Network Security
#1

Description : The mainstay of this project is to secure data/information that flow across the network. Security refers to the protection of data against the Intentional modification, i.e. loss or damage of data. The Network security is guarantees the secure data flow in the network.Confidentialy, Authentication and Data Integrity. Because these three makes a network as secure one. In this project it guarantees i.e. Confidentially, Authentication and Data Integrity. Confidentiality: guarantees that the receiver only knows the original message sent by the sender. Even if the Hackers or Intruders hacks the message on the way, they canâ„¢t understand the original message. Authentication: is the process of checking /verifying the identity of the sender. Authentication technique tries to vary that a message is coming from an Authentic sender and not from an Imposter. Data Integrity: is the process of validating the message that the received message is an unaltered copy of the sent message. In this project we used three algorithms. These are DES, RSA, SHA algorithms. In this project first the original message which is going to be sent in the network that message is encrypted in two ways. One is 3DES encryption and another is RSA encryption these encryptions are done parallely.
Technology Used : Java ,Swing
Algorithms : RSA ,DES AND SHA algorithms
Reply
#2
plz send a full report to my email- fruit_ooi10[at]yahoo.com. thank~
Reply
#3
Network consists of company security measures necessary to protect the computer method, and it is a source of concern to the President of each company that makes use of computers. Risk the security of networks and media hacker or competitor may gain access to critical information or sensitive, and may lead to loss of information, or even the complete destruction of the method.
Reply
#4
Hi,
visit these threads for more details on the topic:network security:
http://studentbank.in/report-network-sec...ars-report
http://studentbank.in/report-network-sec...ort--10704
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Exploring the design space of social network-based Sybil defenses 1 919 15-02-2017, 02:55 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 828 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 855 14-02-2017, 12:48 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,375 16-03-2015, 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,262 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,700 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,669 29-07-2013, 11:09 AM
Last Post: computer topic
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,040 03-06-2013, 11:13 AM
Last Post: computer topic
  The Wireless Sensor Network for Home-Care System Using ZigBee smart paper boy 1 1,975 31-01-2013, 11:34 AM
Last Post: seminar details

Forum Jump: