SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Chapter 29 Internet Security
CONTENTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION 29.1
Figure  29-1 Aspects of security
PRIVACY 29.2
Figure  29-2 Secret-key encryption
In secret-key encryption,  the same key is used by the sender  (for encryption)   and the receiver  (for decryption).   The key is shared.
Secret-key encryption is often called  symmetric encryption because  the same key can  be used in both directions.
Secret-key encryption is  often used for long messages.
We discuss one secret-key  algorithm in Appendix E.
KDC   can solve the problem  of secret-key distribution.
Figure  29-3 Public-key encryption
Public-key algorithms are more  efficient for short messages.
A  CA   can certify the binding between  a public key and the owner.
Figure  29-4 Combination
To have the advantages of both  secret-key and public-key  encryption, we can encrypt the secret key  using the public key and encrypt  the message using the secret key.
DIGITAL SIGNATURE 29.3
Figure  29-5 Signing the whole document
Digital signature cannot be  achieved using only secret keys.
Digital signature does not  provide privacy.  If there is a need for privacy,  another layer of  encryption/decryption  must be applied.
Figure  29-6 Signing the digest
Figure  29-7 Sender site
Figure  29-8 Receiver site
SECURITY IN THE INTERNET 29.4
APPLICTION LAYER SECURITY 29.5
Figure  29-9 PGP at the sender site
Figure  29-10 PGP at the receiver site
TRANSPORT LAYER SECURITY (TLS) 29.6
Figure  29-11 Position of TLS
Figure  29-12 Handshake protocol
SECURITY AT THE IP LAYER (IPSec) 29.7
Figure  29-13 Authentication
Figure  29-14 Header format
Figure  29-15 ESP
Figure  29-16 ESP format
FIREWALLS 29.8
Figure  29-17 Firewall
Figure  29-18 Packet-filter firewall
A packet-filter firewall filters  at the network or transport layer.
Figure  29-19 Proxy firewall
A proxy firewall  filters at the application layer.

Weitere ähnliche Inhalte

Andere mochten auch

Location scouting sheet
Location scouting sheetLocation scouting sheet
Location scouting sheetevamariaa
 
Album poster drafting process
Album poster drafting processAlbum poster drafting process
Album poster drafting process29556
 
Profile_Thomas Raju
Profile_Thomas RajuProfile_Thomas Raju
Profile_Thomas RajuThomas Raju
 
Dave Dietz Resume address removed
Dave Dietz Resume address removedDave Dietz Resume address removed
Dave Dietz Resume address removedDave Dietz
 
patenting ayurveda a review
 patenting ayurveda a review patenting ayurveda a review
patenting ayurveda a reviewSeetaram Kishore
 
Презентация Проекта Программы развития придорожного сервиса вдоль автомобильн...
Презентация Проекта Программы развития придорожного сервиса вдоль автомобильн...Презентация Проекта Программы развития придорожного сервиса вдоль автомобильн...
Презентация Проекта Программы развития придорожного сервиса вдоль автомобильн...Zhanat Chukeev
 
Презентация главного инженера АО "Труд" Киберева Ю.В.
Презентация главного инженера АО "Труд" Киберева Ю.В. Презентация главного инженера АО "Труд" Киберева Ю.В.
Презентация главного инженера АО "Труд" Киберева Ю.В. проект "Механик"
 

Andere mochten auch (15)

Location scouting sheet
Location scouting sheetLocation scouting sheet
Location scouting sheet
 
Alexandru Botila CVEN
Alexandru Botila CVENAlexandru Botila CVEN
Alexandru Botila CVEN
 
Aplicación
Aplicación Aplicación
Aplicación
 
Album poster drafting process
Album poster drafting processAlbum poster drafting process
Album poster drafting process
 
Microservices why?
Microservices   why?Microservices   why?
Microservices why?
 
Profile_Thomas Raju
Profile_Thomas RajuProfile_Thomas Raju
Profile_Thomas Raju
 
Marhaba 2016
Marhaba 2016Marhaba 2016
Marhaba 2016
 
Dave Dietz Resume address removed
Dave Dietz Resume address removedDave Dietz Resume address removed
Dave Dietz Resume address removed
 
MOST TALENTED-PDF
MOST TALENTED-PDFMOST TALENTED-PDF
MOST TALENTED-PDF
 
City centre event spaces
City centre event spacesCity centre event spaces
City centre event spaces
 
patenting ayurveda a review
 patenting ayurveda a review patenting ayurveda a review
patenting ayurveda a review
 
Презентация Проекта Программы развития придорожного сервиса вдоль автомобильн...
Презентация Проекта Программы развития придорожного сервиса вдоль автомобильн...Презентация Проекта Программы развития придорожного сервиса вдоль автомобильн...
Презентация Проекта Программы развития придорожного сервиса вдоль автомобильн...
 
Ch26
Ch26Ch26
Ch26
 
Презентация главного инженера АО "Труд" Киберева Ю.В.
Презентация главного инженера АО "Труд" Киберева Ю.В. Презентация главного инженера АО "Труд" Киберева Ю.В.
Презентация главного инженера АО "Труд" Киберева Ю.В.
 
EuroVelo project
EuroVelo projectEuroVelo project
EuroVelo project
 

Ähnlich wie Internet Security Chapter Summary

Secure Multicast Conferencing
Secure Multicast ConferencingSecure Multicast Conferencing
Secure Multicast Conferencingblogzilla
 
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_FirewallsAhmar Hashmi
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile PREMKUMAR
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at restijccsa
 
A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE neirew J
 
Network security on Cisco routers and switches
Network security on Cisco routers and switchesNetwork security on Cisco routers and switches
Network security on Cisco routers and switchesAlexandros Britzolakis
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsAnkit Gupta
 

Ähnlich wie Internet Security Chapter Summary (20)

Ch32
Ch32Ch32
Ch32
 
Ch32
Ch32Ch32
Ch32
 
Chapter 32
Chapter 32Chapter 32
Chapter 32
 
Ch 29
Ch 29Ch 29
Ch 29
 
Secure Multicast Conferencing
Secure Multicast ConferencingSecure Multicast Conferencing
Secure Multicast Conferencing
 
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Ch 31
Ch 31Ch 31
Ch 31
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at rest
 
A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Lecture12
Lecture12Lecture12
Lecture12
 
Network security on Cisco routers and switches
Network security on Cisco routers and switchesNetwork security on Cisco routers and switches
Network security on Cisco routers and switches
 
C0281010016
C0281010016C0281010016
C0281010016
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 

Mehr von tejindershami (20)

Ch30
Ch30Ch30
Ch30
 
Ch27
Ch27Ch27
Ch27
 
Ch25
Ch25Ch25
Ch25
 
Ch24
Ch24Ch24
Ch24
 
Ch23
Ch23Ch23
Ch23
 
Ch22
Ch22Ch22
Ch22
 
Ch21
Ch21Ch21
Ch21
 
Ch20
Ch20Ch20
Ch20
 
Ch19
Ch19Ch19
Ch19
 
Ch18
Ch18Ch18
Ch18
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch14
Ch14Ch14
Ch14
 
Ch13
Ch13Ch13
Ch13
 
Ch12
Ch12Ch12
Ch12
 
Ch11
Ch11Ch11
Ch11
 
Ch10
Ch10Ch10
Ch10
 
Ch09
Ch09Ch09
Ch09
 
Ch08
Ch08Ch08
Ch08
 
Ch07
Ch07Ch07
Ch07
 

Kürzlich hochgeladen

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Internet Security Chapter Summary