Network Security & Cryptography

Network Security & Cryptography - ISTE STUDENTS'...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
ISTE STUDENTS' CHAPTER PRESENTS TECHNOTRENDZ - 2007 Striving towards excellence A National Level Students Technical Symposium 17 th Sept. 2007 Authors: SRAVAN P SHANTHAN KUMAR D CSE III/IV CSE III/IV Email: sravan_kapi@yahoo.com Email: manu_shanthan@yahoo.co.in
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Abstract In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect the data and messages, and to protect systems from network based attacks. As we tend towards a more and more computer centric world, the concept of data security has attained a paramount importance. Though present day security systems offer a good level of protection, they are incapable of providing a “trust worthy” environment and are vulnerable to unexpected attacks. The generic name for the collection of tools design to protect data and to face hackers is computer security. In this technical paper we are introducing firewalls concept, popular networks, security services, security threats, security mechanisms, cryptography. The disciplines of firewall have matured, leading to the development of practical, readily available applications to enforce network security. Initially the paper discusses some threats to network security and entering into the firewall concept. The paper discusses the detailed use of Firewall mechanisms for facing those network based attacks. It conclude with the difficulties encountered in the implementation of firewalls
Background image of page 2
Introduction: A variety of technologies have been developed to help organizations secure their systems and information against intruders (unauthorized users). These technologies help protect systems and information against attacks, detect unusual or suspicious activities, and respond to events that effects security. Network security is the process of preventing and detecting unauthorized use of the computer in the network. Prevention measures help stops unauthorized users from accessing any part of the computer system. Detection helps to determine whether or not someone attempted to break into the system, if they were successful, and what they may have done. A basic understanding of computer networks is requisite in order to understand the principles of network security. In this section, we'll cover some of the foundations of computer networking, then move on to an overview of some popular networks. The impressive development of computer networks has reached the point, where security becomes essential. Overall users want to exchange data in a secure way. Network Security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/26/2011 for the course IT 101 taught by Professor Dontknow during the Spring '07 term at Northern Virginia.

Page1 / 11

Network Security & Cryptography - ISTE STUDENTS'...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online