Advancing the Technology of Network Security by using Latest Cryptographic Schemes and Software Developments

Main Article Content

Nikhil Singla
Puneet Gulati

Abstract

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password Network security has become more important to personal computer users, organizations, and the military. With all the work going on the internet, Security became a major concern and the history of security allows a better understanding of the emergence of security technology. The range of study includes a brief history dating back to internet’s beginnings and the current development in network security. In order to understand their search being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed.


Keywords: Firewalls, Encryption ,Intranet, Vulnerability

Downloads

Download data is not yet available.

Article Details

Section
Articles