20-11-2012, 05:58 PM
network security and cryptography
Network security1.doc (Size: 70 KB / Downloads: 141)
Abstract
“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in “REAL WORLD” or in the “CYBER WORLD” .in this world as opposed to the cyber world an attack is often preceded by information gathering.
Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become”wired'', an increasing number of people need to understand the basics of security in a networked world. Our paper covers different kinds of threats & firewalls in the network by implementation of different security services using various security mechanisms. The security mechanisms are primarily based on cryptographic algorithms like symmetric-DES, AES, asymmetric-RSA, ECC. Generally, the logical conclusion is to use both kind of algorithms and their combinations to achieve optimal speed and security levels. It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally.
Introduction:
A basic understanding of computer networks is requisite in order to understand the principles of network security. In this section, we'll cover some of the foundations of computer networking, then move on to an overview of some popular networks. The impressive development of computer networks has reached the point, where security becomes essential. Users want to exchange data in a secure way. The problem of network security is a complex issue. Network security means a protection of the network assets.
Popular networks:
UUCP: (Unix-to-Unix Copy) was originally developed to connect UNIX (surprise!) hosts together.
Internet: The Internet is the world's largest network of networks.
Services for security:
The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
1. Confidentiality: Ensure that the information in a computer system and transmitted information are accessible only for reading by authorized parties. This type of access includes printing displaying and other forms of disclosure, including simply revealing the existence of an object.
2. Authentication: Ensure that the origin of a message or electronic document is correctly with an assurance that the identity is not false;
3. Integrity: Ensures that only authorized parties are able to modify computer systems assets and transmitted information. Modification includes writing, changing, changing status, deleting, creating and delaying or replaying of transmitted messages.
4. Non-repudiation: Requires that neither the sender nor the receiver of a message is able to deny the transmission.
5. Access control: Require that access to information resources may be controlled by or for the target system.
6. Availability: Require that computer systems assets be available to authorized parties when needed.