SlideShare une entreprise Scribd logo
1  sur  20
Vulnerability
Attack
Threat
Network Security Mechanisms
Vulnerabilities are weak points or loopholes in
security that an attacker exploits in order to gain
access to the network or to resources on the
network.
Attack is any attempt to destroy, expose,
alter, disable, steal or gain unauthorized
access to or make unauthorized use of an
asset.
Two types of attack are:
 Passive Attack
 Active Attack
A mechanism that is designed to detect, prevent,
or recover from a security attack.
Different types of security Mechanisms are:
 Routing control
 Traffic padding
 Encipherment
 Access Control
 Digital Signatures
 Data Integrity
Enables selection of particular physically secure
routes for certain data and allows routing changes,
especially when a breach of security is suspected.
The insertion of bits into gaps in a data stream
to frustrate traffic analysis attempts.
Encipherment is the process of translating
plaintext into ciphertext.
The use of mathematical algorithms to
transform data into a form that is not readily
intelligible.
Cryptography technique is used for
enciphering.
A word with greek origin, means “Secret
Writing”.
Two distinct mechanisms:
 Symmetric-Key Encipherment
 Asymmetric-Key Encipherment
A digital signature or digital signature
scheme is a mathematical scheme for
demonstrating the authenticity of a digital
message or document.
It uses methods to prove that a user has
access rights to the data or resources owned
by a system.
Examples: passwords and PINs
Data integrity refers to maintaining and
assuring the accuracy and consistency
of data.
A variety of mechanisms used to assure the
integrity of a data unit or stream of data
units.
A check digit is an extra digit added to a number
so that, if a number is changed, the error will be
detected.
Method
Starting from the right, multiply the first digit by 1,
the second by 2 etc
Add the results together
Use the last digit of the result and add to end of
number.
◦ Example: 56037 becomes 560372
◦ Example: 50637 becomes 506376
Security Mechanisms

Contenu connexe

Tendances

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

Tendances (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Kerberos
KerberosKerberos
Kerberos
 
Email security
Email securityEmail security
Email security
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Key management
Key managementKey management
Key management
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Web Security
Web SecurityWeb Security
Web Security
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Ipsec
IpsecIpsec
Ipsec
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
User authentication
User authenticationUser authentication
User authentication
 

Similaire à Security Mechanisms

CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 

Similaire à Security Mechanisms (20)

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Cybersecurity from A to Z
Cybersecurity from A to ZCybersecurity from A to Z
Cybersecurity from A to Z
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Unit 1
Unit 1Unit 1
Unit 1
 
security IDS
security IDSsecurity IDS
security IDS
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
Unit 1
Unit 1Unit 1
Unit 1
 

Plus de priya_trehan

Plus de priya_trehan (14)

Wordpress
WordpressWordpress
Wordpress
 
Types of E commerce & Payment Models
Types of E commerce & Payment ModelsTypes of E commerce & Payment Models
Types of E commerce & Payment Models
 
Friction as a necessary evil
Friction as a necessary evilFriction as a necessary evil
Friction as a necessary evil
 
Introduction to trees
 Introduction to trees Introduction to trees
Introduction to trees
 
File handling
File handlingFile handling
File handling
 
Datapreprocessing
DatapreprocessingDatapreprocessing
Datapreprocessing
 
Johari window
Johari windowJohari window
Johari window
 
Input output
Input outputInput output
Input output
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technology
 
Packages
PackagesPackages
Packages
 
Protocols
ProtocolsProtocols
Protocols
 
Kiosk
KioskKiosk
Kiosk
 
Photoshop
PhotoshopPhotoshop
Photoshop
 
Art of listening
Art of listeningArt of listening
Art of listening
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Security Mechanisms

  • 1.
  • 3. Vulnerabilities are weak points or loopholes in security that an attacker exploits in order to gain access to the network or to resources on the network.
  • 4.
  • 5. Attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Two types of attack are:  Passive Attack  Active Attack
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. A mechanism that is designed to detect, prevent, or recover from a security attack. Different types of security Mechanisms are:  Routing control  Traffic padding  Encipherment  Access Control  Digital Signatures  Data Integrity
  • 11. Enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected.
  • 12. The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
  • 13. Encipherment is the process of translating plaintext into ciphertext. The use of mathematical algorithms to transform data into a form that is not readily intelligible. Cryptography technique is used for enciphering.
  • 14. A word with greek origin, means “Secret Writing”. Two distinct mechanisms:  Symmetric-Key Encipherment  Asymmetric-Key Encipherment
  • 15. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document.
  • 16.
  • 17. It uses methods to prove that a user has access rights to the data or resources owned by a system. Examples: passwords and PINs
  • 18. Data integrity refers to maintaining and assuring the accuracy and consistency of data. A variety of mechanisms used to assure the integrity of a data unit or stream of data units.
  • 19. A check digit is an extra digit added to a number so that, if a number is changed, the error will be detected. Method Starting from the right, multiply the first digit by 1, the second by 2 etc Add the results together Use the last digit of the result and add to end of number. ◦ Example: 56037 becomes 560372 ◦ Example: 50637 becomes 506376