network security seminars report
#1

[attachment=1462]

NETWORK SECURITY


ABSTRACT

John, sitting desperately in front of his system tries to hack his friend Williamâ„¢s bank account. But after a tiresome job, all he could succeed in getting was an encrypted code, which did not make any sense to him and would take a lifetime to decode making use of the concept of probability. Thanks! to the advanced techniques of security which saved William from getting bankrupt and losing his lifetime savings. In the present day scenario, where the earth is shrinking rapidly, such that the entire world is now on your desktop, security is gaining much significance consequently. Cryptography, authentication and access control mechanisms play a very important role in secured communication as they form the major disciplines of network security.

INTRODUCTION
What is security?
Freedom from danger, fear or ensuring safety is security. Measures adopted to prevent the authorized use, misuse, modification or denial of use of knowledge or facts, data or capabilities. Network security is an issue of great significance today where a single problem can change the fate of the companies and organizations.
Orange Book: -
The National Computer Security Center (NCSC), an agency of the U.S government published an official standard called Trusted Computer System Evaluation Criteria universally known as the Orange Book. The Orange Book defines a series of ratings a computer system can have based on itâ„¢s security features and the care that went into itâ„¢s design, documentation and testing. This rating is intended to give government agencies and commercial enterprises an objective assessment of a systemâ„¢s security and to goad computer manufacturers into placing more emphasis on security. The official categories are D, C1, C2, B1, B2, B3, and A1 ranging from minimal protection or unrated to most secure. When computers are networked together, new security problems occur which can prove to be great threats to major companies. The orange book did not address the issue of networked computers. The Red Book took all the requirements of the Orange book and attempted to address a networked environment of computers, thus creating the concept of network security A single layer of security cannot ensure good security. Effective security is achieved by the combination of all security disciplines. The prominent security technologies and product categories used today are anti-virus software, firewalls, smart cards, biometrics, intrusion detection, policy management, vulnerability scanning, encryption etc.
COMMON ATTACKS AGAINST NETWORK ASSETS
Attacks may occur through technical means such as specific tools designed for attacks or exploitation of vulnerabilities in a computer system, or they may occur through social engineering, which is the use of non-technical means to gain unauthorized access.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: priyanka chaudhary nit hamirpur, seminar report for network security, network security full report, report on network security, network security full report**n, network security topics for seminar, project report on network security,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
network security seminars report - by computer science technology - 24-01-2010, 10:00 PM
NETWORK SECURITY(ppt) - by projectsofme - 27-09-2010, 09:51 AM
RE: network security seminars report - by Guest - 24-11-2018, 01:19 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network attached storage computer science crazy 3 12,792 20-02-2019, 01:16 PM
Last Post:
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,603 10-02-2015, 05:52 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,474 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,149 30-03-2014, 04:40 AM
Last Post: Guest
  Modular Computing seminars report computer science crazy 4 21,752 08-10-2013, 04:32 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 10,134 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 12,100 27-07-2013, 01:06 PM
Last Post: computer topic
  Computerized Paper Evaluation using Neural Network computer science crazy 12 18,111 17-07-2013, 04:08 PM
Last Post: Guest
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,872 24-06-2013, 11:44 AM
Last Post: Guest
  Quadrics Interconnection Network computer science crazy 2 10,564 28-02-2013, 02:42 PM
Last Post: Guest

Forum Jump: