SlideShare une entreprise Scribd logo
1  sur  33
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
CYBERSECURITY
o Refers to every thing digital
o Requires the understanding
of how a network runs
o Refers to the art of hiding
and encrypting information
o Requires the understanding
of cryptography
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
01Packet Structure
05 Firewall
02Network Architecture
06 Symmetric Cryptography
03Addressing Method
04IP & Mac
07 Asymmetric Cryptography
NETWORK SECURITY
AGENDA
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Network Part
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Downloading a file?
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Packet of what?
Packet Header
Payload
Contains critical information regarding the
packet. The information includes things like
source address, destination address, type of
service, IP version information
Payload refers to the actual data being
contained in the packet. This could be anything
ranging from a media file, executables or even a
simple text file
Packet Trailer
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
IPv4 Packet Header
Version Header Length
Identification
Total Length
Flags Fragment Offset
Time to Live Protocol Header Checksum
Source IP Address
Destination IP Address
Options (if any)
DCSP ECN
Version no. of Internet
Protocol used (e.g. IPv4).
Length of entire IP headerDifferentiated Service Code Point;
This refers to the type of service
Explicit Congestion Notification;
Information about the congestion in
route Length of entire IP Packet
(including IP header and IP
Payload).
If IP packet is fragmented
during the transmission, all
the fragments contain same
identification number. to
identify original IP packet
they belong to.
As required by the network resources, if IP Packet is too large
to handle, these ‘flags’ tells if they can be fragmented or not
This offset tells the exact
position of the fragment in
the original IP Packet.To avoid looping in the
network, every packet is
sent with some TTL value
set, which tells the network
how many routers (hops)
this packet can cross
Tells the Network layer at
the destination host, to
which Protocol this packet
belongs to
This field is used to keep
checksum value of entire
header which is then used
to check if the packet is
received error-free.
32-bit address of the
Sender (or source) of the
packet.
32-bit address of the
Receiver (or destination) of
the packet.
This is optional field, which
is used if the value of IHL is
greater than 5. These
options may contain values
for options such as Security,
Record Route, Time Stamp,
etc.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
OSI Model
Application
Presentation
Session
Transport
Network
Datalink
Physical
This is where the user
application sits that
needs to transfer data
between or among hosts.
For example: HTTP, file
transfer application (FTP)
and electronic mail etc.
This layer helps to understand
data representation in one
form on a host to other host in
their native representation.
Data from the sender is
converted to on-the-wire data
(general standard format) and
at the receiver’s end it is
converted to the native
representation of the receiver.
This layer provides
session management
capabilities between
hosts. For example, if
some host needs a
password verification for
access and if credentials
are provided then for
that session password
verification does not
happen again. This layer
can assist in
synchronization, dialog
control and critical
operation management
(e.g., an online bank
transaction).
This layer provides end to end
data delivery among hosts.
This layer takes data from the
above layer and breaks it into
smaller units called Segments
and then gives it to the
Network layer for
transmission.
This layer helps to uniquely
identify hosts beyond the
subnets and defines the path
which the packets will follow
or be routed to reach the
destination.
This layer takes the raw
transmission data (signal,
pulses etc.) from the Physical
Layer and makes Data Frames,
and sends that to the upper
layer and vice versa. This layer
also checks any transmission
errors and sorts it out
accordingly.
This layer deals with hardware
technology and actual
communication mechanism
such as signaling, voltage,
cable type and length, etc.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
TCP/IP Model
Application
Transport
Internet
Link
The Application layer allows applications to access the services of the
other layers, and it defines the protocols that applications use to exchange
data. The Application layer contains many protocols, and more are always
being developed.
The most widely known Application layer protocols help users exchange
information:
• The Hypertext Transfer Protocol (HTTP) transfers files that make up
pages on the World Wide Web.
• The File Transfer Protocol (FTP) transfers individual files, typically for an
interactive user session.
• The Simple Mail Transfer Protocol (SMTP) transfers mail messages and
attachments.
The Transport layer (also known as the Host-to-Host Transport layer)
provides the Application layer with session and datagram communication
services. The Transport layer encompasses the responsibilities of the OSI
Transport layer. The core protocols of the Transport layer are TCP and UDP.
TCP provides a one-to-one, connection-oriented, reliable communications
service. TCP establishes connections, sequences and acknowledges
packets sent, and recovers packets lost during transmission.
In contrast to TCP, UDP provides a one-to-one or one-to-many,
connectionless, unreliable communications service. UDP is used when the
amount of data to be transferred is small (such as the data that would fit
into a single packet), when an application developer does not want the
overhead associated with TCP connections, or when the applications or
upper-layer protocols provide reliable delivery.
TCP and UDP operate over both IPv4 and IPv6 Internet layers.
The Internet layer responsibilities include addressing, packaging, and
routing functions. The Internet layer is analogous to the Network layer of
the OSI model.
The core protocols for the IPv4 Internet layer consist of the following:
• The Address Resolution Protocol (ARP) resolves the Internet layer
address to a Network Interface layer address such as a hardware
address.
• The Internet Protocol (IP) is a routable protocol that addresses, routes,
fragments, and reassembles packets.
• The Internet Control Message Protocol (ICMP) reports errors and other
information to help you diagnose unsuccessful packet delivery.
• The Internet Group Management Protocol (IGMP) manages IP multicast
groups.
The Network Interface layer (also called the Network Access layer) sends
TCP/IP packets on the network medium and receives TCP/IP packets off
the network medium. TCP/IP was designed to be independent of the
network access method, frame format, and medium. Therefore, you can
use TCP/IP to communicate across differing network types that use LAN
technologies—such as Ethernet and 802.11 wireless LAN—and WAN
technologies—such as Frame Relay and Asynchronous Transfer Mode
(ATM). By being independent of any specific network technology, TCP/IP
can be adapted to new technologies.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Addressing: Unicast
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Addressing: Broadcast
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Addressing: Multicast
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Visiting Google?
https://www.google.com
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
TCP/IP Three-way Handshake
https://www.google.com
Client
Server
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Connected!
https://www.google.com
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
What’s my computer’s address?
IP ADDRESS
192.168.32.28
A unique string of numbers separated by full
stops that identifies each computer using the
Internet Protocol to communicate over a
network.
MAC ADDRESS
F4-96-34-89-F9-98
A media access control address (MAC address)
of a device is a unique identifier assigned to a
network interface controller (NIC) for
communications at the data link layer of a
network segment
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Unique MAC
192.168.1.3 192.168.1.3192.168.1.3 192.168.1.3
F4-96-34-89-F9-98 A7-85-14-91-Z1-10B4-96-54-89-K9-99 P4-96-H4-88-F9-09
Computer A Computer B Computer C Computer D
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Address Resolution Protocol
192.168.1.31
192.168.1.33192.168.1.32 192.168.1.34
Who is 192.168.1.33?
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
192.168.1.31
Hey that’s me. Here have my MAC address
too so that we can communicate more easily
in future
192.168.1.33
Well….that’s easily exploitable! I could just lie.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Liars…liars everywhere
192.168.1.31
192.168.1.33
192.168.1.32
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Man in the Middle
192.168.1.31 192.168.1.33
192.168.1.32
“Man in the Middle” (MITM)
What is it? By impersonating the endpoints in an
online information exchange (i.e. the connection
from your smartphone to a website), the MITM
can obtain information from the end user and the
entity he or she is communicating with.
For example, if you are banking online, the man in
the middle would communicate with you by
impersonating your bank, and communicate with
the bank by impersonating you. The man in the
middle would then receive all of the information
transferred between both parties, which could
include sensitive data, such as bank accounts and
personal information.
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
This is exactly where the security part of
cybersecurity comes in
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Firewall
A firewall is a network security system that monitors and controls over all your incoming and outgoing network traffic based on
advanced and a defined set of security rules.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Firewall
Packet Filtering firewall
Application/Proxy Firewall
Hybrid Firewall
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Packet Filtering Firewall
Packet Header
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Application/Proxy Firewall
192.102.4.88
192.168.1.31
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. A
proxy firewall may also be called an application firewall or gateway firewall.
Packet Header
Payload
Both, the packet header
and the payload is
checked
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Hybrid Firewall
Application
Firewall
Packet Filtering
Firewall
A hybrid firewall is the combination of Application firewall and Packet Filtering Firewall. They are applied in series.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Hybrid Firewall: Parallel
Packet Filtering
Firewall
Application
Firewall
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cryptography
Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method
of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Symmetric Cryptography
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Symmetric Cryptography
The quick brown fox jumps over the lazy dog
Plain Text
ftq cguow ndaiz raj vgybe ahqd 13 xmlk pase
Cipher Text
A cryptographic key is the core part of
cryptographic operations. Many cryptographic
systems include pairs of operations, such as
encryption and decryption. A key is a part of
the variable data that is provided as input to a
cryptographic algorithm to execute this sort of
operation.
𝐸 𝑘, 𝑀 = C
𝐸−1
𝑘, 𝐶 = 𝑀
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Public/Key Cryptography
Bill decides to
send
Digital Signature
Transaction Message
Bob’s Secret key (sk)
Sign
Verification
Transaction Message
Alice’s Public key (pk)
Mandy receives Bil
transaction
Blockchain Technology
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Demo Time!

