Vous êtes sur la page 1sur 2

R.Ramaguru, G.

Athipathy,
B.Tech Information Technology, B.Tech Information Technology,
Kumaraguru college of technology, Kumaraguru college of technology,
Contact no:9786888837. Contact no:9965386636.

Network Security
Abstract:

A network is set of devices or nodes by communication links. A


network must be able to meet certain number of criteria and one of them
is security. Network security issues including protecting data from
unauthorized access, there are enemies to the data and also to the data
which is transmitted through network and the most common enemies are
hackers, unaware staff, snoops, viruses, Trojan horse program, and
vandals.
Network (Internet) communication has become an integral part of
the infrastructure of today’s world. The information communicated comes
in numerous forms and is used in many applications. In a large number of
these applications, it is desired that the communication be done in
secret. Such secret communication ranges from the obvious cases of bank
transfers, corporate communications, and credit card purchases, on down
to a large percentage of everyday email. With email, many people wrongly
assume that their communication is safe because it is just a small piece
of an enormous amount of data being sent worldwide. After all, who is
going to see it? But in reality, the Network (Internet) is not a secure
medium, and there are programs “out there” which just sit and watch
messages go by for interesting information.
Hackers are computer enthusiast who takes pleasure in gaining
access to other people's computers or network. Unaware staffs
are employees who focus on their specific job duties often overlook
Standard n\w security rules Employees Known as "snoops” gaining
unauthorized access to confidential data to provide competitors with
otherwise inaccessible information.
What can these enemies do?
Viruses are computer programs that are written by unauthorized
programmers and are designed to replicate themselves and infect computers
when triggered by a specific event. Some viruses are more destructive and
cause such problems as deleting files from a hard drive or slowing down a
system. Trojan horse programs are actually enemies undisguised. Trojans
can delete data and open up computers to additional attacks. Innumerable
types of networks attacks have been documented and they are dos attacks,
access attacks.
ACCESS ATTACKS are conducted to exploit vulnerabilities. Prevent
access to part or all of a computer system. Social engineering is the
increasingly prevalent act of obtaining network security information thru
non - technical means. Spam is the most commonly used term for
unsolicited electronic Mail or the action of broadcasting unsolicited
advertising Messages via e - mail.
Spam is usually harmless but it can be a nuisance, taking up the
Recipient’ time and storage space. Organizations have extensive choice of
technologies, ranging from anti - virus software packages to dedicated
network security hardware, such as firewalls and intrusion detection
systems, to provide protection for all areas of the network.
Antivirus software is virus protection software is packaged
with most computers and can counter most virus threats if the software
is regularly updated and correctly maintained security policies or rules
that are electronically programmed and stored within security equipment
to control such areas access.