{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

NETWORK SECURITY... - SECURITY USING FIREWALLS By:B.SAIRAM...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
SECURITY USING FIREWALLS By:- B.SAIRAM P.ARUN KUMAR CSE III Year, CSE III Year, V.I.T.S., KARIMNAGAR. V.I.T.S., KARIMNAGAR. e-mail: [email protected] [email protected]
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
ABSTRACT: In this age of universal electronic connectivity of viruses and hackers, of electronic Eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect the data and messages, and to protect systems from network based attacks. As we tend towards a more and more computer centric world, the concept of data security has attained a paramount importance. Though present day security systems offer a good level of protection, they are incapable of providing a “trust worthy” environment and are vulnerable to unexpected attacks. The generic name for the collection of tools design to protect data and to thwart hackers is computer security. In this technical paper we are introducing firewalls concept. The disciplines of firewall have matured, leading to the development of practical, readily available applications to enforce network security. Initially the paper discusses some threats to network security and entering into the firewall concept. The paper discusses the detailed use of a Firewall mechanisms for facing those network based attacks. It conclude with the difficulties Encountered in the implementation of firewalls.
Image of page 2
Security using firewalls With the increasing necessity of e-mail accessing and internet resources and the convenience it offers serious security concerns also arise. Internet is vulnerable to intruders who are always snooping to find open computers in the network to steal personal files, information or cause any damage. The loss of these records, e- mails or customer files, can be devastating. INTRODUCTION: A variety of technologies have been developed to help organizations secure their systems and information against intruders. These technologies help protect systems and information against attacks, detect unusual or suspicious activities, and respond to events that effects security. Network security is the process of preventing and detecting unauthorized use of the computer in the network. Prevention measures help stop unauthorized users (also known as “intruders”) from accessing any part of the computer system. Detection helps to determine whether or not someone attempted to break into the system, if they were successful, and what they may have done. A MODEL FOR NETWORK SECURITY: A model for much of what we will be discussing is captured , in very general terms, in the following figure . A message is to be transferred from one party to another across some sort of internet. The two parties, who are the principals in this transaction, must cooperate for the exchange to take place. A logical
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern