Tempus Seminar Presentation
Tempus Seminar Presentation
Tempus Seminar Presentation
ON
NETWORK SECURITY AND
CRYPTOGRAPHY
PREPARED BY
BASSEY BASSEY TEMPUS
NOU211104255
SUBMITTED TO
DEPARTMENT OF INFORMATION
TECHNOLOGY
FACULTY OF SCIENCES
APRIL, 2024
Abstract
Popular networks:
UUCP: (Unix-to-Unix Copy) was originally
developed to connect UNIX hosts together.
Internet: The Internet is the world's largest
network of networks.
Services for security:
The services are intended to counter security attacks, and they make
use of one or more security mechanisms to provide the service.
Confidentiality: Ensure that the information in a computer system and
transmitted information are accessible only for reading by authorized
parties. This type of access includes printing displaying and other forms
of disclosure, including simply revealing the existence of an object.
Authentication: Ensure that the origin of a message or electronic
document is correctly with an assurance that the identity is not
false;
Integrity: Ensures that only authorized parties are able to modify
computer systems assets and transmitted information. Modification
includes writing, changing, changing status, deleting, creating and
delaying or replaying of transmitted messages.
Non-repudiation: Requires that neither the sender nor the receiver of a
message is able to deny the transmission.
Access control: Require that access to information resources may be
controlled by or for the target system.
Security threats
Categorization of these attacks is passive attacks and active
attacks.
Passive attacks: In this the goal of the attacker is to obtain
information that is being transmitted. Two types of passive attacks
are release of message contents and traffic analysis.
Active attacks:. These attacks involve some modification of the data
stream or the creation of false stream and can be sub divided into 4
categories: Masquerade, Replay, Modification of messages, and
denial of service.
Denial of service: DoS (Denial-of-Service) attacks are probably the
nastiest, and most difficult to address. Such attacks were fairly
common in late 1996 and early 1997, but are now becoming less
popular. Some things that can be done to reduce the risk of being
stung by a denial of service attack include
Not running your visible-to-the-world servers at a level too close to
capacity
Using packet filtering to prevent obviously forged packets from
entering into your network address space.
Keeping up-to-date on security-related patches for your hosts'
operating systems.
Unauthorized Access :
``Unauthorized access'' is a very high-level
term that can refer to a number of different
sorts of attacks. The goal of these attacks is to
access some resource that your machine should
not provide the attacker. These can take the
form of a virus, worm, or Trojan horse. One of
the most publicized threats to security is
intruder. Generally referred to as a hacker or
cracker, and some other threats are executing
commands illicitly, confidential breaches,
destructive behavior.
Where do the attacks come from? How, though,
does an attacker gain access to your
equipment? Through any connection that you
have to the outside world. This includes
Internet connections, dial-up modems, and
even physical access.
Preventing security disasters:
Hope you have backups
Encryption
Plain text ---------------------------------> cipher text
Public key
Private key