Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Class notes BTCOC602(Computer Network) (Computer science and engineering)

Rating
-
Sold
-
Pages
20
Uploaded on
04-09-2022
Written in
2021/2022

Network Security ,Privacy,Public Key Encryption/Decryption technique,Differences b/w Secret Key Encryption & Public Key Encryption,Digital Signature ,Firewall,

Institution
Course

Content preview

[ Computer Network ]
[ Unit 6 ]




 [ Network Security ]



Computer network security consists of measures taken by business or some
organizations to monitor and prevent unauthorized access from the outside
attackers.

Different approaches to computer network security management have different
requirements depending on the size of the computer network. For example, a home
office requires basic network security while large businesses require high
maintenance to prevent the network from malicious attacks.

Network Administrator controls access to the data and software on the network.
A network administrator assigns the user ID and password to the authorized
person.

Aspects of Network Security:

Following are the desirable properties to achieve secure communication:

,o Privacy:

Privacy means both the sender and the receiver expects
confidentiality. The transmitted message should be sent only to the
intended receiver while the message should be opaque for other users. Only
the sender and receiver should be able to understand the transmitted
message as eavesdroppers can intercept the message. Therefore, there is a
requirement to encrypt the message so that the message cannot be
intercepted. This aspect of confidentiality is commonly used to achieve
secure communication.

o Message Integrity:

Data integrity means that the data must arrive at the receiver
exactly as it was sent. There must be no changes in the data content during
transmission, either maliciously or accident, in a transit. As there are more
and more monetary exchanges over the internet, data integrity is more
crucial. The data integrity must be preserved for secure communication.

o End-point authentication:

Authentication means that the receiver is sure of the sender?s
identity, i.e., no imposter has sent the message.

o Non-Repudiation:

Non-Repudiation means that the receiver must be able to prove that
the received message has come from a specific sender. The sender must not
deny sending a message that he or she send. The burden of proving the
identity comes on the receiver. For example, if a customer sends a request
to transfer the money from one account to another account, then the bank
must have a proof that the customer has requested for the transaction.

,  [ Privacy ]



The concept of how to achieve privacy has not been changed for thousands of
years: the message cannot be encrypted. The message must be rendered as opaque
to all the unauthorized parties. A good encryption/decryption technique is used to
achieve privacy to some extent. This technique ensures that the eavesdropper
cannot understand the contents of the message.

Encryption/Decryption

Encryption: Encryption means that the sender converts the original information
into another form and sends the unintelligible message over the network.

Decryption: Decryption reverses the Encryption process in order to transform the
message back to the original form.

The data which is to be encrypted at the sender site is known as plaintext, and the
encrypted data is known as ciphertext. The data is decrypted at the receiver site.

There are two types of Encryption/Decryption techniques:

o Privacy with secret key Encryption/Decryption
o Privacy with public key Encryption/Decryption

Written for

Institution
Course

Document information

Uploaded on
September 4, 2022
Number of pages
20
Written in
2021/2022
Type
Class notes
Professor(s)
Mrs. sairabanu s.pansare
Contains
All classes

Subjects

$6.89
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
VikaskumarDane

Also available in package deal

Get to know the seller

Seller avatar
VikaskumarDane Dr. Babasaheb Ambedkar Technological University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
9
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions