Communication Technology and Network Security

Authors

  • Prof. Ganapathi A  M.Tech(CNE), MSc(IT), B.Tech(CS), DCS &E, Triveni Institute of Commerce & Management, Bangalore, Karnataka, India

Keywords:

Information and Communication Technology, Intrusion, Confidentiality, Firewall, Spoofing, Byzantine attack.

Abstract

Security is a fundamental component in the Communication Technology and network Security. The first and foremost thing of every network planning, designing, building, and operating a network is the importance of a strong security policy. Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern. The internet structure itself allowed for many security threats to occur. Network security is becoming of great importance because of intellectual property that can be easily acquired through the internet. There are different kinds of attack that can be when sent across the network. By knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. There is a large amount of personal, commercial, military, and government information on networking infrastructures worldwide and all of these required different security mechanisms. In this paper, I am trying to discuss current communication technology different kinds of attacks along with various different kinds of security mechanism that can be applied according to the need and architecture of the network.

References

  1. Importance of Network Security, found at http://www.content4reprint.com/computers/security/importance-of-networksecurity-system.htm
  2. R. Heady, G. Luger, A. Maccabe, and M. Servilla(1990). The Architecture of a Network Level Intrusion Detection System. Technical Report Dept. of Computer Science, University of New Mexico, New Mexico, August.
  3. Neha Khandelwal, Prabhakar.M. Kuldeep Sharma, “An Overview Of security Problems in MANET”. [4]. Anupam Joshi and Wenjia Li. “Security Issues in Mobile Ad Hoc Networks- A Survey”.
  4. Ali Ghaffari, “Vulnerability and Security of Mobile Ad hoc Networks”
  5. Predictions and Trends for Information, Computer and Network Security [Online] available: http://www.sans.edu/research/security-laboratory/article/2140
  6. A White Paper, ―Securing the Intelligent Network‖, powered by Intel corporation.
  7. Network Security [Online] available: http://en.wikipedia.org/wiki/Network_security.
  8. Network Security: History, Importance, and Future‖, University of Florida Department of Electrical and Computer Engineering, Bhavya Daya.
  9. Ateeq Ahmad, Type of Security Threats and its Prevention”, Ateeq Ahmad, Int.J.Computer Technology & Applications, Vol 3 (2), 750-752.
  10. Wright, Joe; Jim Harmening (2009) "15" Computer and Information Security Handbook Morgan Kaufmann Publications Elsevier Inc p. 257

Downloads

Published

2019-10-12

Issue

Section

Research Articles

How to Cite

[1]
Prof. Ganapathi A, " Communication Technology and Network Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.43-49, September-October-2019.