5. ENCRYPTION
• Encryption is the
process of transforming
information to make it
unreadable to anyone
except those possessing
special knowledge,
usually referred to as a
key.
• Encryption is the
conversion of data into
a form, called a cipher
text that cannot be
easily understood by
unauthorized people.
6. DECRYPTION
Decryption is the process of converting encrypted
data back into its original form, so it can be
understood.
7. ENCRYPTION
Encryption/Decryption is a good idea when carrying
out any kind of sensitive transaction, such as a
credit-card purchase online, or the discussion of a
company secret between different departments in
the organization
8. SYMMETRIC KEY ENCRYPTION
Symmetric-key algorithms are a class of algorithms
for cryptography that use trivially related, often
identical, cryptographic keys for both decryption and
encryption.
The keys, in practice, represent a shared secret
between two or more parties that can be used to
maintain a private information link.
9. Public Key Encryption
Solves symmetric key encryption problem of having to
exchange
secret key
• Uses two mathematically related digital keys – public
key (widely
disseminated) and private key (kept secret by owner)
• Both keys used to encrypt and decrypt message
• Once key used to encrypt message, same key cannot
be used to
decrypt message
• For example, sender uses recipient’s public key to
encrypt message;
recipient uses his/her private key to decrypt it
10. Securing Channels of Communication
Secure Sockets Layer (SSL):
– Most common form of securing channels of communication; used to
establish a secure negotiated session (client-server session in which
URL of requested document, along with contents, is encrypted)
S-HTTP:
– Alternative method; provides a secure message-oriented
communications protocol designed for use in conjunction with
HTTP
Virtual Private Networks (VPNs):
– Allow remote users to securely access internal networks via the
Internet, using Point-to-Point Tunneling Protocol (PPTP)
11. Secure Sockets Layer (SSL):
Secure Sockets Layer, a protocol developed by
Netscape for transmitting private documents via the
Internet. SSL uses a cryptographic system that uses
two keys to encrypt data - a public key known to
everyone and a private or secret key known only to
the recipient of the message..
12. Virtual Private Networks (VPNs):
A virtual private network (VPN) is a secure way of
connecting to a private Local Area Network at a
remote location, using the Internet or any unsecure
public network to transport the network data
packets privately, using encryption. The VPN uses
authentication to deny access to unauthorized
users, and encryption to prevent unauthorized users
from reading the private network packets.
14. S-HTTP
Another protocol for transmitting data securely over
the World Wide Web is Secure HTTP (S-HTTP). S-
HTTP is designed to transmit individual messages
securely.
15. Firewalls
A firewall is a device or set of devices designed to permit or
deny network transmissions based upon a set of rules and is
frequently used to protect networks from unauthorized
access while permitting legitimate communications to pass.
16. Antivirus
Easiest and least
expensive way to
prevent threats to
system integrity.
Antivirus software is
used to
prevent, detect, and
remove
malware, including but
not limited to computer
viruses, computer
worm, Trojan
horses, spyware and
adware.
17.
18. PROXY
It is a computer
system or router
that breaks the
connection
between sender
and receiver