International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 07 | July 2024
www.irjet.net
p-ISSN: 2395-0072
Protecting Digital Information: A Review of Network Security and Cryptography Shreejith Kinnal1, Shreya E2, Aditi Parvati3, Satwika S4, Prajwal Angadi5 Department of Electronics and Communication Engineering, Dayananda Sagar College of Engineering, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------mitigate these risks, robust network security systems are Abstract - In today's technology-centered society, network
implemented to thwart potential attacks and respond swiftly in the event of a data breach. The field of computer network security encompasses various fields of study, incorporating ideas and concepts from computer technology, communication technology, mathematics, cryptography, information theory, management, and law. It demands an integration of diverse solutions from these fields to effectively address the intricate challenges associated with network security.
security is crucial because of the growing reliance on digital systems and the potential consequences of security breaches. To protect sensitive information and guarantee the continuous operation of numerous companies and sectors, computer networks must be protected. Employing robust security mechanisms, including intrusion detection systems, firewalls, and encryption is essential to preventing unauthorized access and data tampering. Emerging dangers, including malware, eavesdropping, and social engineering, however, present serious risks. Organizations may reduce risks, secure their network infrastructure and data, and ensure data confidentiality and integrity by putting in place robust security measures and staying attentive.
3. NETWORK SECURITY OBJECTIVES i. Confidentiality: Network security measures are implemented to ensure that information is accessible only to authorized users, safeguarding it from unauthorized access or disclosure.
Key Words: Network, cryptography, security, encryption, decryption, key, ssl.
ii. Authenticity: The system guarantees the receiver that the information received is indeed from the claimed source, verifying its
1.INTRODUCTION Due to the growing reliance on digital systems and the potential repercussions of security breaches, network security is of the utmost importance. To protect computer networks is essential for securing private data and maintaining the proper operation of many different companies and sectors in today's technology-driven world. Implementing strong defenses against firewalls, encryption, access controls, and intrusion detection systems(IDS). Together, these security measures protect data's confidentiality, integrity, and availability and create secure communication channels. On the other hand, as technology develops, new dangers keep popping up. There are several serious risks that organizations and individuals must be aware of, including malware, phishing attempts, network eavesdropping, and social engineering attacks. It is possible that these malevolent actions will result in financial losses, reputational damage, and privacy violations.
authenticity and preventing spoofing or impersonation. iii. Integrity: Network security ensures that only authorized users have the ability to modify or alter information, maintaining its integrity and preventing unauthorized tampering or manipulation. iv. Dependability: Network security measures prevent both senders and receivers from denying the transmission or receipt of messages, establishing a reliable and trustworthy communication environment. v. Availability: Authorized users should have uninterrupted access to the required information resources and services, ensuring the availability of network resources without compromising security.
2. NETWORK SECURITY
vi. Auditability: The system incorporates mechanisms that allow for the review and monitoring of all security-related activities within the network, enabling the identification and investigation of potential security breaches or anomalies.
With the exponential growth of the internet and the widespread adoption of information-centric applications, ensuring the security of data transmitted, stored, and sent through the network has become paramount. Unauthorized access to this data poses a significant threat, as hackers employ various malicious techniques, including the deployment of viruses, to compromise network integrity. To
© 2024, IRJET
|
Impact Factor value: 8.226
4. NETWORK SECURITY THREAT Network security threats is nothing but the potential risks and vulnerabilities of the network which can compromise
|
ISO 9001:2008 Certified Journal
|
Page 713