Best project centre in chennai | IEEE 2017 projects | IEEE 2017 Projects For B.E/B.Tech Students | IEEE 2017 Projects for Engineering Students

best project centre in chennai - uniq technologies
ieee final year projects

Network Security

Definition
Network Security consists of the supplies and policies adopted by a network administrator to prevent and monitor unlawful access, misuse, notification or a denial of a computer network and its resources. It also includes the authorization of access to data in a network.

Introduction

  • It is generally imposed by assigning a User ID and Password for the users and potential users have to register themselves for the same.
  • It not only protects the network but also oversees operation being done.
  • It can also be said as a unusual field in computer networking that cares about the computer network and its infrastructure.
  • It is modelled to protect the usability, reliability, integrity and safety of the network and data.
  • A well modelled network security scheme targets a variety of threats and potential threats. It stops them from entering the network.
  • It is generally handled by the network administrator.
best project center in chennai

Block Diagram

best project center in chennai

best project center in chennai

Threats

The very familiar and most common network security threats include

  • Viruses, worms and Trojans.
  • Spyware, Adware.
  • Zero-hour attacks.
  • Hacker attacks.
  • Denial of service attacks.
  • Data interception theft.
  • Identity theft.

Tools

  • Antivirus or Antispyware.
  • Firewall.
  • Intrusion Prevention System.
  • Virtual Private Network.

Attacks

There are several types of attacks that are currently used by the intruders / attackers / hackers to breach the security in networks.

  • Active attack.
  • Passive attack.
  • Distributed attack.
  • Insider attack.
  • Close-in attack.
  • Phishing attack.
  • Hijack attack.
  • Spoof attack.
  • Buffer overflow.
  • Exploit attack.
  • Password attack.

Real Time Examples

  • Authentication Applications.
  • IP Security.
  • Email Security.
  • Anti Virus Protection.
  • Browser Security (Secure browsing).
  • Web security Standards.