International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 03 Issue: 10 | Oct -2016
p-ISSN: 2395-0072
www.irjet.net
COMPUTER NETWORKS AND SECURITY : A REVIEW V.Mamatha Reddy1, P.Poornima2 1Assistant 2
Professor, Department of Computer Science and Engineering, KITS(S), Huzurabad, Telangana, India Assistant Professor, Department of Computer Science and Engineering, KITS(S), Huzurabad, Telangana, India
---------------------------------------------------------------------***--------------------------------------------------------------------1.1 Network Security Attributes: Abstract - Network security refers to any activities designed to protect the network, which includes the authorization of information access in a network, which is controlled by the network administrator. Network security has turned out to be more important to personal computer users, Organizations, and military and it covers an assortment of computer networks, both public and private, that are utilized as a part of everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Network security is the procedure by which digital information resources are protected, the objective of security are to ensure confidentiality, maintain integrity, and assure availability, so viable network security focuses on a variety of threats and prevents them from entering or spreading on the network. Social network sites created a new way of communication, it brought about new information security issues such as identity theft, privacy leak and junk information. In This paper we mainly concentrate on the network security also we present some major issues that can influence the network along with existing problems of the online security of the computer, and precautionary measures.
When developing a secure network, the following need to be considered [2]. 1) Access: authorized users are provided the means to communicate to and from a particular network. 2) Confidentiality: Information in the network remains private. 3) Authentication: Ensure the users of the network are who they say they are. 4) Integrity: Ensure the message has not been modified in transit 5) Non-repudiation: Ensure the user does not refute that he used the network
2. NETWORK SECURITY PROBLEMS Due to the lack of security control mechanisms and the lack of network security policies and protection, awareness of these risks is increasing (Fig-I).
Key words: Network Security, Threats, Privacy Protection, Preventive Measures, Cryptography.
1. INTRODUCTION
Computer virus damage
Network Security comprises of the provisions and approaches adopted by a network administrator to avert and monitor unauthorized access, misuse, modification, or denial of a computer network and network accessible resources [1]. To secure the information and the entire network system, one specific methodology is required which can be capable of providing the complete security solutions-Cryptography is an emerging technology, which is essential for network security. It is the study of Secret(crypto-) Writing(-graphy) and is a strategy for storing and transmitting information in a particular form so that only those for whom it is deliberate can read and process it. Cryptography is an key technique for present computer and communications networks, protecting everything from business e-mail to bank transactions and online shopping, which avoid eavesdroppers from learning the contents of encrypted messages.
Natural threats
Network Security Problem s
Trojans Intrusions
Unauthorized Access
Fig-I Computer Network Security Problems Natural threats may originate from different natural disasters, poor site environment, electromagnetic radiation and obstruction, network equipment and other natural aging. They will impact the storage and exchange. Trojan
Š 2016, IRJET
|
Impact Factor value: 4.45
|
ISO 9001:2008 Certified Journal
|
Page 1096