Open Access   Article Go Back

Introduction to Network Security

Abhinav V. Deshpande1

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 124-134, Sep-2015

Online published on Oct 01, 2015

Copyright © Abhinav V. Deshpande . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Abhinav V. Deshpande, “Introduction to Network Security,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.124-134, 2015.

MLA Style Citation: Abhinav V. Deshpande "Introduction to Network Security." International Journal of Computer Sciences and Engineering 3.9 (2015): 124-134.

APA Style Citation: Abhinav V. Deshpande, (2015). Introduction to Network Security. International Journal of Computer Sciences and Engineering, 3(9), 124-134.

BibTex Style Citation:
@article{Deshpande_2015,
author = {Abhinav V. Deshpande},
title = {Introduction to Network Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {124-134},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=654},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=654
TI - Introduction to Network Security
T2 - International Journal of Computer Sciences and Engineering
AU - Abhinav V. Deshpande
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 124-134
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2429 2295 downloads 2408 downloads
  
  
           

Abstract

Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become “wired”, an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them. Some history of networking is included, as well as an introduction to TCP/IP and internet working. We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a reference, nor is it a document describing how to accomplish specific functionality. It is hoped that the people will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace.

Key-Words / Index Term

Network Security, TCP/IP, Cryptography, UUCP, Firewall, Denial of Service, UDP

References

[1]. The New Lexicon Webster's Encyclopaedic Dictionary of the English Language, New York: Lexicon.
[2]. R.T. Morris, “A Weakness in the 4.2 BSD Unix TCP/IP Software Computing Science”, Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey, 1985.
[3]. S.M. Bellovin, “Security Problems in the TCP/IP Protocol Suite”, Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989.
[4]. Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear, “Address Allocation for Private Internets”, RFC 1918.
[5]. J.P. Holbrook, J.K. Reynolds, “Site Security Handbook”, RFC 1244.
[6]. M. Curtin, “Snake Oil Warning Signs: Encryption Software to Avoid”, USENET
[7]. Abhinav Gupta, Prabhdeep Singh, “Improving the Performance of Mobile Wireless Sensor Networks Using Modified DBSCAN”, International Journal of Computer Sciences and Engineering (IJCSE), Volume 3, Issue 8, August 2015.