{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

ppt on networksecurity

ppt on networksecurity - TECHNOPLEXUS08 Balaji Institute of...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
TECHNOPLEXUS’08 Balaji Institute of Technology & Science Laknepally, NARSAMPET, Dist: Warangal. NETWORK SECURITY STUFF PRESENTED BY: P.HRIDAY ( [email protected] ) G.VENKATARAMANA ([email protected]) K.KARTHEEK ( [email protected] )
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
TECHNOPLEXUS’08 ABSTRACT “SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. In the real world as opposed to the cyber world an attack is often preceded by information gathering. Movie gangsters “case the joint”; soldiers “scout the area”. This is also true in the cyber world. Here the “bad guys” are referred to as intruders, eavesdroppers, hackers, hijackers, etc. The intruders would first have a panoramic view of the victims network and then start digging the holes. Today the illicit activities of the hackers are growing by leaps and bounds, viz., “THE RECENT ATTACK ON THE DNS SERVERS HAS CAUSED A LOT OF HULLABALOO ALL OVER THE WORLD”. However, fortunately, the antagonists reacted promptly and resurrected the Internet world from the brink of prostration. Since the inception of conglomerating Computers with Networks the consequence of which shrunk the communication world, hitherto, umpteen ilks of security breaches took their origin. Tersely quoting some security ditherers – Eavesdropping, Hacking, Hijacking, Mapping, Packet Sniffing, 1Spoofing, DoS & DDoS attacks, etc. Newton’s law says “Every action has got an equal but opposite reaction”. So is the case with this. Nevertheless the security breaches and eavesdroppers, the technological prowess has been stupendously developed to defy against each of the assaults. Our paper covers the ADVANCED technical combats that have been devised all through the way, thus giving birth to the notion of “NETWORK -SECURITY”. Various antidotes that are in fact inextricable with security issues are – Cryptography, Authentication, Integrity and Non Repudiation, Key Distribution and certification, Access control by implementing Firewalls etc. To satiate the flaws in the network security more and more advanced security notions are being devised day by day. Our paper covers a wide perspective of such arenas where the contemporary cyber world is revolving around viz., , THE DMZ ZONE, PALLADIUM CRYPTOGRAPHY, IP Sec & KERBEROS AUTHENTICATION SYSTEM. Palladium is a content protection concept that has spawned from the belief that the PC, as it currently stands, is not architecturally equipped to protect a user from the pitfalls and challenges that an all-pervasive network such as the Internet poses. In the course of this paper the revolutionary aspects of palladium are discussed in detail. Case study to restructure the present data security system of JNTU examination system using palladium is put forward.
Image of page 2
TECHNOPLEXUS’08 PREFATORY REMARKS Network security is indeed the crux of discussion amongst all computer enthusiasts and it has also become a major concern in boardrooms across the globe.
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern