is a program that is loaded onto your computer without your knowledge and runs against your wishes

SOLUTION

HACKERS Hacker is a person who breaks into computers, usually by gaining access to administrative controls.

TYPES OF HACKERS White Hat Hacker A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. Grey Hat Hacker Grey Hat Hacker refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker . Black Hat Hacker A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain"

MALWARE The word Malware comes from the term “ MAL ious soft WARE . ” Malware is any software that infects and damages a computer system without the owner’s knowledge or permission.

TROJAN HORSES Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.

PASS WORD CRACKING Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.

CRYPTOGRAPHY Cryptography is the science and art of transforming messages to make them secure and immune to attack.

BASIC TERMS PLAIN TEXT CIPHER TEXT CIPHER ENCRYPTION & DECRYPTION KEYS

FIREWALL Firewall is a program or hardware device that filters the information coming through the Internet connection into your private network or computer system.

HARDWARE FIREWALL VERSUS SOFTWARE FIREWALL Hardware firewalls are integrated into the router that sits between a computer and the Internet. Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not.

TYPES OF FIREWALLS PACKET FILTERING ROUTER

THANK YOU
Tags