best project center in chennai
ieee 2013 final year projects
2013 ieee final year projects ieee 2013 final year projects in java IEEE final year projects in dotnet
final year projects for cse,it students best ieee projects ieee 2013 projects ieee final year projects for engineering students ieee 2013 final year projects for be btech students best project center in chennai
 

IEEE 2016 JAVA PROJECTS

 
 
NETWORK SECURITY:
DEFINITION
WHAT IS NETWORK?
»
Network Security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, notification or a denial of a computer network and its resources. It also includes the authorization of access to data in a network.
 
Introduction
»
It is generally enforced by assigning a User ID and Password for the users and potential users ought to register themselves for the same.
 
»
It not only protects the network but also oversees operation being done.
 
»
It can also be said as a special field in computer networking that cares about the computer network and its infrastructure.
 
» It is modelled to protect the usability, reliability, integrity and safety of the network and data.
 
» A well modelled network security scheme targets a variety of threats and potential threats. It stops them from entering the network.
 
» It is generally handled by the network administrator.
ieee final year projects
   
 
Block Diagram
 
ieee final year projects ieee final year projects
   
Threats
 
The very familiar and most common network security threats include
  • Viruses, worms and Trojans
  • Spyware, Adware
  • Zero-hour attacks
  • Hacker attacks
  • Denial of service attacks
  • Data interception theft
  • Identity theft
   
Tools:
 
  • Antivirus or Antispyware
  • Firewall
  • Intrusion Prevention System
Virtual Private Network
   
Attacks:
 

There are several types of attacks that are currently used by the intruders / attackers / hackers to breach the security in networks.

  • Active attack
  • Passive attack
  • Distributed attack
  • Insider attack
  • Close-in attack
  • Phishing attack
  • Hijack attack
  • Spoof attack
  • Buffer overflow
  • Exploit attack
  • Password attack
   
Real Time Examples:
 
  • Authentication Applications
  • IP Security
  • Email Security
  • Anti Virus Protection
  • Browser Security (Secure browsing)
  • Web security Standards
 
 
 
 
 
 
 
 
 
   
2013 ieee final year projects  
       
IEEE
Appln Projects
Domin
Products
Solution
dotnet
Dot net
Android
Oracle
Php
Home
Contact Us
Testimonials
Site Map
ieee final year projects in chennai
 
copyright © 2012 | Privacy Policy
 
best project center in chennai final year ieee 2013 projects ieee final year projects
 
website designed & hosted Uniq Technologies