Wednesday 9 January 2019

Network Security

Network Security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.

Vulnerabilities in TCP/IP
  1. Transfer are done in plain text
  2. Weak authentication between client and web-server
  3. No solution to syn-packet flooding
  4. IP layer susceptible to many vulnerabilities.
The CIA Triad
  • Confidentiality part of network security makes sure that the data is available only to the intended and authorized persons.
  • Make sure that the data is reliable and is not changed by unauthorized persons.
  • Availability is to make sure that the data, network resources/services are continuously available to the legitimate users, whenever they require.
Achieving Network Security

ENCIPHERMENT :- 
                   This mechanism provides data confidentiality services by transforming data into not-readable forms for the unauthorized persons. This mechanism uses encryption-decryption algorithm with secret keys.

DIGITAL SIGNATURE :-
                   This mechanism is the electronic is the ordinary signatures in electronic data. It provides authenticity of the data.

ACCESS CONTROL
                  This mechanism is used to provide access control services. These mechanism may use the identification and authentication of an entity to determine and enforce the access rights of the entity.

Client-Server Architecture




Email Security


  • Confidentiality :- E-mail should be read by intended recipient only.
  • Authentication :- E-mail recipient should be sure of the identity of sender.
  • Integrity :- E-mail recipient should be sure of the identity of sender.
  • Proof of Delivery :- Sender gets a confirmation that the recipient received the message.
  • Non Repudiation :- Sender gets a confirmation that the recipient received the message.
  • Proof of Submission :- Confirmation that message has been submitted to the mailing server.
PGP




0 Comments:

Post a Comment

Popular Posts

Categories

AI (27) Android (24) AngularJS (1) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (113) C (77) C# (12) C++ (82) Course (60) Coursera (176) coursewra (1) Cybersecurity (22) data management (11) Data Science (85) Data Strucures (6) Deep Learning (9) Django (6) Downloads (3) edx (2) Engineering (14) Excel (13) Factorial (1) Finance (5) flutter (1) FPL (17) Google (18) Hadoop (3) HTML&CSS (46) IBM (25) IoT (1) IS (25) Java (92) Leet Code (4) Machine Learning (43) Meta (18) MICHIGAN (4) microsoft (3) Pandas (3) PHP (20) Projects (29) Python (725) Python Coding Challenge (169) Questions (2) R (70) React (6) Scripting (1) security (3) Selenium Webdriver (2) Software (17) SQL (40) UX Research (1) web application (8)

Followers

Person climbing a staircase. Learn Data Science from Scratch: online program with 21 courses