Professional Documents
Culture Documents
Paper Presentation
On
NETWORK SECURITY
Submitted By
D.HARITHA
E-mail : haritha.devinani@gmail.com
Department of
Computer Science
KMM INSTITUTE OF
TECHNOLOGY &
SCIENCE
(Affiliated to JNTU, Anantapur)
asymmetric-RSA, ECC.
Generally, the logical conclusion
Abstract is to use both kind of algorithms
SECURITY” in this and their combinations to achieve
contemporary scenarios has optimal speed and security levels.
become a more sensible issue It is hoped that the reader will
either it may be in “REAL have a wider perspective on
WORLD” or in the “CYBER security in
WORLD” .in this world as
opposed to the cyber world an
attack is often preceded by
information gathering.
general, and better
Network security is a understand how to reduce and
complicated subject, historically manage risk personally.
only tackled by well-trained and
Contents:
experienced experts. However, as
more and more people become 1. Introduction
”wired'', an increasing number of 2. Popular networks
people need to understand the 3. Security services
basics of security in a networked 4. Security threats
world. Our paper covers different 5. Where do they come from?
kinds of threats & firewalls in the 6. Preventing security disasters
network by implementation of 7. Firewalls
different security services using • Types of firewalls
various security mechanisms. The • Point of failure
security mechanisms are primarily • Security mechanisms
based on cryptographic algorithms
like symmetric-DES, AES,
CSE
Popular networks:
8. Cryptography
UUCP: (Unix-to-Unix Copy) was
Types of cryptography originally developed to connect
• Secret key UNIX (surprise!) hosts together.
Internet: The Internet is the
cryptography world's largest network of
• public key cryptography networks.
Services for security:
• Hash algorithms
The services are intended to
9. Conclusion
counter security attacks, and they
10. Bibliography
make use of one or more
Security mechanisms to provide
the service.
1. Confidentiality: Ensure that the
Introduction: information in a computer system
and transmitted information are
A basic understanding of
accessible only for reading by
computer networks is requisite in
authorized parties. This type of
order to understand the principles
access includes printing
of network security. In this
displaying and other forms of
section, we'll cover some of the
disclosure, including simply
foundations of computer
revealing the existence of an
networking, then move on to an
object.
overview of some popular
2. Authentication: Ensure that the
networks. The impressive
origin of a message or electronic
development of computer
document is correctly
networks has reached the point,
with an assurance that the identity
where security becomes essential.
is not false;
Users want to exchange data in a
3. Integrity: Ensures that only
secure way. The problem of
authorized parties are able to
network security is a complex
modify computer systems assets
issue. Network security means a
and transmitted information.
protection of the network assets.
Modification includes writing,
CSE
Attacks:
Attacks on the security of a
computer system or network are
best characterized by viewing the
function of a computer system as
provided information. This normal
flow is depicted in figure:
Security threats:
ABCD EF G H IJK LM N
route. To decipher, you fill the in
OP Q RST UV WX Y Z box following the zigzag route
Cipher text letter and read the message using the
spiral route.
QW ER TY U IOP A S DF
G HJ K LZX C V B NM The cipher text becomes:
EAMTN FTDIE EHOTE
RHMEM BYESC GLOHO
CSE
References:
o William Stallings: Cryptography
and Network security: principles
and practice: 2nd edition.
o J.P. Holbrook, J.K. Reynolds.
``Site Security Handbook.''
CSE