Network Security

Authors

  • Punam Dhage  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India
  • Parth Lashkare  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India
  • Nikita Narole  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India

Keywords:

Cryptography, Security Attacks, Security Measures, Security Tools, WAN, Security Factors, Firewalls, Gateways, Intrusion Detection

Abstract

Secure Network has now become a need of any organization. The security threats are increasing day by day and making high speed wired/wireless network and internet services, insecure and unreliable. Now – a - days security measures works more importantly towards fulfilling the cutting edge demands of today’s growing industries. The need is also induced in to the areas like defense, where secure and authenticated access of resources are the key issues related to information security. In this paper Author has described the important measures and parameters regarding large industry/organizational requirements for establishing a secure network. Wi-Fi networks are very common in providing wireless network access to different resources and connecting various devices wirelessly. There are need of different requirements to handle Wi-Fi threats and network hacking attempts. This paper explores important security measures related to different network scenarios, so that a fully secured network environment could be established in an organization. Author also has discussed a case study to illustrate the minimal set of measures required for establishing network security in any organization.

References

  1. A beginner’s guide to network security, CISCO Systems, found at h ttp://www.cisco.com/warp/public/cc/so/neso/sqso/ b eggu_pl.pdf,
  2. Al-Akhras, M.A., “Wireless Network Security Implementation in Universities” In Proc. of Information and Communication Technologies, 2006. ICTTA '06., Vol. 2, pp. 3192 – 3197, 2006.
  3. Brenton, C. and Hunt, C. (2002): Mastering Network Security, Second Edition, Wiley
  4. Farrow, R., Network Security Tools, found at http://sageweb.sage.org/pubs/whitepapers/farrow.pdf
  5. Flauzac, O.; Nolot, F.; Rabat, C.; Steffenel, L.-A., “Grid of Security: A New Approach o f the Network Security”, In Proc. of Int. Conf. on Network and System Security, 2009. NSS '09, pp. 67-72, 2009.
  6. Importance of Network Security, found at http://www.content4reprint.com/computers/security/importance-of-network-security-system.htm
  7. Advantages And Disadvantages of Network | Pros and Cons of Network, Difference Between Advantages and Disadvantages - A Plus Topper

Downloads

Published

2022-02-28

Issue

Section

Research Articles

How to Cite

[1]
Punam Dhage, Parth Lashkare, Nikita Narole, " Network Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 1, pp.344-350, January-February-2022.