SlideShare ist ein Scribd-Unternehmen logo
1 von 13
VIDYAVAHINIFIRSTGRADECOLLEGE
VIDYAVAHINI GROUPOFINSTITUTIONS
AFFILIATEDTO TUMKURUNIVERSITY • KUVEMPUNAGAR/SIT EXTENTION, TUMKUR572103
OVERVIEW
1. Introduction
2. Types of Cryptographic
Attacks
1.INTRODUCTION
Definition:
• An attack is gaining the access of data by Unauthorized
person.
• It is also called as Security Attacks and Security threats
• Here gaining means
 Accessing / Reading /Viewing/ Listening the data
 Modifying the data
 Destroying the data
2.TYPES OF ATTACKS
Attacks are classified into two types
I. PASSIVE ATTACK
Passive Attacks are the type of attacks in which,
the attacker observes the content of message
or copy the content of messages.
• Passive Attack is danger for Confidentiality.
• Due to passive attack, there is no any harm to
the system and its Resources.
• In this type of attacks data will not be
modified, just the data will be accessed by the
third person means unauthorized person.
• In this victim (receiver or sender) does not get
information about the attack.
 Passive Attack has Two Techniques
i. Release of Message Content.
When sender sends a message to receiver, during
transmitting data unauthorized person can get the data,
they can listen or read the messages but not modified.
ii. Traffic Analysis
Here sender sends a message to receiver, in between
that third party can monitoring pattern of those
messages and observes traffic or data flow and
length of the messages then they can easily access the
data but not modified.
II. ACTIVE ATTACK
Active attacks are the type of attacks in which,
the attacker or unauthorized person To change
or modify the content of messages.
Active Attack is danger for Integrity as well as
availability.
Due to active attack system is always
damaged and System resources can be
changed.
The most important thing is that, in active
attack, Victim (sender and receiver) gets
information about the attack.
Active Attack has Four Techniques
i. Masquerade
• Here sender does not send any data
to the receiver but receiver will
receives the data from the third party
with the name of sender.
• Here data will be modified; receiver
does not know who sent the message.
• Here receiver does not receive
message by sender but with the name
of sender.
ii. Replay Attack
• Here if sender sends data to receiver,
while at the time of transferring of data
the same data will be gained by third
party and the same message will be
sent again to the receiver.
• Now receiver will receive same
message twice, first time from sender
and another time from third party.
• Here the problem is, receiver does not
know who is valid sender is and which
message from original source.
iii. Data Modification
• Here also sender sends the data to
receiver but it does not go to the
receiver directly, that message is
directly accessed by the 3rd party and
data will be modified and that modified
data will be received by the receiver.
• The receiver does not know there is a
data modification done.
iv.Denial of Services (DOS)
• Always server provides services to
sender and then sender provide them
to receiver.
• But in between that unauthorized
person disrupts or interrupts or
destroy the services sends by the
server to sender on the name of
sender.
CRYPTOGRAPHY AND NETWORK SECURITY.pptx

Weitere ähnliche Inhalte

Ähnlich wie CRYPTOGRAPHY AND NETWORK SECURITY.pptx

Network Security
Network SecurityNetwork Security
Network Securitymoviebro1
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introductionVasuki Ramasamy
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Atika Zaimi
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdfdeepakbharathi16
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxRizwanBasha12
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system Kushagr sharma
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network securitysneha padhiar
 
DataCommunication Network - Unit 5.pdf
DataCommunication Network - Unit 5.pdfDataCommunication Network - Unit 5.pdf
DataCommunication Network - Unit 5.pdfkrishnapriya673257
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptxBisharSuleiman
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.pptSwapnaPavan2
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Network and Information security_new2.pdf
Network and Information security_new2.pdfNetwork and Information security_new2.pdf
Network and Information security_new2.pdfAyanMujawar2
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyUmangThakkar26
 
typesofattacks-180418113629.pdf
typesofattacks-180418113629.pdftypesofattacks-180418113629.pdf
typesofattacks-180418113629.pdfsurajthakur474818
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
KCS074_CGNS_L1_PPT1.pptx
KCS074_CGNS_L1_PPT1.pptxKCS074_CGNS_L1_PPT1.pptx
KCS074_CGNS_L1_PPT1.pptxjohn942994
 

Ähnlich wie CRYPTOGRAPHY AND NETWORK SECURITY.pptx (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
DataCommunication Network - Unit 5.pdf
DataCommunication Network - Unit 5.pdfDataCommunication Network - Unit 5.pdf
DataCommunication Network - Unit 5.pdf
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Network and Information security_new2.pdf
Network and Information security_new2.pdfNetwork and Information security_new2.pdf
Network and Information security_new2.pdf
 
ch1-1.ppt
ch1-1.pptch1-1.ppt
ch1-1.ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
typesofattacks-180418113629.pdf
typesofattacks-180418113629.pdftypesofattacks-180418113629.pdf
typesofattacks-180418113629.pdf
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
 
