0% found this document useful (0 votes)
118 views16 pages

Internet Security System

This document is a project report on network security by three students - Neha Shivaji Rajput, Pavan Kamalsing Patil, and Pratik Ashok Patil, under the guidance of their professor Ms. J.S. Sawant. The report contains an introduction to network security, a history of network security, vulnerabilities in internet architecture, security in different network types like intranets and virtual private networks, and current and future developments in the field. It was submitted to fulfill the requirements of a diploma in computer engineering from Sau. Shantidevi Chavan Polytechnic in Bhoras, India.

Uploaded by

N Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views16 pages

Internet Security System

This document is a project report on network security by three students - Neha Shivaji Rajput, Pavan Kamalsing Patil, and Pratik Ashok Patil, under the guidance of their professor Ms. J.S. Sawant. The report contains an introduction to network security, a history of network security, vulnerabilities in internet architecture, security in different network types like intranets and virtual private networks, and current and future developments in the field. It was submitted to fulfill the requirements of a diploma in computer engineering from Sau. Shantidevi Chavan Polytechnic in Bhoras, India.

Uploaded by

N Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

A Micro Project On 2020-21

“network security”
by

1).Neha Shivaji Rajput.


2). Pavan Kamalsing Patil.
3).Pratik Ashok Patil.
Under The Guidance Of,

Ms.J.S.Sawant

Department of Computer Engineering,


Sau. Shantidevi Chavan Polytechnic,Bhoras

2020-2021

1|Page
Sau.Shantidevi Chavan Institute Polytechnic,Bhoras

Chalisgaon-424101

CERTIFICATE
This is to certify that 1) Ms. Neha Shivaji Rajput

2) Mr.Pavan Kamalsing Patil

3)Mr.Pratik Ashok Patil has successfully


completed the micro Project on “NETWORK SECURITY” under
my supervision in the partially fulfillment of diploma of
engineering (computer)of Sau.Shantidevi Chavan Institute
Polytechnic,Bhoras.
Date:

Place: BHORAS

Prof.J.S.Sawant Prof.Y.K.Pardeshi Prof.D.A.Patil


Project Guide HOD PRINCIPAL

2|Page
INDEX

Sr.n TOPIC PAGE


o .NO
1 Acknowledgement 4

2 Abstract 5
3 Introduction 6

4 History Of Network Security 7


5 Internet Architecture And Vulnerable Security 8
Aspects
6 Current Developments In Network Security 9

7 Security In Different Networks 11

8 Future Trends In Security 14

9 Conclusion 15

10 References 16

3|Page
Acknowledgement
We would take this opportunity to express my sincere
thanks and gratitude to my teacher Ms.J.S.Sawant for his
vital support and guidance in completing this project.

We also express our gratitude to all the facility


members,parents and our fellow mates who have helped
me in making this project a success. We also thank our
almighty God for his blessings showed on me during
this period.

4|Page
ABSTRACT

The rapid development of computer network system brings both a


great convenience and new security threats for users. Network
security problem generally includes network system security and
data security. Specifically, it refers to the reliability of network
system, confidentiality, integrity and availability of data information
in the system. Network security problem exists through all the
layers of the computer network, and the network security
objective is to maintain the confidentiality, authenticity, integrity,
dependability, availability and audit-ability of the network. This
paper introduces the network security technologies mainly in
detail, including authentication, data encryption technology,
firewall technology, intrusion detection system (IDS), antivirus
technology and virtual private network (VPN). Network security
problem is related to every network user, so we should put a high
value upon network security, try to prevent hostile attacks and
ensure the network security.

5|Page
INTRODUCTION
The world is becoming more interconnected with the advent of the
Internet and new networking technology. There is a large amount
of personal, commercial, military, and government information on
networking infrastructures worldwide. Network security is
becoming of great importance because of intellectual property
that can be easily acquired through the internet.

There are currently two fundamentally different networks, data


networks and synchronous network comprised of switches. The
internet is considered a data network. Since the current data
network consists of computer‐based routers, information can be
obtained by special programs, such as “Trojan horses,” planted in
the routers. The synchronous network that consists of switches
does not buffer data and therefore are not threatened by
attackers. That is why security is emphasized in data networks,
such as the internet, and other networks that link to the internet.

