Network security&cryptography

Network security&cryptography - NETWORK SECURITY...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
NETWORK SECURITY & CRYPTOGRAPHY N.Srikar rao M.Ajay Kumar B.Tech III/IV, CSE B.Tech III/IV, CSE KITS Warangal KITS Warangal [email protected] Abstract “SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in “REAL WORLD” or in the “CYBER WORLD” .in this world as opposed to the cyber world an attack is often preceded by information gathering. In today's world of rapid expansion and computerization, the use of computer networks is becoming a necessity. The use of stand-alone computing is quickly becoming outdated. Computer systems are more than just hardware and software. As computers are linked together via computer networks, the data and software become more vulnerable to disturbance. The focus of the paper is on network security. Our paper covers different kinds of threats & firewalls in the network by implementation of different security services using various security mechanisms. The security mechanisms are primarily based on cryptographic algorithms like symmetric-DES, AES, asymmetric-RSA, ECC. Generally, the logical conclusion is to use both kind of algorithms and their combinations to achieve optimal speed and security levels. It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally.
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1.1 Introduction: Over the past several years, mainframe and minicomputers have been replaced by the computer network. When mainframe and minicomputers were purchased, they came with many built-in security features. Although there were breaches of security, most were controllable. The computer was generally kept in a limited access room. The number of authorized users was generally small in number. Sign-on IDs and passwords were necessary to use the computer system and the amount and type of usage was logged. Today as everyone migrates to networks of personal computers, little attention is being payed to the area of security. "Few organizations seem to recognize that part of the cost of IT is its security. As desktop computing becomes an everyday part of business life so the need for better security measures will increase. A basic understanding of computer networks is requisite in order to understand the principles of network security. The impressive development of computer networks has reached the point, where security becomes essential. Users want to exchange data in a secure way. The problem of network security is a complex issue. Network security means protection of the network assets. 1.2 Why do we need security? There are many threats to the security of our computers and networks. These range from data stealing and diddling to the accidental loss of data. o Data Stealing: Data stealing is a serious problem. Whether the data is modified or not, the interception and illicit use of data should be a major concern. Data stealing may be simply removing a diskette with important data. It may involve copying the data from a hard disk.
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern