Network security
ABSTRACT:
These days, computer security is a serious and complex business. True security requires the coordination of staff and technology across the enterprise infrastructure, as well as educated and cooperative users. But even the best of information security policies and plans will fail if the underlying network is not secure. You may think you are doing all you can to protect your network, but think again. Security dangers you're not even aware can be lurking in every corner of your network. This paper provides you with an overview of network security, including firewalls and proxy servers.
One of the pillars of network security is commonly referred to as triple AAA as an abbreviation for authorization, authentication and accounting.
The process of identifying an individual is referred to as authentication.
A common method of the authentication is based upon user name and password, requiring a person to enter a preassigned data pair to gain access to a network facility. This method of authentication via a Password Authentication Protocol
(PAP) in which the data pair is compared to entries stored in table at the destination .Although the stored data is encrypted, the transmitted data is not, representing the weakness that can be exploited by the network monitor.
This paper mainly provides the details of firewalls used in network security, types of firewalls , what it does ,how it protects your system architecture of firewall.
for more info visit.
http://www.enjineer.com/forum
No comments:
Post a Comment