6|Page
HISTORY OF NETWORK SECURITY
Recent interest in security was fueled by the crime committed by Kevin
Mitnick. Kevin Mitnick committed the largest computer‐related crime in U.S.
history . The losses were eighty million dollars in U.S. intellectual property
and source code from a variety of companies . Since then, information
security came into the spotlight.

Public networks are being relied upon to deliver financial and personal
information. Due to the evolution of information that is made available
through the internet, information security is also required to evolve. Due to
Kevin Mitnick’s offense, companies are emphasizing security for the
intellectual property. Internet has been a driving force for data security
improvement.

Internet protocols in the past were not developed to secure themselves.


Within the TCP/IP communication stack, security protocols are not
implemented. This leaves the internet open to attacks. Modern
developments in the internet architecture have made communication more
secure.

7|Page
INTERNET ARCHITECTURE AND VULNERABLE
SECURITY ASPECTS
Fear of security breaches on the Internet is causing organizations to use
protected private networks or intranets [4]. The Internet Engineering Task
Force (IETF) has introduced security mechanisms at various layers of the
Internet Protocol Suite [4]. These security mechanisms allow for the logical
protection of data units that are transferred across the network.

The security architecture of the internet protocol, known as IP Security, is


a standardization of internet security. IP security, IPsec, covers the new
generation of IP (IPv6) as well as the current version (IPv4). Although new
techniques, such as IPsec, have been developed to overcome internet’s
best‐known deficiencies, they seem to be insufficient [5]. Figure 2 shows a
visual representation of how IPsec is implemented to provide secure
communications.

IPSec is a point‐to‐point protocol, one side encrypts, the other decrypts


and both sides share key or keys. IPSec can be used in two modes,
namely transport mode and tunnel modes.

8|Page
SECURITY IN DIFFERENT NETWORKS
The businesses today use combinations of firewalls, encryption, and
authentication mechanisms to create “intranets” that are connected to the
internet but protected from it at the same time.

Intranet is a private computer network that uses internet protocols.


Intranets differ from "Extranets" in that the former are generally restricted to
employees of the organization while extranets can generally be accessed
by customers, suppliers, or other approved parties.

There does not necessarily have to be any access from the organization's
internal network to the Internet itself. When such access is provided it is
usually through a gateway with a firewall, along with user authentication,
encryption of messages, and often makes use of virtual private networks
(VPNs).

Although intranets can be set up quickly to share data in a controlled


environment, that data is still at risk unless there is tight security. The
disadvantage of a closed intranet is that vital data might not get into the
hands of those who need it. Intranets have a place within agencies. But for
broader data sharing, it might be better to keep the networks open, with
these safeguards:

1. Firewalls that detect and report intrusion attempts

2. Sophisticated virus checking at the firewall

3. Enforced rules for employee opening of e‐ mail attachments

4. Encryption for all connections and data transfers

5. Authentication by synchronized, timed passwords or security certificates


9|Page
It was mentioned that if the intranet wanted access to the internet, virtual
private networks are often used. Intranets that exist across multiple
locations generally run over separate leased lines or a newer approach of
VPN can be utilized. VPN is a private network that uses a public network
(usually the Internet) to connect remote sites or users together. Instead of
using a dedicated, real‐world connection such as leased line, a VPN uses
"virtual" connections routed through the Internet from the company's private
network to the remote site or employee. Figure 3 is a graphical
representation of an organization and VPN network.

10 | P a g e
CURRENT DEVELOPMENTS IN NETWORK SECURITY
The network security field is continuing down the same route. The same
methodologies are being used with the addition of biometric identification.
Biometrics provides a better method of authentication than passwords. This
might greatly reduce the unauthorized access of secure systems. New
technology such as the smart card is surfacing in research on network
security. The software aspect of network security is very dynamic.
Constantly new firewalls and encryption schemes are being implemented.

The research being performed assists in understanding current


development and projecting the future developments of the field.

1. Hardware Developments

Hardware developments are not developing rapidly. Biometric systems and


smart cards are the only new hardware technologies that are widely
impacting security.

