KEMBAR78
Intro to Cryptography Basics | PDF | Information Security | Vulnerability (Computing)
0% found this document useful (0 votes)
99 views22 pages

Intro to Cryptography Basics

This document provides an introduction to cryptography. It defines cryptography as the science of secret writing and discusses how it refers to securing messages to make them immune to attacks. The document then discusses different categories of security including application security, computer security, data security, information security, and network security. It also covers security concepts, trends in security including common vulnerabilities and incidents, and references for further reading on cryptography and security.

Uploaded by

Arghadeep Ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views22 pages

Intro to Cryptography Basics

This document provides an introduction to cryptography. It defines cryptography as the science of secret writing and discusses how it refers to securing messages to make them immune to attacks. The document then discusses different categories of security including application security, computer security, data security, information security, and network security. It also covers security concepts, trends in security including common vulnerabilities and incidents, and references for further reading on cryptography and security.

Uploaded by

Arghadeep Ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Introduction to

Cryptography
Lecture 1
Cryptography-Introduction

◼ Cryptography, a word with Greek origins


◼ kryptós means hidden or secret

◼ graphein means writing

◼ Cryptography - secret writing

◼ However, we use the term to refer to the


science and art of transforming messages
to make them secure and immune to
attacks.
2
Cryptography-Introduction

3
Cryptography-Introduction

4
Introduction

◼ Security is the degree of protection against


danger, damage, loss, and crime.
◼ Security as a form of protection are structures and
processes that provide or improve security as a
condition.
◼ a form of protection where a separation is created
between the assets and the threat.
◼ Related concepts
◼ Safety
◼ Continuity
◼ Reliability
5
6
Security Categorization

IT realm Political Physical realm


◼ Application ◼ Homeland security ◼ Airport security
security ◼ Human security ◼ Port
◼ Computer security ◼ International security/Supply
◼ Data security security chain security
◼ Information ◼ National security ◼ Food security
security ◼ Public security ◼ Home security
◼ Network security ◼ School security
◼ Shopping centre
security
Monetary ◼ Infrastructure
◼ Financial security security

...
◼ Aviation security

&
7
Security in IT Realm

Application Security
◼ encompasses measures taken throughout the
application's life-cycle to prevent exceptions in
the security policy of an application or the
underlying system (vulnerabilities) through flaws
in the design, development, deployment,
upgrade, or maintenance of the application.

◼ Web applications, Mobile applications


8
Security in IT Realm

Computer Security
◼ branch of computer technology known as information
security as applied to computers and networks.
◼ protection of information and property from theft,
corruption, or natural disaster, while allowing the
information and property to remain accessible and
productive to its intended users.
◼ The term computer system security means the collective
processes and mechanisms by which sensitive and
valuable information and services are protected from
publication, tampering or collapse by unauthorized
activities or untrustworthy individuals and unplanned
events respectively. 9
Security in IT Realm

Data Security
◼ the means of ensuring that data is kept safe from
corruption and that access to it is suitably controlled.
◼ Thus data security helps to ensure privacy.
◼ It also helps in protecting personal data.

Methods
◼ Disk Encryption
◼ Hardware based Mechanisms for Protecting Data
◼ Backups
◼ Data Masking
◼ Data Erasure
10
Security in IT Realm

Information Security
◼ protecting information and information systems from
unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or
destruction.

Key Concepts
◼ Confidentiality
◼ Integrity
◼ Availability
◼ Authenticity
◼ Non-repudiation
11
Security Concepts

◼ Assurance - assurance is the level of guarantee that a


security system will behave as expected
◼ Countermeasure - a countermeasure is a way to stop a
threat from triggering a risk event
◼ Defence in depth - never rely on one single security
measure alone
◼ Exploit - a vulnerability that has been triggered by a
threat - a risk of 100%
◼ Risk - a risk is a possible event which could cause a loss
◼ Threat - a threat is a method of triggering a risk event
that is dangerous
◼ Vulnerability - a weakness in a target that can potentially
be exploited by a threat security 12
Security Trends
◼ The trend in Internet-related vulnerabilities reported to
Computer Emergency Response Team (CERT)
Coordination Centre (CERT/CC) include
◼ security weaknesses in the operating systems of attached
computers (e.g., Windows, Linux)
◼ vulnerabilities in Internet routers and other network devices.

◼ Security-related incidents reported to CERT include


◼ denial of service attacks; IP spoofing, in which intruders
create packets with false IP addresses and exploit
applications that use authentication based on IP;
◼ various forms of eavesdropping and packet sniffing, in
which attackers read transmitted information, including
logon information and database contents. 13
Security Trends

https://iq.govwin.com/neo/marketAnalysis/view/530
14
Security Trends

https://www.statista.com/statistics/677015/number-
cyber-incident-reported-usa-gov/ 15
https://economictimes.indiatimes.com/tech/ites/over-53000-
cyber-security-incidents-observed-in-
2017/articleshow/62852008.cms

16
https://inc42.com/buzz/3-94-lakh-cybersecurity-
incidents-in-2019-as-per-cert-data-meity/

17
https://economictimes.indiatimes.com/tech/internet/view-make-
cert-in-liable-to-notify-victims-of-
cyberattacks/articleshow/71998076.cms

18
https://cio.economictimes.indiatimes.com/news/digital-
security/cert-in-is-warning-about-new-tycoon-virus-
targeting-your-pc/76742908

19
https://timesofindia.indiatimes.com/gadgets-news/cloud-
based-cyber-attacks-increased-630-globally-between-
january-to-april-this-year-report/articleshow/76036079.cms

20
https://www.firstpost.com/business/coronavirus-outbreak-
bse-cautions-market-intermediaries-against-malicious-
cyber-attacks-8247181.html

21
References

◼ Chapter 1 - Behrouz A Forouzan, Debdeep


Mukhopadhyay, Cryptography and Network
Security, Mc Graw Hill, 3rd Edition, 2015.

◼ Chapter 1 - William Stallings, Cryptography


and Network Security Principles and
Practices, 7th Edition, Pearson Education,
2017.
◼ CERT-INDIA. https://cert-in.org.in/
22

You might also like