Internet Security System
Internet Security System
“network security”
by
Ms.J.S.Sawant
2020-2021
1|Page
Sau.Shantidevi Chavan Institute Polytechnic,Bhoras
Chalisgaon-424101
CERTIFICATE
This is to certify that 1) Ms. Neha Shivaji Rajput
Place: BHORAS
2|Page
INDEX
2 Abstract 5
3 Introduction 6
9 Conclusion 15
10 References 16
3|Page
Acknowledgement
We would take this opportunity to express my sincere
thanks and gratitude to my teacher Ms.J.S.Sawant for his
vital support and guidance in completing this project.
4|Page
ABSTRACT
5|Page
INTRODUCTION
The world is becoming more interconnected with the advent of the
Internet and new networking technology. There is a large amount
of personal, commercial, military, and government information on
networking infrastructures worldwide. Network security is
becoming of great importance because of intellectual property
that can be easily acquired through the internet.
6|Page
HISTORY OF NETWORK SECURITY
Recent interest in security was fueled by the crime committed by Kevin
Mitnick. Kevin Mitnick committed the largest computer‐related crime in U.S.
history . The losses were eighty million dollars in U.S. intellectual property
and source code from a variety of companies . Since then, information
security came into the spotlight.
Public networks are being relied upon to deliver financial and personal
information. Due to the evolution of information that is made available
through the internet, information security is also required to evolve. Due to
Kevin Mitnick’s offense, companies are emphasizing security for the
intellectual property. Internet has been a driving force for data security
improvement.
7|Page
INTERNET ARCHITECTURE AND VULNERABLE
SECURITY ASPECTS
Fear of security breaches on the Internet is causing organizations to use
protected private networks or intranets [4]. The Internet Engineering Task
Force (IETF) has introduced security mechanisms at various layers of the
Internet Protocol Suite [4]. These security mechanisms allow for the logical
protection of data units that are transferred across the network.
8|Page
SECURITY IN DIFFERENT NETWORKS
The businesses today use combinations of firewalls, encryption, and
authentication mechanisms to create “intranets” that are connected to the
internet but protected from it at the same time.
There does not necessarily have to be any access from the organization's
internal network to the Internet itself. When such access is provided it is
usually through a gateway with a firewall, along with user authentication,
encryption of messages, and often makes use of virtual private networks
(VPNs).
10 | P a g e
CURRENT DEVELOPMENTS IN NETWORK SECURITY
The network security field is continuing down the same route. The same
methodologies are being used with the addition of biometric identification.
Biometrics provides a better method of authentication than passwords. This
might greatly reduce the unauthorized access of secure systems. New
technology such as the smart card is surfacing in research on network
security. The software aspect of network security is very dynamic.
Constantly new firewalls and encryption schemes are being implemented.
1. Hardware Developments
The most obvious use of biometrics for network security is for secure
workstation logons for a workstation connected to a network. Each
workstation requires some software support for biometric identification of
the user as well as, depending on the biometric being used, some
hardware device. The cost of hardware devices is one thing that may lead
to the widespread use of voice biometric security identification, especially
among companies and organizations on a low budget. Hardware device
such as computer mice with built in thumbprint readers would be the next
step up. These devices would be more expensive to implement on several
computers, as each machine would require its own hardware device. A
11 | P a g e
biometric mouse, with the software to support it, is available from around
$120 in the U.S. The advantage of voice recognition software is that it can
be centralized, thus reducing the cost of implementation per machine. At
top of the range a centralized voice biometric package can cost up to
$50,000 but may be able to manage the secure log‐ in of up to 5000
machines.
The main use of Biometric network security will be to replace the current
password system. Maintaining password security can be a major task for
even a small organization. Passwords have to be changed every few
months and people forget their password or lock themselves out of the
system by incorrectly entering their password repeatedly. Very often people
write their password down and keep it near their computer. This is of
course completely undermines any effort at network security. Biometrics
can replace this security identification method. The use of biometric
identification stops this problem and while it may be expensive to set up at
first, these devices save on administration and user assistance costs.
12 | P a g e
2. Software Developments
The software aspect of network security is very vast. It includes firewalls,
antivirus, vpn, intrusion detection, and much more. The research
development of all security software is not feasible to study at this point.
The goal is to obtain a view 12 of where the security software is heading
based on emphasis being placed now.
Many small and complex devices can be connected to the internet. Most of
the current security algorithms are computational intensive and require
substantial processing power. This power, however, is not available in
small devices like sensors. Therefore, there is a need for designing light‐
weight security algorithms. Research in this area is currently being
performed.
13 | P a g e
FUTURE TRENDS IN SECURITY
What is going to drive the Internet security is the set of applications more
than anything else. The future will possibly be that the security is similar to
an immune system. The immune system fights off attacks and builds itself
to fight tougher enemies. Similarly, the network security will be able to
function as an immune system.
The trend towards biometrics could have taken place a while ago, but it
seems that it isn’t being actively pursued. Many security developments that
are taking place are within the same set of security technology that is being
used today with some minor adjustments.
14 | P a g e
CONCLUSION
Network security is an important field that is increasingly gaining attention
as the internet expands. The security threats and internet protocol were
analyzed to determine the necessary security technology. The security
technology is mostly software based, but many common hardware devices
are used. The current development in network security is not very
impressive.
Originally it was assumed that with the importance of the network security
field, new approaches to security, both hardware and software, would be
actively researched. It was a surprise to see most of the development
taking place in the same technologies being currently used. The embedded
security of the new internet protocol IPv6 may provide many benefits to
internet users. Although some security issues were observed, the IPv6
internet protocol seems to evade many of the current popular attacks.
Combined use of IPv6 and security tools such as firewalls, intrusion
detection, and authentication mechanisms will prove effective in guarding
intellectual property for the near future. The network security field may have
to evolve more rapidly to deal with the threats further in the future.
15 | P a g e
REFERENCES
http://www.aimt.edu.in/wpcontent/uploads/2016/12/
Network Security.pdf
https://en.wikipedia.org/wiki/Network_security
https://en.wikipedia.org/wiki/Network_security_pol
icy
https://www.cisco.com/c/en_in/products/security/
what-is-network-
security.html#:~:text=Network%20security%20is%
20any%20activity,manages%20access%20to%20t
he%20network
16 | P a g e