Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: NETWORK SECURITY SEMINAR REPORT
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
NETWORK SECURITY

[attachment=68106]

1 INTRODUCTION


Network security is made up two words network and security each word has a specific meaning .so before telling about the network security I will explain the each word individually .for a network to be useful, sensitive data must be guarded against unauthorized access. In its simplest form, security is concerned with making sure that unauthorized people can’t use or read it.


1.1.2 What is network security?


Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a network and network-accessible resources. Network security involves the authorization of access to data in a
network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies



.4.1.2.2 Advantages of VPN:


 Use the facilities of VoIP without being identified
 Internet remote access client connections
 Encrypt your sensitive data
 Controlled access within an intranet
 Change of server location
 Change multiple ip address.
 Send confidential emails without the fear of being hacked or interfered by any third party
1.4.1.2.3 Disadvantages of VPN
 VPNs require an in-depth understanding of public network security issues and proper deployment of precautions.
 VPN technologies from different vendors may not work well together due to immature standards.
 VPNs need to accommodate protocols other than IP and existing ("legacy") internal network technology.
 The availability and performance of an organization's wide-area VPN (over the Internet in particular) depends on factors largely outside of their control.


1.4.1.3 Encryption:


An effective and practical way to safeguard data transmitted over network is by encryption .the process requires an encryption device(key) for converting the original message into a code, as well as decryption device (key) for translating the code back into recognizable text . In business data processing this can be accomplished by using specialized computer software.



8 Conclusion


As the world becomes more connected by networks, the significance of network security will certainly continue to grow. Security issues for networks are visible and important, but their analysis is similar to the analysis done for other aspects of security.
Network assets include the applications programs and, most importantly, data. Threats are actions or situations that offer harm or loss of confidentiality, integrity and denial of service. In networks anyone can be victim of attacker. The strongest network controls are authentication, encryption.
Due to the various type of attacker sometimes our system show in proper functioning due to this we lost our important and private data
According to our need and convenience we have to choose the best option for securing our system before selecting the network security tool we have to deeply search the advantages and disadvantages of the network security tools