Abstract on Network Security

Published on January 2017 | Categories: Documents | Downloads: 45 | Comments: 0 | Views: 364
of 3
Download PDF   Embed   Report

Comments

Content

Network security
Abstract:
This write-up concentrates on basics of network security. Network often attacked by different types of µsoftware hacking¶. How to guard from those attacks are being presented in this article. Types of application of network security also included.

Introduction:
A computer network is a group of computers that shares information across wireless or wired technology. The network topology defines the way in which computers, printers, and other devices are connected, physically and logically. A network topology which describes the layout of the wire and devices as well as the paths used by data transmissions and some commonly use network topologies (Bus, Star, Tree, Linear, Ring, Mesh). This paper introduces Cryptography Techniques. Cryptography is ³The science of protecting data´ & Network Security ³keeping information private and Secure from unauthorized Users´. This paper gives the Fundamental Requirements for the Data Transmission, the security attacks like Interruption, Interception and Modification of the data Transmission. The Cryptographic Process explaining through a generalized function is discussed through which encryption and decryption is done by the various algorithms like RSA algorithm, Hash Functions and many cryptographic algorithms.

Common security attacks:
Security attack over the network are exploiting software bugs, buffer overflows, TCP hijacking(transmission control protocol), packet sniffing. These security threats repelled by cryptography ,steganography ,attack graphs, obfuscation, virus scanners, firewalls, secure hardware. Cryptography:The art or science encompassing the principles and methods of transforming an intelligible message into unintelligibleone, and then retransforming that message back to original form. some Basic concepts are Plaintext, cipher text, cipher, key, code. ‡ Cryptography provides information security with improved authentication methods, message digests, digital signatures, and encrypted network communications

Crystographic schemes: Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals a) Secret key cryptography (or symmetric) : secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers

1

b) Public-key cryptography (or asymmetric) : PKC depends upon the existence of socalled one-way functions, that are easy to computer whereas their inverse function is difficult to compute c) Hash functions: Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key. Some of the other concepts such as Pretty Good privacy, password protection,link encryption ,end to end encryption are also used in network security.

Application of security:
a) Network Security for Web Conferencing: During a Web conference, data is temporarily stored on a shared Internet server. The primary risk of Web conferencing is the possibility that this data will leak beyond the realm of the conference and become accessible to hostile parties. That's why measures such as Secure Socket Layer (SSL) encryption, non-persistent data flow and intrusion control are essential to protecting data transmitted during a Web conference. Using this three-pronged approach dramatically minimizes the likelihood of an information leak. b) Implementation of biometrics based security: Biometric security offers a different method of authentication by using something that is far more unique than a password? Ourselves. A biometric is a physical trait? facial structure, eye colour, voice, iris pattern, and fingerprint.
y y y y

Fingerprint scanning essentially provides an identification of a person based on the acquisition & recognition of those unique & fingerprint this system comprise of a sensor for scanning a fingerprint and processor which stores fingerprint database&softwarewhich is matches to the predefined database. Within database a fingerprint usually matches to a reference number & pin number which matches person name & account In instances of security matches is generally used to allow or disallow access, but today this can also be used for something as simple as a time clock or payroll access

Bibliography:

1. ³Network Security´ Kaufman, Charlie et.al.,, Pearson Inc.NewDelhi 2002.,
Webliogrphy: 1. http://www.snort.org/ 2. http://www.nmap.org/ 3. http://lcamtuf.coredump.cx/newtcp/ 4. http://online.securityfocus.com/infocus/1527

2

presentation by K.Sivaganesh 2 nd year IT Gowrishankar 2 nd year IT Sri Shakthi Institute of Engineering and Technology.

3

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close