Sie sind auf Seite 1von 4

ERUDITE PAPYRUS

M-PULSE - 2010

PAPER THEME: NETWORK & INFORMATION


SECURITY

Presented by : - Krishna Bang


Rajiv Thorat

Guided by :- Prof. Mrs. G.S Navale.


Abstract
What is a Network Security?

Network Security consists of the provisions adopted by the network


administrator to protect the network from unauthorized access. It also involves all
activities that organizations or institutions undertake to protect the value and
ongoing usability of assets and the integrity and continuity of operations. An
effective network security strategy requires identifying threats and then choosing
the most effective set of tools to combat them.

What is Information Security?

Information security means protecting information and information systems from


unauthorized access, use, disclosure, disruption, modification or destruction .The
terms information security, computer security and information assurance are
frequently incorrectly used interchangeably. These fields are interrelated often and
share the common goals of protecting the confidentiality.

Why is Network Security needed?

Today most important services are done by using networks. Without a proper
network infrastructure in place financial institutions like banks, Internet service
providers, Government and defense agencies, Multinational corporations and
anyone using the Internet are at a risk.

Governments, military, corporations, financial institutions, hospitals, and


private businesses amass a great deal of confidential information about their
employees, customers, products, research, and financial status. Most of this
information is now collected, processed and stored on electronic computers and
transmitted across networks to other computers. So obviously there must be some
serious and strict security measures to keep the confidential database safe.
Common Security Attacks and their Countermeasures:

 Finding a way into the network


o Firewalls
 Exploiting software bugs, buffer overflows
o Intrusion Detection Systems
 Denial of Service
o Ingress filtering, IDS
 TCP hijacking
o IPSec
 Packet sniffing
o Encryption (SSH, SSL, HTTPS)
 Social problems
o Education

Things that can be done:

The Administrator is in charge of network security and can have administrative


access to the mainframe server and related computer terminals. He can also build a
secure firewall for the network which would avoid unauthorized program from
gaining access and changing any data on the servers.

The following are the steps that can be taken by an ordinary internet user to secure
him:

 Change Default Administrator Passwords (and Usernames).


 Do not provide any sensitive information to any individual.
 Enable Firewalls On Each Computer and the Router.
 Turn Off the Network During Extended Periods of Non-Use
 Enable windows defender, visit only trusted and certified sites.
 Access Control

Conclusion:
Finally we conclude saying that if a network or a network connection is
kept safe and handled effectively we can keep our information safe and secure
intact, for that we need to keep in mind the above safety measures.

Das könnte Ihnen auch gefallen