Networking
Network Security and Encryption, CBSE Class 10 ICT Notes
Complete notes on network security and encryption for CBSE Class 10 ICT. Covers firewalls, encryption, decryption, digital signatures, and SSL.
Network security and encryption are critical topics in CBSE Class 10 ICT. As more of our daily activities move online, understanding how to protect data and networks becomes essential. This chapter covers threats, security measures, encryption methods, and digital safety.
What is Network Security?
Network Security is the practice of protecting a computer network and its data from unauthorized access, misuse, or theft. It involves both hardware and software technologies.
Goals of Network Security
Network security aims to protect three key aspects, known as the CIA Triad:
| Aspect | Meaning |
|---|---|
| Confidentiality | Only authorized people can access the data |
| Integrity | Data is not altered or tampered with during transmission |
| Availability | Data and systems are available when needed |
Network Security Threats
Types of Attacks
| Attack | Description |
|---|---|
| Eavesdropping | Intercepting data being transmitted over a network |
| Data Modification | Altering data during transmission |
| Identity Spoofing | Pretending to be someone else to gain access |
| Denial of Service (DoS) | Flooding a network or server to make it unavailable |
| Man-in-the-Middle | Intercepting communication between two parties |
| Password Attack | Trying to crack or guess passwords |
| SQL Injection | Inserting malicious code into database queries |
Common Security Threats
- Viruses - Programs that replicate and damage files
- Worms - Self-replicating programs that spread over networks
- Trojans - Malware disguised as legitimate software
- Spyware - Software that secretly monitors user activity
- Ransomware - Malware that encrypts files and demands payment
- Phishing - Fake websites/emails to steal personal information
Security Measures
1. Firewall
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
| Type | Description |
|---|---|
| Hardware Firewall | Physical device placed between your network and the Internet |
| Software Firewall | Program installed on your computer (e.g., Windows Firewall) |
How a firewall works:
- It examines each data packet entering or leaving the network, It compares the packet against a set of rules, If the packet matches an allowed rule, it passes through, If the packet matches a blocked rule or is suspicious, it is dropped
2. Antivirus Software
Antivirus software detects, prevents, and removes malware. It should be:
- Updated regularly with the latest virus definitions, Set to perform automatic scans, Configured for real-time protection
3. Strong Passwords
Rules for strong passwords:
- Minimum 8-12 characters, Mix of uppercase and lowercase letters, Include numbers and special characters, Change regularly, Use different passwords for different accounts
4. Regular Updates
Keeping your operating system, browser, and software updated is crucial because updates often include security patches that fix known vulnerabilities.
What is Encryption?
Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key. Only someone with the correct key can convert it back to readable form.
Key Terms
| Term | Definition |
|---|---|
| Plaintext | The original readable message |
| Ciphertext | The encrypted (unreadable) message |
| Encryption | Converting plaintext to ciphertext |
| Decryption | Converting ciphertext back to plaintext |
| Key | A secret value used for encryption and decryption |
| Algorithm | The mathematical method used for encryption |
How Encryption Works
Plaintext: "HELLO"
|
v (Encryption using key)
Ciphertext: "KHOOR"
|
v (Decryption using key)
Plaintext: "HELLO"
Caesar Cipher (Shift Cipher)
The Caesar Cipher is one of the simplest encryption methods. Each letter is shifted by a fixed number of positions in the alphabet.
Example with shift of 3:
| Plaintext | A | B | C | D | E | F | G | H | I | J | K | L | M |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ciphertext | D | E | F | G | H | I | J | K | L | M | N | O | P |
| Plaintext | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ciphertext | Q | R | S | T | U | V | W | X | Y | Z | A | B | C |
Encrypting "HELLO" with shift 3:
- H -> K, E -> H, L -> O, L -> O, O -> R
Result: "KHOOR"
Decrypting "KHOOR" with shift 3 (shift back):
- K -> H, H -> E, O -> L, O -> L, R -> O
Result: "HELLO"
Types of Encryption
1. Symmetric Encryption
In symmetric encryption, the same key is used for both encryption and decryption.
| Feature | Detail |
|---|---|
| Keys used | One key (same for encryption and decryption) |
| Speed | Faster |
| Security | Key must be shared securely |
| Example | AES, DES, Caesar Cipher |
2. Asymmetric Encryption
In asymmetric encryption, two different keys are used, a public key for encryption and a private key for decryption.
| Feature | Detail |
|---|---|
| Keys used | Two keys (public key and private key) |
| Speed | Slower than symmetric |
| Security | More secure, no need to share private key |
| Example | RSA, ECC |
Comparison
| Feature | Symmetric | Asymmetric |
|---|---|---|
| Number of keys | One | Two (public + private) |
| Speed | Faster | Slower |
| Key sharing | Key must be shared | Only public key is shared |
| Security | Less secure (shared key) | More secure |
| Use case | Bulk data encryption | Small data, digital signatures |
Digital Signature
A digital signature is an electronic equivalent of a handwritten signature. It verifies the identity of the sender and ensures the message has not been altered.
