Security in Computer Networks

Author(s):  
Ana-Maria CERNOV

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.

2018 ◽  
Vol 7 (3) ◽  
pp. 20-27
Author(s):  
D. Selvamani ◽  
V. Selvi

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the importance of security, types of attacks in the networks. This paper elaborates theliterature study on network security in various domains in the year 2013 to 2018. Finally, it summarizes the research directions by literature survey.


2019 ◽  
Vol 8 (1) ◽  
pp. 7-12
Author(s):  
R. Dharmarajan ◽  
V. Thiagarasu

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the importance of security, types of attacks in the networks. This paper elaborates the literature study on network security in various domains. Finally, it summarizes the research directions by literature survey.


Author(s):  
Ghaith Alomari, Anas Aljarah

The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and  to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work  we will make a  encryption harder with enhanced public key encryption protocol for the  security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations,  and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The  internet structure itself allowed for many security threats  to  occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows  for  the suitable security to  appear. By means of the firewalls and encryption   mechanisms  many businesses protected themselves from the internet.The firms crank out an “internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Ning Sun ◽  
Tao Li ◽  
Gongfei Song ◽  
Haoran Xia

In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance.


2021 ◽  
Vol 18 (2) ◽  
pp. 247-256
Author(s):  
Sanja Klisarić

In a world of increasingly intense cyber content that relies on new technologies, the security of all systems is at risk. This article will present the danger and security options in order to protect not only data but also the entire system connected to the new technologies. Also, the importance of persons dealing with online security issues will be emphasized. The analysis of the content reveals the possibility for prediction that is presented in the paper, and connected with the conclusion that technology will develop more and more, and thus the danger of cyber attacks will be more and more intense. The paper focuses on the essence of the defense against terrorism that is necessary on the Internet. This indicates those defense options that are in line with the roles of those in charge of Internet security as an open field for terrorist cyber attacks.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


2021 ◽  
pp. 259-286
Author(s):  
Laszlo Solymar

Chapter 16 discusses the history of the computer. Important events include IBM bringing out the personal computer, and Xerox PARC inventing the graphical user interface. Paul Allen and Bill Gates left Harvard in 1975 to set up a computer laboratory. A year later Steve Jobs and Steve Wozniak set up Apple, followed soon by Dan Bricklin inventing the electronic spreadsheet. At the start of the 1980s Gates leased the MS-DOS operating system to IBM. Prior to all this, in 1969 the Advanced Research Product Agency set up ARPANET, the predecessor of the Internet. Other topics covered in this chapter include the birth of electronic mail, uses and abuses of the Internet, security and coding, and the Minitel in France. The last part of the chapter looks at the Soviet Union and the InterNyet.


2000 ◽  
Vol 95 (1) ◽  
pp. 131-146 ◽  
Author(s):  
Thomas Streeter

Starling from the premise that communication regulation can be made up of informal shared systems of human belief, action and habit, this paper explores the informal political belief systems that helped regulate the Internet during its gestation, before 1984. The article focuses on the odd fact that a decentralised communication system with a strikingly libertarian ethos was created within a military-oriented research and development enterprise famous for its hierarchical, authoritarian culture and organisation. Broadly, my argument is that the larger framework of Internet development was ‘corporate liberal’ — that is, based on the theory that non-profit structures are necessary for advanced forms of experimental technological innovation, but that practical implementation is then best left to the private sector. Within that larger framework, however, a shift in the cultural habits and values within the community of computer scientists between the late 1960s and the early 1980s, partly under the influence of the Viernam War-era counterculture, allowed a distinctive vision of computer communication to take hold: computer communication as a horizontal form of collaboration. This cultural shift then helps explain how a technological system born in the heart of the military–industrial complex came to embody distinctly non-military values.


2014 ◽  
Vol 602-605 ◽  
pp. 3351-3354
Author(s):  
Li Hui Wang

This paper analyses the security risks of the internal and external enterprise computer network, points out that the internal internet security of enterprise should focus on prevention which includes a variety of network security technology and the establishment of logging and review system. This paper also discusses the main technology of external internet security prevention such as firewall technology and encryption technology and so on and provides some suggestions about risk management and network security for some small and medium enterprises.


Sign in / Sign up

Export Citation Format

Share Document