Networking and internet are rapidly expanding sector of computer market .The simple fact is that the internet and fax computers are just like any other large community with both good and bad elements.
The requirements of Information security within an organization have undergone two major changes in the last several decades. Before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and Administrative means. The generic name for collection of tools designed to protect data and thwart hackers isComputer Security. Second major change that affected security is the introduction of distributed systems and the use of networks and communications facilities for carrying data between terminals user and computer and between computer and computer.Network Security measures are needed to protect data during their transmission.Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.
discuss many algorithms and protocols for making networks more secure. Network Security problems can be divided roughly into 4 four interwined Areas;
Integrity control deals with securing the message from any modifications by intruders. When the contents of a message are changed after the sender sends it, but before it reaches the intended recipient, we say that the integrity of the message is lost.
All these issues (secrecy,authentication, non-repudiation, and integrity control ) occur in traditional systems too, but with some significant differences.secrecy and integrity are achieved by signing registered mail and locking documents up.
People authenticate other people by recognizing their faces, voices, and handwriting. Signatures on letterhead paper, raised seals, and so on handle proof of signing. Handwriting, paper and ink experts can usually detect tampering. None of these options are available electronically. Clearly, other solutions are needed.
Cryptography is the art of achieving security by encoding messages to make them non-readable. In the early days, cryptography used to be performed by using manual techniques. The basic framework of performing cryptography has remained more or less the same, of course, with a lot of improvements in the actual
This action might not be possible to undo. Are you sure you want to continue?