How Digital Signatures Work
- The sender creates a hash (mathematical summary) of the message
- The hash is encrypted using the sender's private key - this is the digital signature
- The message and digital signature are sent to the receiver
- The receiver decrypts the signature using the sender's public key
- The receiver creates a hash of the received message
- If both hashes match, the message is authentic and unaltered
Benefits of Digital Signatures
- Authentication - Confirms the identity of the sender
- Integrity - Ensures the message was not modified
- Non-repudiation - Sender cannot deny having sent the message
- Legal validity - Accepted in Indian law under the IT Act, 2000
SSL/TLS and HTTPS
SSL (Secure Sockets Layer)
SSL (and its successor TLS - Transport Layer Security) is a protocol that encrypts data transmitted between a web browser and a web server.
HTTPS
HTTPS (HTTP Secure) is the secure version of HTTP. It uses SSL/TLS to encrypt data.
How to identify HTTPS:
- The URL starts with
https://instead ofhttp:// - A padlock icon appears in the browser address bar, The connection is encrypted
Why HTTPS Matters
- Encrypts data between browser and server
- Prevents eavesdropping on sensitive information
- Required for banking, shopping, and login pages
- Builds trust with users
- Improves search ranking on Google
VPN (Virtual Private Network)
A VPN creates a secure, encrypted connection over a public network (like the Internet). It provides privacy by masking your IP address and encrypting your Internet traffic.
Benefits of VPN
- Privacy - Hides your IP address and location
- Security - Encrypts all Internet traffic
- Access - Can access region-restricted content
- Safety on public Wi-Fi - Protects data on unsecured networks
Two-Factor Authentication (2FA)
Two-Factor Authentication adds an extra layer of security by requiring two forms of identification:
- Something you know - Password or PIN
- Something you have - Phone (OTP), security token
- Something you are - Fingerprint, face recognition
Example: When you log into your bank website, you enter your password (factor 1) and then receive an OTP on your phone (factor 2).
Important Questions
Q1. What is encryption? How is it different from decryption?
Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key to protect it from unauthorized access. Decryption is the reverse process of converting ciphertext back into readable plaintext using a key. Encryption protects data during transmission, while decryption restores the original data for the intended recipient.
Q2. Differentiate between symmetric and asymmetric encryption.
Symmetric encryption uses the same key for both encryption and decryption. It is faster but less secure because the key must be shared. Asymmetric encryption uses two keys, a public key for encryption and a private key for decryption. It is slower but more secure because the private key is never shared. Example of symmetric: AES. Example of asymmetric: RSA.
Q3. What is a digital signature? List its benefits.
A digital signature is an electronic equivalent of a handwritten signature that verifies the sender's identity and ensures message integrity. Its benefits are authentication (confirms sender identity), integrity (ensures the message was not tampered with), non-repudiation (sender cannot deny sending the message), and legal validity (accepted under Indian IT Act, 2000).
Q4. What is a firewall? Explain its types.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on security rules. There are two types: Hardware firewall, which is a physical device placed between your network and the Internet, and Software firewall, which is a program installed on your computer like Windows Firewall. Firewalls protect networks from unauthorized access and malicious traffic.
Quick Revision
- CIA Triad: Confidentiality, Integrity, Availability
- Encryption: Plaintext to Ciphertext; Decryption: Ciphertext to Plaintext
- Symmetric encryption: one key; Asymmetric: two keys (public + private)
- Caesar Cipher: simple shift-based encryption
- Digital Signature: verifies sender identity and message integrity
- SSL/TLS: encrypts web traffic; HTTPS = HTTP + SSL
- Firewall: monitors and controls network traffic
- VPN: encrypted connection over public network
- 2FA: two forms of authentication for extra security
Want to learn more?
Explore free chapter-wise notes with quizzes and code playground
Prefer watching over reading?
Subscribe for free.