Networking

Network Security and Encryption, CBSE Class 10 ICT Notes

Complete notes on network security and encryption for CBSE Class 10 ICT. Covers firewalls, encryption, decryption, digital signatures, and SSL.

Network security and encryption are critical topics in CBSE Class 10 ICT. As more of our daily activities move online, understanding how to protect data and networks becomes essential. This chapter covers threats, security measures, encryption methods, and digital safety.

What is Network Security?

Network Security is the practice of protecting a computer network and its data from unauthorized access, misuse, or theft. It involves both hardware and software technologies.

Goals of Network Security

Network security aims to protect three key aspects, known as the CIA Triad:

Aspect Meaning
Confidentiality Only authorized people can access the data
Integrity Data is not altered or tampered with during transmission
Availability Data and systems are available when needed

Network Security Threats

Types of Attacks

Attack Description
Eavesdropping Intercepting data being transmitted over a network
Data Modification Altering data during transmission
Identity Spoofing Pretending to be someone else to gain access
Denial of Service (DoS) Flooding a network or server to make it unavailable
Man-in-the-Middle Intercepting communication between two parties
Password Attack Trying to crack or guess passwords
SQL Injection Inserting malicious code into database queries

Common Security Threats

  1. Viruses - Programs that replicate and damage files
  2. Worms - Self-replicating programs that spread over networks
  3. Trojans - Malware disguised as legitimate software
  4. Spyware - Software that secretly monitors user activity
  5. Ransomware - Malware that encrypts files and demands payment
  6. Phishing - Fake websites/emails to steal personal information

Security Measures

1. Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Type Description
Hardware Firewall Physical device placed between your network and the Internet
Software Firewall Program installed on your computer (e.g., Windows Firewall)

How a firewall works:

  • It examines each data packet entering or leaving the network, It compares the packet against a set of rules, If the packet matches an allowed rule, it passes through, If the packet matches a blocked rule or is suspicious, it is dropped

2. Antivirus Software

Antivirus software detects, prevents, and removes malware. It should be:

  • Updated regularly with the latest virus definitions, Set to perform automatic scans, Configured for real-time protection

3. Strong Passwords

Rules for strong passwords:

  • Minimum 8-12 characters, Mix of uppercase and lowercase letters, Include numbers and special characters, Change regularly, Use different passwords for different accounts

4. Regular Updates

Keeping your operating system, browser, and software updated is crucial because updates often include security patches that fix known vulnerabilities.

What is Encryption?

Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key. Only someone with the correct key can convert it back to readable form.

Key Terms

Term Definition
Plaintext The original readable message
Ciphertext The encrypted (unreadable) message
Encryption Converting plaintext to ciphertext
Decryption Converting ciphertext back to plaintext
Key A secret value used for encryption and decryption
Algorithm The mathematical method used for encryption

How Encryption Works

Plaintext: "HELLO"
    |
    v  (Encryption using key)
Ciphertext: "KHOOR"
    |
    v  (Decryption using key)
Plaintext: "HELLO"

Caesar Cipher (Shift Cipher)

The Caesar Cipher is one of the simplest encryption methods. Each letter is shifted by a fixed number of positions in the alphabet.

Example with shift of 3:

Plaintext A B C D E F G H I J K L M
Ciphertext D E F G H I J K L M N O P
Plaintext N O P Q R S T U V W X Y Z
Ciphertext Q R S T U V W X Y Z A B C

Encrypting "HELLO" with shift 3:

  • H -> K, E -> H, L -> O, L -> O, O -> R

Result: "KHOOR"

Decrypting "KHOOR" with shift 3 (shift back):

  • K -> H, H -> E, O -> L, O -> L, R -> O

Result: "HELLO"

Types of Encryption

1. Symmetric Encryption

In symmetric encryption, the same key is used for both encryption and decryption.

Feature Detail
Keys used One key (same for encryption and decryption)
Speed Faster
Security Key must be shared securely
Example AES, DES, Caesar Cipher

2. Asymmetric Encryption

In asymmetric encryption, two different keys are used, a public key for encryption and a private key for decryption.

