Introduction to Network Security Technologies

Author(s):  
Mohuya Chakraborty ◽  
Moutushi Singh
2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


2008 ◽  
pp. 4014-4037
Author(s):  
Steven Furnell ◽  
Jeremy Ward

In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This chapter examines the nature of malware evolution. It highlights that, as well as the more obvious development of propagation techniques, the nature of payload activities (and the related motivations of the malware creators) is also significantly changing, as is the ability of the malware to defeat defences. Having established the various facets of the threat, the discussion proceeds to consider appropriate strategies for malware detection and prevention, considering the role of modern antivirus software, and its use alongside other network security technologies to give more comprehensive protection. It is concluded that although malware is likely to remain a significant and ever-present threat, the risk and resultant impacts can be substantially mitigated by appropriate use of such safeguards.


2013 ◽  
Vol 756-759 ◽  
pp. 791-795
Author(s):  
Ling Jia

The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information is transferred security, which is the problem that various network information systems must face, and also a difficult and hot issue to be researched. In this paper, a variety of effective network security technologies are studied and corresponding implementations are provided for the information network system in the university.


2013 ◽  
Vol 671-674 ◽  
pp. 3174-3178
Author(s):  
Ying Gui Zhang ◽  
Ding You Lei ◽  
Qiong Fang Zeng

Railway out-of-gauge and enhanced-load goods (ROEG) transport organization with risky, costly and difficult characteristics is the system engineering. For better scientific online management, ROEG dispatching system (ROEGDS) with B/S mode and three-layer is developed. Then, with the network framework and architecture for ROEGDS, network security technologies including firewall intrusion detection, dynamic password authentication, security vulnerability assessment technologies and so on are all put forward. Besides, concrete security management measures are further given from four aspects to ensure network security. The results from its trial in Nanning Railway Administration show that ROEGDS can achieve given goals and these network security technologies and management measures put forward in the paper can also guarantee ROEGDS and ROEG transport safety.


2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Ying-Chiang Cho ◽  
Jen-Yi Pan

With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network’s existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter’s inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.


2006 ◽  
Author(s):  
Steven A Hurd ◽  
Jason Edwin Stamp ◽  
David P Duggan ◽  
Adrian R. Chavez

Author(s):  
Steven Furnell ◽  
Jeremy Ward

In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This chapter examines the nature of malware evolution. It highlights that, as well as the more obvious development of propagation techniques, the nature of payload activities (and the related motivations of the malware creators) is also significantly changing, as is the ability of the malware to defeat defences. Having established the various facets of the threat, the discussion proceeds to consider appropriate strategies for malware detection and prevention, considering the role of modern antivirus software, and its use alongside other network security technologies to give more comprehensive protection. It is concluded that although malware is likely to remain a significant and ever-present threat, the risk and resultant impacts can be substantially mitigated by appropriate use of such safeguards.


Sign in / Sign up

Export Citation Format

Share Document