Network Security
is any activity designed to protect the usability and integrity of your
network and data. It includes both hardware and software technologies.
Effective network security manages access to the network. It targets a
variety of threats and stops them from entering or spreading on your
network.
Vulnerabilities in TCP/IP
ENCIPHERMENT :-
This mechanism provides data confidentiality services by transforming data into not-readable forms for the unauthorized persons. This mechanism uses encryption-decryption algorithm with secret keys.
DIGITAL SIGNATURE :-
This mechanism is the electronic is the ordinary signatures in electronic data. It provides authenticity of the data.
ACCESS CONTROL
This mechanism is used to provide access control services. These mechanism may use the identification and authentication of an entity to determine and enforce the access rights of the entity.
Client-Server Architecture
Email Security
PGPVulnerabilities in TCP/IP
- Transfer are done in plain text
- Weak authentication between client and web-server
- No solution to syn-packet flooding
- IP layer susceptible to many vulnerabilities.
- Confidentiality part of network security makes sure that the data is available only to the intended and authorized persons.
- Make sure that the data is reliable and is not changed by unauthorized persons.
- Availability is to make sure that the data, network resources/services are continuously available to the legitimate users, whenever they require.
ENCIPHERMENT :-
This mechanism provides data confidentiality services by transforming data into not-readable forms for the unauthorized persons. This mechanism uses encryption-decryption algorithm with secret keys.
DIGITAL SIGNATURE :-
This mechanism is the electronic is the ordinary signatures in electronic data. It provides authenticity of the data.
ACCESS CONTROL
This mechanism is used to provide access control services. These mechanism may use the identification and authentication of an entity to determine and enforce the access rights of the entity.
Client-Server Architecture
Email Security
- Confidentiality :- E-mail should be read by intended recipient only.
- Authentication :- E-mail recipient should be sure of the identity of sender.
- Integrity :- E-mail recipient should be sure of the identity of sender.
- Proof of Delivery :- Sender gets a confirmation that the recipient received the message.
- Non Repudiation :- Sender gets a confirmation that the recipient received the message.
- Proof of Submission :- Confirmation that message has been submitted to the mailing server.
0 Comments:
Post a Comment