Contenu connexe

Tendances

Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Pokala Sai
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUICFarzad Soltani
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IPfarhan516
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORTRajat Kumar
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
Internet protocol
Internet protocol Internet protocol
Internet protocol Bint Javed
 
Unit 4 - Transport Layer
Unit 4 - Transport LayerUnit 4 - Transport Layer
Unit 4 - Transport LayerKalpanaC14
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction LJ PROJECTS
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IPraymondkao
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network SecurityMaganathin Veeraragaloo
 
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...IOSR Journals
 

Tendances (20)

20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
 
Network layer osi
Network layer osiNetwork layer osi
Network layer osi
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IP
 
Ccna interview questions
Ccna interview questionsCcna interview questions
Ccna interview questions
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
Unit 4 - Transport Layer
Unit 4 - Transport LayerUnit 4 - Transport Layer
Unit 4 - Transport Layer
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IP
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
 
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...
 
TCP/IP Protocal Suite
TCP/IP Protocal SuiteTCP/IP Protocal Suite
TCP/IP Protocal Suite
 
TCPIP
TCPIPTCPIP
TCPIP
 

Similaire à Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Training | Edureka

Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
protocol architecture
 protocol architecture protocol architecture
protocol architectureSrinivasa Rao
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)Tuan Yang
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptxDeepVala5
 

Similaire à Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Training | Edureka (20)

Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Osi model
Osi modelOsi model
Osi model
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
section 4.3.pptx
section 4.3.pptxsection 4.3.pptx
section 4.3.pptx
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
protocol architecture
 protocol architecture protocol architecture
protocol architecture
 
Ip security
Ip security Ip security
Ip security
 
Ip sec
Ip secIp sec
Ip sec
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 

Plus de Edureka!

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaEdureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaEdureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaEdureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaEdureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaEdureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaEdureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaEdureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaEdureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaEdureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaEdureka!
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | EdurekaEdureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEdureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEdureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaEdureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaEdureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaEdureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaEdureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaEdureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | EdurekaEdureka!
 

Plus de Edureka! (20)

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
 

Dernier

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Dernier (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Training | Edureka

