12
1 COMPUTER SECURITY Presented by:- Janardan subhedar Sheetal pandharkame Ashish lad Vaibhavi thakur

Computer Security & network security

Embed Size (px)

DESCRIPTION

basic introduction about security

Citation preview

Page 1: Computer Security & network security

1

COMPUTER SECURITY

Presented by:- Janardan subhedar Sheetal pandharkame Ashish lad Vaibhavi thakur

Page 2: Computer Security & network security

Content Outline Introduction Basic principle of computer

security Security attacks Encryption attack Role of people in security Access control Cryptography Biometrics Conclusion

Page 3: Computer Security & network security

3

Introduction

Computer security is nothing but to provide security to data, computer system, services and supporting procedure.

For this purpose various technology were used like access control mechanism, cryptography and biometrics etc.

Page 4: Computer Security & network security

Basic principle’s of computersecurity

4

Authorization Integrity

Availability4

25

3

1

Basic principl

e’

Authentication

Confidentiality

Page 5: Computer Security & network security

Security attacks

5

Passive attack

Active attack

Types of security attack

1

2

Page 6: Computer Security & network security

Encryption attack

6

Encryption is the process of transforming plaintext into cipher text, which is in unreadable format known using specific technique.

Page 7: Computer Security & network security

Role of people in security

Username and password

Choosing password

Managing password

Page 8: Computer Security & network security

Access control

8

Use of physical access control is the same as that of computer and network access control to restrict access to unauthorized users.

Physical access control based on following points:-

Something the individual has, Something they know Something they are

Page 9: Computer Security & network security

BiometricsAccess control are not only

method to limit the unauthorized access to the system. Some new approach is to utilize something unique about the user’s is called biometric.

List of biometrics:- Fingerprint Voice/Speech

Signature/Handwriting

9

Page 10: Computer Security & network security

Cryptography

10

Cryptology

Basic algorithm & techniques

Symmetric & asymmetric

CryptographyCryptography

Cryptanalysis

Page 11: Computer Security & network security

Conclusion

Hackers will never stop hacking. You should never stop defending yourself from attack.

Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable. 11

Page 12: Computer Security & network security

12