yeah
-
-
hey I stand by your back with another
video for a chance in place neighbors
this is the second video for a playlist
network security concepts algorithms and
portals
this video is a continuation of the
previous video and this too is going to
be more theoretical and conceptual video
if you haven't seen the first video
have a look at it as it will be as a
basic concepts of network security
so the name suggests we are going to be
looking at the principles of network
security and the concept of cryptography
ok so let's get started with today's
topic
so today we're going to be learning some
principles of network security and that
needs to be taken into consideration
when we implement the network security
over the network
we also want to learn the concept of
cryptography and see a basic example of
hard walks
so good of the principles of network
security which need to be taken into
consideration when implementing that
once you get the efficiently
following the principles of network
security confidentiality authentication
integrity non-repudiation access control
and availability
so let's take a closer look at all these
principles the principle of
confidentiality
this principle specifies that only the
center and intended recipient surely
will access the contents of a message on
foreign charity gets launched or
compromised if an underage boys and is
able to access a message
interception attacks usually cause loss
of confidentiality
flashing the background there are two
losers is involved having a conversation
while another user palm and deserve
their conversation
this causes loss of confidentiality in
the ball bananas boom on distributed by
any third person
now let's have a look at the principle
of authentication
authentication mechanism helps establish
proof of white in duties
this process ensures that the origin of
an electronic message or document is
correctly identified for example if it
is involved one to have a conversation
with this third floor tom is God himself
as Alice and talks to call for example
and it involved want to have a
conversation when this started on this
guy sees himself as Alice and box the
ball now due to lack of authentication
bob has no idea that he's talking to tom
in this case the principle of
authentication is defeated
now let's have a look at the principle
of integrity and the contents of a
message that changed after the sender
sends it where before it reaches the
intended recipient
we see that the integrity of the
messages lost modification attacks
usually cause most of integrity as shown
in the example this motion transfer
hundred dollars to Tom's account what
bomb or does a transaction and
transferred 200 in his account by
modifying the transactions among does
losing the message integrity
now let's have a look at the principle
of non-discrimination there are
situations when a user sends a message
and lived around refuses that she send
that message
the principle of moderation the first
such possibility of the names and think
having been there
that means non-regulation does not allow
the center of a message to the food the
flame of not sending that message for
example and is concerned of one transfer
request to bank order in dinner after
the band performs of one transferred as
paralysis instruction
she could leave that she nervous in the
foreign transfer instruction to the bank
does Anna's repairs organizer for
transfer instruction
let's have a look at principle of access
control the principal axis control the
minds and should be able to access water
access control is related to rural
management and do manage management
concentrate on the USA
well management person too so say for
example we have to users
Allison fall and this is admin and tom
is a normal user so admin should be able
to access the database and bond should
not be able to access the database
access control mechanism and show such
functionality
let's have a look at the principle of
availability
the principle of availability students
that is true sir should be available to
authorize parties at all times
international banks usually put the
availability of resources in danger
for example due to intentional actions
have been monitoring the tone and
authorized user Alice may not be able to
contact the band service for certain
services and understood understood the
principles of network security and why
they're important
let's have a look at the concept of
cryptography
before I can do the technical definition
I'll give an example by showing a simple
scenario with our favorite Alice Bob and
Tom characters so here's the scene
Alice and Bob wants to communicate with
each other
now this time Allison bar smart enough
to know that there could be a third
person listening to their conversation
with a network
she wants to send the confidential
message so for example
ABC she places each alphabet of the text
that lies to places i heard of the
characters that is is replaced with see
be the place would be and c zp study now
this process is called encryption
we assumed that Bob who's this technique
in this case after applying this
technique
Alice convert the plain text - what we
call the ciphertext
she says the cipher text or the network
and as usual at third character Tom
captures this message
he gets silly and thinks he's got
something confidential village that's
not the original message for you from
this thing you in good language mean way
as the message is Bob he pleases
each character with new positions
proceeding with the current position of
the character
to get the original message ABC now this
process is called description in a very
simple and cool it
we r 0 confidentiality as message was
safely transferred between the valid and
legitimate users is a very different
definition of the European sometimes
associated with it
cryptography is the art of achieving
security the encoding messages to make
them non-delivery the sounds complicated
eight
it's not the same thing that Allison Bob
gesture in the example that I showed you
cleared extra feel mix signifies a
message that can be understood by the
center that is he went on to anyone who
gets an access to that message and leave
Texas qualifier using any suitable
scheme reserving messages called cipher
text and it is available only to those
who know the encoding and decoding
process of that particular scheme
encryption the process of converting the
index to cipher text using some encoding
scheme
-
description is the process of
converting cipher text back to clean
best using a decoding skills
now depending on how the plaintext is
converted to cipher text
there are two techniques
force the solution technique in this
technique the characters of clamtxt
replaced by other characters numbers or
symbols
the second technique is transportation
technique for the plaintiffs characters
are itself scrambled in a certain
pattern to get the cipher text for
example in this case the characters ABCD
replaced with numbers one two three four
so this is an example of substitution as
those characters are replaced but a
dozen balls are numbers
let's take an example of transformation
techniques for the character in BCD a
strap and you get a cipher text which is
bacc so the conservative positions there
is a beast who have to be in serious
lapse do you see this is an example of
transportation technique selected for
this video guys in the next video we
start learning some practical
cryptographic algorithms and started
working
if you liked this video give it a thumbs
up and share in the difference
who let me know your reviews and
solutions rather open some comments to
make sure you subscribe to a child as we
get notified when we upload the next
video peace
yeah