  • 1. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
  • 2. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training CYBERSECURITY o Refers to every thing digital o Requires the understanding of how a network runs o Refers to the art of hiding and encrypting information o Requires the understanding of cryptography
  • 3. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training 01Packet Structure 05 Firewall 02Network Architecture 06 Symmetric Cryptography 03Addressing Method 04IP & Mac 07 Asymmetric Cryptography NETWORK SECURITY AGENDA
  • 4. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Network Part
  • 5. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Downloading a file?
  • 6. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Packet of what? Packet Header Payload Contains critical information regarding the packet. The information includes things like source address, destination address, type of service, IP version information Payload refers to the actual data being contained in the packet. This could be anything ranging from a media file, executables or even a simple text file Packet Trailer
  • 7. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training IPv4 Packet Header Version Header Length Identification Total Length Flags Fragment Offset Time to Live Protocol Header Checksum Source IP Address Destination IP Address Options (if any) DCSP ECN Version no. of Internet Protocol used (e.g. IPv4). Length of entire IP headerDifferentiated Service Code Point; This refers to the type of service Explicit Congestion Notification; Information about the congestion in route Length of entire IP Packet (including IP header and IP Payload). If IP packet is fragmented during the transmission, all the fragments contain same identification number. to identify original IP packet they belong to. As required by the network resources, if IP Packet is too large to handle, these ‘flags’ tells if they can be fragmented or not This offset tells the exact position of the fragment in the original IP Packet.To avoid looping in the network, every packet is sent with some TTL value set, which tells the network how many routers (hops) this packet can cross Tells the Network layer at the destination host, to which Protocol this packet belongs to This field is used to keep checksum value of entire header which is then used to check if the packet is received error-free. 32-bit address of the Sender (or source) of the packet. 32-bit address of the Receiver (or destination) of the packet. This is optional field, which is used if the value of IHL is greater than 5. These options may contain values for options such as Security, Record Route, Time Stamp, etc.
  • 8. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training OSI Model Application Presentation Session Transport Network Datalink Physical This is where the user application sits that needs to transfer data between or among hosts. For example: HTTP, file transfer application (FTP) and electronic mail etc. This layer helps to understand data representation in one form on a host to other host in their native representation. Data from the sender is converted to on-the-wire data (general standard format) and at the receiver’s end it is converted to the native representation of the receiver. This layer provides session management capabilities between hosts. For example, if some host needs a password verification for access and if credentials are provided then for that session password verification does not happen again. This layer can assist in synchronization, dialog control and critical operation management (e.g., an online bank transaction). This layer provides end to end data delivery among hosts. This layer takes data from the above layer and breaks it into smaller units called Segments and then gives it to the Network layer for transmission. This layer helps to uniquely identify hosts beyond the subnets and defines the path which the packets will follow or be routed to reach the destination. This layer takes the raw transmission data (signal, pulses etc.) from the Physical Layer and makes Data Frames, and sends that to the upper layer and vice versa. This layer also checks any transmission errors and sorts it out accordingly. This layer deals with hardware technology and actual communication mechanism such as signaling, voltage, cable type and length, etc.
  • 9. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training TCP/IP Model Application Transport Internet Link The Application layer allows applications to access the services of the other layers, and it defines the protocols that applications use to exchange data. The Application layer contains many protocols, and more are always being developed. The most widely known Application layer protocols help users exchange information: • The Hypertext Transfer Protocol (HTTP) transfers files that make up pages on the World Wide Web. • The File Transfer Protocol (FTP) transfers individual files, typically for an interactive user session. • The Simple Mail Transfer Protocol (SMTP) transfers mail messages and attachments. The Transport layer (also known as the Host-to-Host Transport layer) provides the Application layer with session and datagram communication services. The Transport layer encompasses the responsibilities of the OSI Transport layer. The core protocols of the Transport layer are TCP and UDP. TCP provides a one-to-one, connection-oriented, reliable communications service. TCP establishes connections, sequences and acknowledges packets sent, and recovers packets lost during transmission. In contrast to TCP, UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service. UDP is used when the amount of data to be transferred is small (such as the data that would fit into a single packet), when an application developer does not want the overhead associated with TCP connections, or when the applications or upper-layer protocols provide reliable delivery. TCP and UDP operate over both IPv4 and IPv6 Internet layers. The