Vous êtes sur la page 1sur 5

BEWARE INTRUDERS..!!

Renuka Batra Department of Computer Science Jaipur Engineering College and Research Centre, Jaipur renuka_batra@yahoo.co.in
1 1

Abstract:-Network security, one of the most widespread issues in day to day life concerns with network management and solving all the problems refusing the unauthenticated access to data. Nowadays its used in almost every field ranging from simply searching on the web to the shopping and banking facilities. Network basically links together two or more computers through cables, satellites, radio waves, etc. The main objective behind this is to share together the files, the resources and to hold together the electronic communications via mail, messenger, video conferencing etc. As we know pros and cons are with every possible thing and thus we cannot compromise with the security of our private and confidential matters and so we have to confront them. There are various designed issues and strategies for the security purposes. Methods like firewall and cryptography techniques and the RSA algorithm which is used by many network security software developers also helps to protect against various malicious security breaches. Various areas in security gained prominence when the real need for data security was felt. Security is concerned with the preservation of integrity and refraining of the improper access to several resources. Numerous technologies are present such as strong user authentication, encryption

which helps in providing the efficient network security. Keywords: unauthenticated, cryptography, encryption. I. Introduction One of the most fast moving technology in todays world is the computer and the network security. Over the past few decades, e-business and many other fields have improved drastically, thus increasing the customer satisfaction and provide lower operating costs. As a result such applications require goal oriented network which must be capable of handling voice, video and data traffic so as to support greater number of users and thus the demand for greater performance. As a consequence to it our network becomes more vulnerable to threat. Hence, there arises the need of network security. By the help of suitable techniques, although the problem of network security cannot be eliminated but it can reduce some general problems such as reducing potential damages and quickly reducing breaches. Fig:1 Network Security

II. Need of Security

The network needs security against the intruders. Without any protection, any part of the network may be susceptible to security threats and unauthorized access to someones private and confidential matters. The professional hackers not only misuse the network but also destroy the routers, the hosts and the switches. Basically the network security can be broadly classified into two parts. First one being the information security and second one being the computer security. Information security is needed so that the required information is used by only the secret users and not everyone. It is also important because the data must be prevented from misuse such as illegal editing of it or the lost of information. Now, the Computer security is also needed for various purposes. It should be protected from the viruses of the infected files. One of the most dangerous things for the computer network is the Trojan horse. The computer must be protected from it.

Emphasis should be laid upon the information as well as the Computer security. It should be periodically reexamined. . Network Security requires a comprehensive and a integrated approach

Fig :2 Network Security Principal

IV. Network Technologies:

Security

III. Principles for Network Security


Network security supports the mission of the organization. Network security must restrict the unauthenticated access. Network security should be economical a well as effective. System owners have security responsibilities outside their own organisations.

Cryptography Hardware and software based mechanisms for encryption Firewalls Strong User Authentication R S Algorithm

Cryptography Cryptography means something hidden or secret. In general it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, and strong user authentication.

Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Nowadays, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Cryptanalysis is the term used for the study of methods for obtaining the meaning of encrypted information without access to the key normally required to do so; i.e., it is the study of how to crack encryption algorithms or their implementations. Software based security solutions encrypt the data to prevent data from being stolen or misused.. However, a malicious program or a hacker or we can say an intruder may corrupt the data in order to make it unrecoverable or unusable. Similarly, encrypted operating systems can also be corrupted by a malicious program or a hacker, making the system useless. Hardware-based security solutions can prevent read and write access to data and hence offers very strong protection against tampering and unauthorized access. Hardware based or assisted computer security offers an alternative to softwareonly computer security. Access is enabled only when the token is connected and correct PIN is entered. However, dongles can be used by anyone who can gain physical access to it. Newer technologies in hardware based security solve the

controllers making illegal access to data impossible. Hardware based access control is more secure than protection provided by the operating systems as operating systems are vulnerable to malicious attacks by viruses and hackers. The data on harddisks can be corrupted after a malicious access is obtained. With hardware based protection, software cannot manipulate the user privilege levels, it is impossible for a hacker or a malicious program to gain access to secure data protected by hardware or perform unauthorized privileged operations. The hardware protects the operating system image and file system privileges from being tampered. Therefore, a completely secure system can be created using a combination of hardware based security and secure system administration policies. Firewall basically is the wall at the entry point of the networked system it protects. The main function of the firewall is to provide the packet filtering. A packet is a quantity of data of limited size, kept small for easy handling. When larger amounts of continuous data must be sent, it is broken up into numbered packets for transmission and reassembled at the receiving end. But packet filtering also doesnt provide full security. All firewalls regardless of their type have one very important thing in common: they receive, inspect and make decisions about all incoming data before it reaches other parts of the network. That means they handle packets and they are strategically placed at the entry point to the system or network the firewall is intended to protect. They usually regulate outgoing data as well. R S Algorithm: is an algorithm for publickey cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be sufficiently secure given sufficiently long keys and the use of up-to-date implementations.

problem of offering fool proof security for data.


Working of Hardware based security: A hardware device allows a user to login, logout and to set different privilege levels by doing actions manually. The device uses biometric technology to prevent illegal users from logging in, logging out, and changing privileged access levels. The current state of a user of the device is read by controllers in peripheral devices such as harddisks. Illegal access by a malicious user or a malicious program is interrupted based on the current state of a user by harddisk and DVD

Data erasure is a method of software-based overwriting that completely destroys all electronic data residing on a hard drive or other digital media to ensure that no sensitive data is leaked when an asset is retired or reused. Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. It is another part of data security that we encounter with everyday computer usage. Just think about when you log into your email or blog account. That single sign-on process is a form authentication that allows you to log into applications, files, folders and even an entire computer system. Once logged in, you have various given privileges until logging out. Some systems will cancel a session if your machine has been idle for a certain amount of time, requiring that you prove authentication once again to re-enter. The single sign-on scheme is also implemented into strong user authentication systems. However, it requires individuals to login using multiple factors of authentication. This may include a password, a one-time password, a smart card or even a fingerprint. Authentication is the most essential of all the security services because reliable authentication is needed to implement access control, to determine who is authorized to receive, create or modify information, to implement accountability, and to achieve non-repudiation. Authentication is tightly coupled with authorization: once the system trusts a user, the access rights associated with that user (read only, create, delete, and modify) are unlocked. The system then grants access to information assets. Identity can be characterized by one more distinctive attributes that can be: First name and last name, for example to access an on-line bank account A name, an address and the validity of a credit card number, to order a product online A gender, to become a member of a virtual

community A PIN or Password number Encryption has become a critical security feature for thriving networks and active home users alike. This security mechanism uses mathematical schemes and algorithms to scramble and convert data into unreadable text. It can only by decoded or decrypted by the party that possesses the associated key. (FDE) Full-disk encryption offers some of the best protection available. This technology enables you to encrypt every piece of data on a disk or hard disk drive. Full disk encryption is even more powerful when hardware solutions are used simultaneously with software components. This combination is often referred to as endbased or end-point full disk encryption.

V. Network Security Issues


Not knowing who uses what data and where it is. Considering all data equal Concentrating solely on regulatory compliance concerns Keeping what you dont need Security Triage Outsourcing Responibility Putting too much faith in risk assessments Settling for less than real security Decomposing process and policies Retaining sensitive data without balancing risk against awards

REFERENCES
http://www.atglasvegas.com/lasvegas-network-security/ http://www.armor2net.com/knowled ge/network_security.htm http://www.csis-scsiquebec.org/files/networksec.pdf

http://www.armor2net.com/know ledge/network_security.htm
www.fas.org/irp/crs/RL32357.pdf

Vous aimerez peut-être aussi