You are on page 1of 3

Network security

Abstract:
Common security attacks:
This write-up concentrates on basics of
network security. Network often attacked Security attack over the network are
by different types of ‘software hacking’. exploiting software bugs, buffer
How to guard from those attacks are being overflows, TCP hijacking(transmission
presented in this article. Types of control protocol), packet sniffing.
application of network security also These security threats repelled by
included. cryptography ,steganography ,attack
Introduction: A computer network is a graphs, obfuscation, virus scanners,
group of computers that shares information firewalls, secure hardware.
across wireless or wired technology. The
network topology defines the way in Cryptography:The art or science
which computers, printers, and other encompassing the principles and methods
devices are connected, physically and of transforming an intelligible message
logically. A network topology which into unintelligibleone, and then
describes the layout of the wire and retransforming that message back to
devices as well as the paths used by data original form. some Basic concepts are
transmissions and some commonly use Plaintext, cipher text, cipher, key, code.
network topologies (Bus, Star, Tree,
Linear, Ring, Mesh). • Cryptography provides information
security with improved
This paper introduces Cryptography authentication methods, message
Techniques. Cryptography is “The science digests, digital signatures, and
of protecting data” & Network Security encrypted network communications
“keeping information private and Secure
from unauthorized Users”. This paper Crystographic schemes:
gives the Fundamental Requirements for Cryptography, then, not only protects data
the Data Transmission, the security attacks from theft or alteration, but can also be
like Interruption, Interception and used for user authentication. There are, in
Modification of the data Transmission. general, three types of cryptographic
The Cryptographic Process explaining schemes typically used to accomplish
through a generalized function is discussed these goals
through which encryption and decryption
is done by the various algorithms like RSA Secret key cryptography (or symmetric)
algorithm, Hash Functions and many : secret key cryptography schemes are
cryptographic algorithms. generally categorized as being either
stream ciphers or block ciphers

1
a different method of authentication by
using something that is far more unique
than a password? Ourselves. 
A biometric is a physical trait? facial
structure, eye colour, voice, iris pattern,
b) Public-key cryptography (or
and fingerprint. 
asymmetric) : PKC depends upon the
existence of so-called one-way functions,  Fingerprint scanning essentially
that are easy to computer whereas their provides an identification of a
inverse function is difficult to compute person based on the acquisition
& recognition of those unique
& fingerprint
 this system comprise of a
sensor for scanning a
fingerprint and processor which
stores fingerprint
c) Hash functions: Hash functions, also database&softwarewhich is
called message digests and one-way matches to the predefined
encryption, are algorithms that, in some database.
sense, use no key. Some of the other  Within database a fingerprint
usually matches to a reference
concepts such as Pretty Good privacy,
number & pin number which
password protection,link encryption ,end matches person name &
to end encryption are also used in account
network security.  In instances of security
matches is generally used to
Application of security: allow or disallow access, but
today this can also be used for
a) Network Security for Web something as simple as a time
Conferencing: During a Web conference, clock or payroll access
data is temporarily stored on a shared
Internet server. The primary risk of Web Bibliography:
conferencing is the possibility that this
1. “Network Security” Kaufman,
data will leak beyond the realm of the
Charlie et.al.,, Pearson
conference and become accessible to Inc.NewDelhi 2002.,
hostile parties. Webliogrphy:
That's why measures such as Secure 1. http://www.snort.org/
Socket Layer (SSL) encryption, non-
persistent data flow and intrusion control 2. http://www.nmap.org/
are essential to protecting data transmitted
3. http://lcamtuf.coredump.cx/newt
during a Web conference. Using this three-
cp/
pronged approach dramatically minimizes
the likelihood of an information leak. 4. http://online.securityfocus.com/in
focus/1527
b) Implementation of biometrics
based security: Biometric security offers

2
presentation by

K.Sivaganesh 2nd year IT

Gowrishankar 2nd year IT

Sri Shakthi Institute of Engineering and Technology.

You might also like