Internet layer responsibilities include addressing, packaging, and routing functions. The Internet layer is analogous to the Network layer of the OSI model. The core protocols for the IPv4 Internet layer consist of the following: • The Address Resolution Protocol (ARP) resolves the Internet layer address to a Network Interface layer address such as a hardware address. • The Internet Protocol (IP) is a routable protocol that addresses, routes, fragments, and reassembles packets. • The Internet Control Message Protocol (ICMP) reports errors and other information to help you diagnose unsuccessful packet delivery. • The Internet Group Management Protocol (IGMP) manages IP multicast groups. The Network Interface layer (also called the Network Access layer) sends TCP/IP packets on the network medium and receives TCP/IP packets off the network medium. TCP/IP was designed to be independent of the network access method, frame format, and medium. Therefore, you can use TCP/IP to communicate across differing network types that use LAN technologies—such as Ethernet and 802.11 wireless LAN—and WAN technologies—such as Frame Relay and Asynchronous Transfer Mode (ATM). By being independent of any specific network technology, TCP/IP can be adapted to new technologies.
  • 10. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Addressing: Unicast
  • 11. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Addressing: Broadcast
  • 12. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Addressing: Multicast
  • 13. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Visiting Google? https://www.google.com
  • 14. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training TCP/IP Three-way Handshake https://www.google.com Client Server
  • 15. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Connected! https://www.google.com
  • 16. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training What’s my computer’s address? IP ADDRESS 192.168.32.28 A unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network. MAC ADDRESS F4-96-34-89-F9-98 A media access control address (MAC address) of a device is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment
  • 17. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Unique MAC 192.168.1.3 192.168.1.3192.168.1.3 192.168.1.3 F4-96-34-89-F9-98 A7-85-14-91-Z1-10B4-96-54-89-K9-99 P4-96-H4-88-F9-09 Computer A Computer B Computer C Computer D
  • 18. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Address Resolution Protocol 192.168.1.31 192.168.1.33192.168.1.32 192.168.1.34 Who is 192.168.1.33?
  • 19. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training 192.168.1.31 Hey that’s me. Here have my MAC address too so that we can communicate more easily in future 192.168.1.33 Well….that’s easily exploitable! I could just lie.
  • 20. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Liars…liars everywhere 192.168.1.31 192.168.1.33 192.168.1.32
  • 21. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Man in the Middle 192.168.1.31 192.168.1.33 192.168.1.32 “Man in the Middle” (MITM) What is it? By impersonating the endpoints in an online information exchange (i.e. the connection from your smartphone to a website), the MITM can obtain information from the end user and the entity he or she is communicating with. For example, if you are banking online, the man in the middle would communicate with you by impersonating your bank, and communicate with the bank by impersonating you. The man in the middle would then receive all of the information transferred between both parties, which could include sensitive data, such as bank accounts and personal information.
  • 22. Copyright © 2018, edureka and/or its affiliates. All rights reserved. This is exactly where the security part of cybersecurity comes in
  • 23. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Firewall A firewall is a network security system that monitors and controls over all your incoming and outgoing network traffic based on advanced and a defined set of security rules.
  • 24. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Firewall Packet Filtering firewall Application/Proxy Firewall Hybrid Firewall
  • 25. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Packet Filtering Firewall Packet Header
  • 26. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Application/Proxy Firewall 192.102.4.88 192.168.1.31 A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. A proxy firewall may also be called an application firewall or gateway firewall. Packet Header Payload Both, the packet header and the payload is checked
  • 27. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Hybrid Firewall Application Firewall Packet Filtering Firewall A hybrid firewall is the combination of Application firewall and Packet Filtering Firewall. They are applied in series.
  • 28. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Hybrid Firewall: Parallel Packet Filtering Firewall Application Firewall
  • 29. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Cryptography Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.
  • 30. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Symmetric Cryptography
  • 31. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Symmetric Cryptography The quick brown fox jumps over the lazy dog Plain Text ftq cguow ndaiz raj vgybe ahqd 13 xmlk pase Cipher Text A cryptographic key is the core part of cryptographic operations. Many cryptographic systems include pairs of operations, such as encryption and decryption. A key is a part of the variable data that is provided as input to a cryptographic algorithm to execute this sort of operation. 𝐸 𝑘, 𝑀 = C 𝐸−1 𝑘, 𝐶 = 𝑀
  • 32. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Public/Key Cryptography Bill decides to send Digital Signature Transaction Message Bob’s Secret key (sk) Sign Verification Transaction Message Alice’s Public key (pk) Mandy receives Bil transaction Blockchain Technology
  • 33. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Demo Time!