25-01-2013, 10:45 AM
NETWORK SECURITY
1NETWORK.docx (Size: 29 KB / Downloads: 27)
ABSTRACT
Network security is the main issue for the most of the company. To carry sensitive information, the system must be able to assure privacy. Microwave, satellite and other wireless media, can’t be protected from the unauthorized reception of transmissions. So security is a broad topic and covers a multitude of sins. In this paper, we are going to discuss the various Network security Concepts such as the structure, services, objectives, tools, challenges etc.
In Taxonomy of network security, we explained the Cryptography methods and Network security services. Then we define the different types of Elements of network security. Here we give you the new Network security objectives and several security mechanisms.
INRODUCTION:
A basic understanding of computer networks is requisite in order to understand the principles of network security. Network security is a complicated subject, historically only tackled by Well-trained and experienced experts. However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.
Network security is the main issue for the most of the company. To carry sensitive information, the system must be able to assure privacy. Microwave, satellite and other wireless media, can’t be protected from the unauthorized reception of transmissions. So security is a broad topic and covers a multitude of sins.
The challenge of keeping your network secure has never been greater, or more important than it is today. Unauthorized network access can expose or destroy your proprietary data, negatively affect company productivity and irreparably harm your relationships with customers and business partners.
NETWORK SECURITY OBJECTIVES:
• Identify function and install computer, network and security components following industry standard guidelines.
• Utilize procedures to respond to and alleviate a security incident.
• Examine and mitigate current industry threats and risks.
• Plan and document a network security and disaster recovery program at the enterprise level. .
• Evaluate, select, deploy and assess security measures within an enterprise level organization
• Implement and maintain security tools in the detection, notification.
Message integrity protocols:
Sometimes two communicating participants do not care whether an eavesdropper is able to read the messages they are sending to each other, but they are worried about the possibility of an imposter sending messages that claim to be from one of them. That is, the participants want to ensure the integrity of their messages.
One way to ensure the integrity of a message is to encrypt it using DES with cipher block chaining, and then to use the CBC residue.
Public key distribution:
Public key cryptography is an extremely powerful technology, but it depends on the distribution of public keys. The problem of getting keys to people who need them in such a way that they can be sure that the key is legitimate (i.e., that it belongs to the entity that it purports to belong to) turns out to be a challenging problem. It examines the problem and some of the general solutions.
A Layered Security
In the layered security approach (right), Intrusion Detection enters the game at the highest level, providing a highly coordinated approach to managing security issues, from identifying threats on the network and gathering additional information on demand, to responding quickly and taking appropriate action. Through the use of distributed sensors, protocol anomaly detection, and high-speed statistical correlation analysis, a layered security app to both common and novel attacks to protect your network against business interruption, and prevent damage to your network as well as to customer confidence. Approach to Intrusion Detection can identify and respond
CONCLUSION:
In this paper, we explained the various network security techniques and their risk factors. We also view several solutions to the risks. Finally we conclude that we can secure our data in network based on its settings. Day by day there are many number of security risk occurs in network. Lot of new techniques also introduced. Totally it is more interesting and problematic area which always under monitor.