You are on page 1of 15

Cyber Security

Ms. Nabeela Bibi


Symmetric Cryptographic Algorithms
● Symmetric-key algorithms are algorithms for cryptography that use the
same cryptographic keys for both the encryption of plaintext and the
decryption of ciphertext. The keys may be identical, or there may be a
simple transformation to go between the two keys.
● As the name implies, symmetric encryption works through a sense of symmetry
between both ends (encryption and decryption) of the process.
Asymmetric Cryptographic Algorithms
A completely different approach from symmetric cryptography is asymmetric
cryptographic algorithms, also known as public key cryptography.
Asymmetric encryption uses two keys instead of only one. These keys are mathematically
related and are called the public key and the private key.
The public key is known to everyone and can be freely distributed, while the private key is
known only to the individual to whom it belongs.
When Bob wants to send a secure message to Alice, he uses Alice’s public key to encrypt
the message. Alice then uses her private key to decrypt it.

3
Difference between Symmetric vs Asymmetric
Encryption
Symmetric Encryption Asymmetric Encryption
• Uses a single key to encrypt and decrypt data • Uses a public key to encrypt data and a private key to
decrypt data
• Faster encryption process • Slower encryption process
• Example key sizes are 128 or 256-bit long • Example key sizes are 2048-bit or longer

• Doesn’t use a lot of resources • Uses more resources


• Cipher text is smaller, or the same size as the original plain • Cipher text is larger or the same size as the original cipher
text text
• Both symmetric and asymmetric algorithms provide • Both symmetric and asymmetric algorithms provide
authentication capability authentication capability. Only non-repudiation can be
achieved using an asymmetric algorithm.

• Example algorithms are AES, DES, 3DES, IDEA and • Example algorithms are RSA, ECC, DSA and El Gamal
Blowfish algorithms
• Better at handling and transferring large amounts of data • Better at handling and transferring smaller amounts of data
• Often used for bulk data encryption, such as file or disk • Typically used for key exchange, digital signatures, and
encryption. securing communication channels over insecure networks
like the internet.
5
What is VPN?
● A VPN, which stands for virtual private network, is a type of online service that
allows you to hide your browsing activity, identity, and location while
browsing the internet.
How VPN works?
● Typically, in order to access the internet, your computer creates a public
connection to your internet service provider, or ISP. A VPN creates a private
connection between your computer and a remote server, owned by the VPN
provider. This digital connection, or tunnel, encrypts your data so that no one
else can see it. It also masks your IP address so that no one else can trace you.
As a result, your online experience is safer, more secure, and more
anonymous.
● VPN helps you hide your online activity and surf the internet
anonymously. It does this in two primary ways: by masking your IP
address and encrypting your internet traffic.
How VPN works?
1. Safe remote access: Employees working remotely need a VPN to access office networks and company
resources without compromising their security. If you access your company’s internal network without a VPN,
any outsider can easily access the network and steal sensitive information.
2. Easy access to geo-restricted content: Professionals often need to access websites and resources that are
not always available in their region. A VPN allows you to change your IP address to the location where the
content is available so you can access it with ease.
3. Protect employees’ privacy: ISPs, government agencies, and marketing companies are always tracking users’
online activity. This is a serious breach of privacy. Using a VPN lets you protect your privacy as no outsider can
track your traffic when it’s encrypted.
4. Use open networks safely: If you run a restaurant or any business that provides customers with free WiFi,
you need to take precautionary measures to protect your own devices. Open WiFi networks are dangerous
because anyone can enter the network, bypass its security and gain access to other devices on the network. A
VPN ensures your device stays safe even if you’re using a public network.
What Does a VPN Protect You From?

A VPN protects you from anything that involves using your data without your consent. This includes
company and personal data breaches, identity theft, and malware attacks.
• Data breaches: A data breach occurs when an unauthorized individual gains access to
sensitive data that either belongs to a business or an individual. This information can either be
stolen or used to sabotage your business’ image in many ways. A VPN helps prevent data
breaches as it hides your employees’ internet activity. This means no one can intercept your
company’s data whether employees are working on-site or from home.
• Identity theft: A VPN helps protect your data. Cybercriminals cannot intercept your traffic and
gain access to your personal information when you have VPN protection. This reduces the risk
of you and your employees falling victim to identity theft.
• Malware attacks: If your business uses an open Wi-Fi network, a cybercriminal can easily
install malware on your network. This malicious software can breach your privacy, and inflict
damage to your business in many different ways. Using a VPN you can rest assured that no one
can bypass your internet security even if you’re on an open network.
Government agencies that influence cybersecurity
regulations
A VPN impacts almost all aspects of your online experience so there are quite
a few things that you need to consider. Here are the most important.
● Pricing
● Bandwidth Caps
● Internet Speed
● Data Security
● Server Network
● Number of Users/Devices
VPN Features to Look for
No Logs Policy
● A No Logs policy dictates that a VPN does not track any data on you whatsoever. This
means that no matter what you do online, no one can see your activity, not even the VPN
itself. Some of the top VPNs including NordVPN, CyberGhost VPN, and Surfshark follow a
strict No Logs policy.
● We recommend you use a VPN that has a no logs or zero logs policy to make sure your
data is private. If a VPN keeps logs on you, more often than not they do it to sell your
data to third parties.

Headquarter Location
● The country a VPN provider is based in matters a lot to your privacy. Some countries
mandate that VPNs must store users’ data and share it when requested by government
agencies. On the other hand, some countries have good privacy laws that allow VPNs to
protect your privacy and follow No Logs policies.
VPN Features to Look for
Dedicated IP Addresses
● When you use a VPN, you are assigned the IP address of the server you connect to. This
is a shared IP address that all users on the server are using. Shared IPs can sometimes
have a bad neighbor effect which means another user on the same server misusing the
IP address can have a negative impact on your internet experience.
● You can solve this problem by using a dedicated IP service. This is a unique IP address
supplied by the VPN service that only you can use.
Kill Switch
● The Kill Switch is an important precautionary feature that instantly cuts off your internet
connection if the VPN protection drops for some reason. This way, it prevents data
leakages and your data from falling into the wrong hands. All quality VPNs have a Kill
Switch feature.
Pros and Cons of Using a VPN
Pros
• Allows you to surf the internet anonymously
• Hides your internet activity from outsiders
• Keeps you safe from cybercriminals
• Allows you to access geo-restricted content
• Allows you to bypass ISP throttling
Cons
• Slows down your internet connection
• Low-quality VPNs may sell your data
• Bad neighbor effect with shared IP addresses
• Quality VPNs charge money
Thank you!

You might also like