The most obvious use of biometrics for network security is for secure
workstation logons for a workstation connected to a network. Each
workstation requires some software support for biometric identification of
the user as well as, depending on the biometric being used, some
hardware device. The cost of hardware devices is one thing that may lead
to the widespread use of voice biometric security identification, especially
among companies and organizations on a low budget. Hardware device
such as computer mice with built in thumbprint readers would be the next
step up. These devices would be more expensive to implement on several
computers, as each machine would require its own hardware device. A

11 | P a g e
biometric mouse, with the software to support it, is available from around
$120 in the U.S. The advantage of voice recognition software is that it can
be centralized, thus reducing the cost of implementation per machine. At
top of the range a centralized voice biometric package can cost up to
$50,000 but may be able to manage the secure log‐ in of up to 5000
machines.

The main use of Biometric network security will be to replace the current
password system. Maintaining password security can be a major task for
even a small organization. Passwords have to be changed every few
months and people forget their password or lock themselves out of the
system by incorrectly entering their password repeatedly. Very often people
write their password down and keep it near their computer. This is of
course completely undermines any effort at network security. Biometrics
can replace this security identification method. The use of biometric
identification stops this problem and while it may be expensive to set up at
first, these devices save on administration and user assistance costs.

Smart cards are usually a credit‐card‐sized digital electronic media. The


card itself is designed to store encryption keys and other information used
in authentication and other identification processes. The main idea behind
smart cards is to provide undeniable proof of a user’s identity. Smart cards
can be used for everything from logging in to the network to providing
secure Web communications and secure e‐mail transactions

12 | P a g e
2. Software Developments
The software aspect of network security is very vast. It includes firewalls,
antivirus, vpn, intrusion detection, and much more. The research
development of all security software is not feasible to study at this point.
The goal is to obtain a view 12 of where the security software is heading
based on emphasis being placed now.

The improvement of the standard security software still remains the


same. When new viruses emerge, the antivirus is updated to be able to
guard against those threats. This process is the same for firewalls and
intrusion detection systems. Many research papers that have been
skimmed were based on analyzing attack patterns in order to create
smarter security software.

As the security hardware transitions to biometrics, the software also


needs to be able to use the information appropriately. Current research is
being performed on security software using neural networks. The objective
of the research is to use neural networks for the facial recognition software.

Many small and complex devices can be connected to the internet. Most of
the current security algorithms are computational intensive and require
substantial processing power. This power, however, is not available in
small devices like sensors. Therefore, there is a need for designing light‐
weight security algorithms. Research in this area is currently being
performed.

13 | P a g e
FUTURE TRENDS IN SECURITY
What is going to drive the Internet security is the set of applications more
than anything else. The future will possibly be that the security is similar to
an immune system. The immune system fights off attacks and builds itself
to fight tougher enemies. Similarly, the network security will be able to
function as an immune system.

The trend towards biometrics could have taken place a while ago, but it
seems that it isn’t being actively pursued. Many security developments that
are taking place are within the same set of security technology that is being
used today with some minor adjustments.

14 | P a g e
CONCLUSION
Network security is an important field that is increasingly gaining attention
as the internet expands. The security threats and internet protocol were
analyzed to determine the necessary security technology. The security
technology is mostly software based, but many common hardware devices
are used. The current development in network security is not very
impressive.

Originally it was assumed that with the importance of the network security
field, new approaches to security, both hardware and software, would be
actively researched. It was a surprise to see most of the development
taking place in the same technologies being currently used. The embedded
security of the new internet protocol IPv6 may provide many benefits to
internet users. Although some security issues were observed, the IPv6
internet protocol seems to evade many of the current popular attacks.
Combined use of IPv6 and security tools such as firewalls, intrusion
detection, and authentication mechanisms will prove effective in guarding
intellectual property for the near future. The network security field may have
to evolve more rapidly to deal with the threats further in the future.

15 | P a g e
REFERENCES

 http://www.aimt.edu.in/wpcontent/uploads/2016/12/
Network Security.pdf

 https://en.wikipedia.org/wiki/Network_security

 https://en.wikipedia.org/wiki/Network_security_pol
icy

 https://www.cisco.com/c/en_in/products/security/
what-is-network-
security.html#:~:text=Network%20security%20is%
20any%20activity,manages%20access%20to%20t
he%20network

16 | P a g e

You might also like