Feature Detail
Keys used Two keys (public key and private key)
Speed Slower than symmetric
Security More secure, no need to share private key
Example RSA, ECC

Comparison

Feature Symmetric Asymmetric
Number of keys One Two (public + private)
Speed Faster Slower
Key sharing Key must be shared Only public key is shared
Security Less secure (shared key) More secure
Use case Bulk data encryption Small data, digital signatures

Digital Signature

A digital signature is an electronic equivalent of a handwritten signature. It verifies the identity of the sender and ensures the message has not been altered.

How Digital Signatures Work

  1. The sender creates a hash (mathematical summary) of the message
  2. The hash is encrypted using the sender's private key - this is the digital signature
  3. The message and digital signature are sent to the receiver
  4. The receiver decrypts the signature using the sender's public key
  5. The receiver creates a hash of the received message
  6. If both hashes match, the message is authentic and unaltered

Benefits of Digital Signatures

  1. Authentication - Confirms the identity of the sender
  2. Integrity - Ensures the message was not modified
  3. Non-repudiation - Sender cannot deny having sent the message
  4. Legal validity - Accepted in Indian law under the IT Act, 2000

SSL/TLS and HTTPS

SSL (Secure Sockets Layer)

SSL (and its successor TLS - Transport Layer Security) is a protocol that encrypts data transmitted between a web browser and a web server.

HTTPS

HTTPS (HTTP Secure) is the secure version of HTTP. It uses SSL/TLS to encrypt data.

How to identify HTTPS:

  • The URL starts with https:// instead of http://
  • A padlock icon appears in the browser address bar, The connection is encrypted

Why HTTPS Matters

  1. Encrypts data between browser and server
  2. Prevents eavesdropping on sensitive information
  3. Required for banking, shopping, and login pages
  4. Builds trust with users
  5. Improves search ranking on Google

VPN (Virtual Private Network)

A VPN creates a secure, encrypted connection over a public network (like the Internet). It provides privacy by masking your IP address and encrypting your Internet traffic.

Benefits of VPN

  1. Privacy - Hides your IP address and location
  2. Security - Encrypts all Internet traffic
  3. Access - Can access region-restricted content
  4. Safety on public Wi-Fi - Protects data on unsecured networks

Two-Factor Authentication (2FA)

Two-Factor Authentication adds an extra layer of security by requiring two forms of identification:

  1. Something you know - Password or PIN
  2. Something you have - Phone (OTP), security token
  3. Something you are - Fingerprint, face recognition

Example: When you log into your bank website, you enter your password (factor 1) and then receive an OTP on your phone (factor 2).

Important Questions

Q1. What is encryption? How is it different from decryption?

Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key to protect it from unauthorized access. Decryption is the reverse process of converting ciphertext back into readable plaintext using a key. Encryption protects data during transmission, while decryption restores the original data for the intended recipient.

Q2. Differentiate between symmetric and asymmetric encryption.

Symmetric encryption uses the same key for both encryption and decryption. It is faster but less secure because the key must be shared. Asymmetric encryption uses two keys, a public key for encryption and a private key for decryption. It is slower but more secure because the private key is never shared. Example of symmetric: AES. Example of asymmetric: RSA.

Q3. What is a digital signature? List its benefits.

A digital signature is an electronic equivalent of a handwritten signature that verifies the sender's identity and ensures message integrity. Its benefits are authentication (confirms sender identity), integrity (ensures the message was not tampered with), non-repudiation (sender cannot deny sending the message), and legal validity (accepted under Indian IT Act, 2000).

Q4. What is a firewall? Explain its types.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on security rules. There are two types: Hardware firewall, which is a physical device placed between your network and the Internet, and Software firewall, which is a program installed on your computer like Windows Firewall. Firewalls protect networks from unauthorized access and malicious traffic.

Quick Revision

  • CIA Triad: Confidentiality, Integrity, Availability
  • Encryption: Plaintext to Ciphertext; Decryption: Ciphertext to Plaintext
  • Symmetric encryption: one key; Asymmetric: two keys (public + private)
  • Caesar Cipher: simple shift-based encryption
  • Digital Signature: verifies sender identity and message integrity
  • SSL/TLS: encrypts web traffic; HTTPS = HTTP + SSL
  • Firewall: monitors and controls network traffic
  • VPN: encrypted connection over public network
  • 2FA: two forms of authentication for extra security

Want to learn more?

Explore free chapter-wise notes with quizzes and code playground

Prefer watching over reading?

Subscribe for free.

Subscribe on YouTube