KCS074_CGNS_L1_PPT1.pptx
KCS074_CGNS_L1_PPT1.pptxKCS074_CGNS_L1_PPT1.pptx
KCS074_CGNS_L1_PPT1.pptx
 

Mehr von bhavyag24

DOC-20230727-WA0006..pptx
DOC-20230727-WA0006..pptxDOC-20230727-WA0006..pptx
DOC-20230727-WA0006..pptxbhavyag24
 
carbohydrate.ppt
carbohydrate.pptcarbohydrate.ppt
carbohydrate.pptbhavyag24
 
datamarts.ppt
datamarts.pptdatamarts.ppt
datamarts.pptbhavyag24
 
metadata.pptx
metadata.pptxmetadata.pptx
metadata.pptxbhavyag24
 
SCREENLESS DISPLAY (2).pptx
SCREENLESS DISPLAY (2).pptxSCREENLESS DISPLAY (2).pptx
SCREENLESS DISPLAY (2).pptxbhavyag24
 
supplychainmanagementppt-130123080351-phpapp02.pdf
supplychainmanagementppt-130123080351-phpapp02.pdfsupplychainmanagementppt-130123080351-phpapp02.pdf
supplychainmanagementppt-130123080351-phpapp02.pdfbhavyag24
 
AIT SEMINAR.pptx
AIT SEMINAR.pptxAIT SEMINAR.pptx
AIT SEMINAR.pptxbhavyag24
 

Mehr von bhavyag24 (7)

DOC-20230727-WA0006..pptx
DOC-20230727-WA0006..pptxDOC-20230727-WA0006..pptx
DOC-20230727-WA0006..pptx
 
carbohydrate.ppt
carbohydrate.pptcarbohydrate.ppt
carbohydrate.ppt
 
datamarts.ppt
datamarts.pptdatamarts.ppt
datamarts.ppt
 
metadata.pptx
metadata.pptxmetadata.pptx
metadata.pptx
 
SCREENLESS DISPLAY (2).pptx
SCREENLESS DISPLAY (2).pptxSCREENLESS DISPLAY (2).pptx
SCREENLESS DISPLAY (2).pptx
 
supplychainmanagementppt-130123080351-phpapp02.pdf
supplychainmanagementppt-130123080351-phpapp02.pdfsupplychainmanagementppt-130123080351-phpapp02.pdf
supplychainmanagementppt-130123080351-phpapp02.pdf
 
AIT SEMINAR.pptx
AIT SEMINAR.pptxAIT SEMINAR.pptx
AIT SEMINAR.pptx
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

CRYPTOGRAPHY AND NETWORK SECURITY.pptx

  • 2. OVERVIEW 1. Introduction 2. Types of Cryptographic Attacks
  • 3. 1.INTRODUCTION Definition: • An attack is gaining the access of data by Unauthorized person. • It is also called as Security Attacks and Security threats • Here gaining means  Accessing / Reading /Viewing/ Listening the data  Modifying the data  Destroying the data
  • 4. 2.TYPES OF ATTACKS Attacks are classified into two types
  • 5. I. PASSIVE ATTACK Passive Attacks are the type of attacks in which, the attacker observes the content of message or copy the content of messages. • Passive Attack is danger for Confidentiality. • Due to passive attack, there is no any harm to the system and its Resources. • In this type of attacks data will not be modified, just the data will be accessed by the third person means unauthorized person. • In this victim (receiver or sender) does not get information about the attack.
  • 6.  Passive Attack has Two Techniques i. Release of Message Content. When sender sends a message to receiver, during transmitting data unauthorized person can get the data, they can listen or read the messages but not modified.
  • 7. ii. Traffic Analysis Here sender sends a message to receiver, in between that third party can monitoring pattern of those messages and observes traffic or data flow and length of the messages then they can easily access the data but not modified.
  • 8. II. ACTIVE ATTACK Active attacks are the type of attacks in which, the attacker or unauthorized person To change or modify the content of messages. Active Attack is danger for Integrity as well as availability. Due to active attack system is always damaged and System resources can be changed. The most important thing is that, in active attack, Victim (sender and receiver) gets information about the attack.
  • 9. Active Attack has Four Techniques i. Masquerade • Here sender does not send any data to the receiver but receiver will receives the data from the third party with the name of sender. • Here data will be modified; receiver does not know who sent the message. • Here receiver does not receive message by sender but with the name of sender.
  • 10. ii. Replay Attack • Here if sender sends data to receiver, while at the time of transferring of data the same data will be gained by third party and the same message will be sent again to the receiver. • Now receiver will receive same message twice, first time from sender and another time from third party. • Here the problem is, receiver does not know who is valid sender is and which message from original source.
  • 11. iii. Data Modification • Here also sender sends the data to receiver but it does not go to the receiver directly, that message is directly accessed by the 3rd party and data will be modified and that modified data will be received by the receiver. • The receiver does not know there is a data modification done.
  • 12. iv.Denial of Services (DOS) • Always server provides services to sender and then sender provide them to receiver. • But in between that unauthorized person disrupts or interrupts or destroy the services sends by the server to sender on the name of sender.