network security seminars report
#1

[attachment=1462]

NETWORK SECURITY


ABSTRACT

John, sitting desperately in front of his system tries to hack his friend Williamâ„¢s bank account. But after a tiresome job, all he could succeed in getting was an encrypted code, which did not make any sense to him and would take a lifetime to decode making use of the concept of probability. Thanks! to the advanced techniques of security which saved William from getting bankrupt and losing his lifetime savings. In the present day scenario, where the earth is shrinking rapidly, such that the entire world is now on your desktop, security is gaining much significance consequently. Cryptography, authentication and access control mechanisms play a very important role in secured communication as they form the major disciplines of network security.

INTRODUCTION
What is security?
Freedom from danger, fear or ensuring safety is security. Measures adopted to prevent the authorized use, misuse, modification or denial of use of knowledge or facts, data or capabilities. Network security is an issue of great significance today where a single problem can change the fate of the companies and organizations.
Orange Book: -
The National Computer Security Center (NCSC), an agency of the U.S government published an official standard called Trusted Computer System Evaluation Criteria universally known as the Orange Book. The Orange Book defines a series of ratings a computer system can have based on itâ„¢s security features and the care that went into itâ„¢s design, documentation and testing. This rating is intended to give government agencies and commercial enterprises an objective assessment of a systemâ„¢s security and to goad computer manufacturers into placing more emphasis on security. The official categories are D, C1, C2, B1, B2, B3, and A1 ranging from minimal protection or unrated to most secure. When computers are networked together, new security problems occur which can prove to be great threats to major companies. The orange book did not address the issue of networked computers. The Red Book took all the requirements of the Orange book and attempted to address a networked environment of computers, thus creating the concept of network security A single layer of security cannot ensure good security. Effective security is achieved by the combination of all security disciplines. The prominent security technologies and product categories used today are anti-virus software, firewalls, smart cards, biometrics, intrusion detection, policy management, vulnerability scanning, encryption etc.
COMMON ATTACKS AGAINST NETWORK ASSETS
Attacks may occur through technical means such as specific tools designed for attacks or exploitation of vulnerabilities in a computer system, or they may occur through social engineering, which is the use of non-technical means to gain unauthorized access.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar report oncryptography and network security, nexus 5, bash basename, wordpad, network security seminar report, seminar topics on network security, seminar report for network security,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
network security seminars report - by computer science technology - 24-01-2010, 10:00 PM
NETWORK SECURITY(ppt) - by projectsofme - 27-09-2010, 09:51 AM
RE: network security seminars report - by Guest - 24-11-2018, 01:19 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network attached storage computer science crazy 3 12,721 20-02-2019, 01:16 PM
Last Post:
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,535 10-02-2015, 05:52 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,405 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,088 30-03-2014, 04:40 AM
Last Post: Guest
  Modular Computing seminars report computer science crazy 4 21,688 08-10-2013, 04:32 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 10,077 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 12,038 27-07-2013, 01:06 PM
Last Post: computer topic
  Computerized Paper Evaluation using Neural Network computer science crazy 12 18,042 17-07-2013, 04:08 PM
Last Post: Guest
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,819 24-06-2013, 11:44 AM
Last Post: Guest
  Quadrics Interconnection Network computer science crazy 2 10,505 28-02-2013, 02:42 PM
Last Post: Guest

Forum Jump: