R.Ramaguru,
G.Athipathy,
B.Tech Information Technology,
B.Tech Information Technology,
Kumaraguru college of technology,
Kumaraguru college of technology,
Contact no:9786888837.
Contact no:9965386636.
Network Security Abstract: A network is set of devices or nodes by communication links. A network must be able to meet certain number of criteria and one of them is security. Network security issues including protecting data from unauthorized access, there are enemies to the data and also to the data which is transmitted through network and the most common enemies are hackers, unaware staff, snoops, viruses, Trojan horse program, and vandals. Network (Internet) communication has become an integral part of the infrastructure of today’s world. The information communicated comes in numerous forms and is used in many applications. In a large number of these applications, it is desired that the communication be done in secret. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases, on down to a large percentage of everyday email. With email, many people wrongly assume that their communication is safe because it is just a small piece of an enormous amount of data being sent worldwide. After all, who is going to see it? But in reality, the Network (Internet) is not a secure medium, and there are programs “out there” which just sit and watch messages go by for interesting information. Hackers are computer enthusiast who takes pleasure in gaining access to other people's computers or network. Unaware staffs are employees who focus on their specific job duties often overlook Standard n\w security rules Employees Known as "snoops” gaining
unauthorized access to confidential data to provide competitors with otherwise inaccessible information. What can these enemies do? Viruses are computer programs that are written by unauthorized programmers and are designed to replicate themselves and infect computers when triggered by a specific event. Some viruses are more destructive and cause such problems as deleting files from a hard drive or slowing down a system. Trojan horse programs are actually enemies undisguised. Trojans can delete data and open up computers to additional attacks. Innumerable types of networks attacks have been documented and they are dos attacks, access attacks. ACCESS ATTACKS are conducted to exploit vulnerabilities. Prevent access to part or all of a computer system. Social engineering is the increasingly prevalent act of obtaining network security information thru non - technical means. Spam is the most commonly used term for unsolicited electronic Mail or the action of broadcasting unsolicited advertising Messages via e - mail. Spam is usually harmless but it can be a nuisance, taking up the Recipient’ time and storage space. Organizations have extensive choice of technologies, ranging from anti - virus software packages to dedicated network security hardware, such as firewalls and intrusion detection systems, to provide protection for all areas of the network. Antivirus software is virus protection software is packaged with most computers and can counter most virus threats if the software is regularly updated and correctly maintained security policies or rules that are electronically programmed and stored within security equipment to control such areas access.