A Review on Network Security

Author(s):  
Rahul Jain ◽  
Rizwan Khan

In Modern era Internet is expanding at a very fast pace, so as its security needs. Security is an important concept because it contains certain rules, policies and provisions that are being adopted by a network admin to prevent misuse of network accessible resources. It is necessary for both public and private network because there are different type of work including transactions, business communications and government agencies. Network security has become need to prevent information from various threats and viruses.

Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


Author(s):  
E. Ruhode ◽  
V. Owei

Improving information management practices is a key focus for many organisations across both the public and private sectors. An information society begins with a connected government and ICTs are the bedrock and founding pillars of such societies. To assist public administrators think beyond traditional e-government, this study describes a concept of connected government, whose philosophy rests on the integration story that happens behind the scenes of the visible web interface as well as the collaboration among government agencies. Diffusion of Innovations theory is the conceptual framework underpinning this study. The connected government phenomenon is also put into perspective by the systems theory that is explained in this study. This article describes a case study of an organisation in a developing country environment where even the basic e-government services are barely extant. This study was done to determine the connectedness within and across government agencies, with the idea of stimulating some thinking within and among public administrators, around the possibility that a connected government can indeed be established in a developing country setting. The study exposes shortcomings to e-government diffusion not only of the organisation under investigation, but also of other similar enterprises in developing countries within the same context. The paper concludes by proposing a set of recommendations toward diffusing connected government applications as an antidote to identified problems.


2019 ◽  
Vol 35 (24) ◽  
pp. 5385-5388
Author(s):  
Vid Podpečan ◽  
Živa Ramšak ◽  
Kristina Gruden ◽  
Hannu Toivonen ◽  
Nada Lavrač

Abstract Summary Biomine Explorer is a web application that enables interactive exploration of large heterogeneous biological networks constructed from selected publicly available biological knowledge sources. It is built on top of Biomine, a system which integrates cross-references from several biological databases into a large heterogeneous probabilistic network. Biomine Explorer offers user-friendly interfaces for search, visualization, exploration and manipulation as well as public and private storage of discovered subnetworks with permanent links suitable for inclusion into scientific publications. A JSON-based web API for network search queries is also available for advanced users. Availability and implementation Biomine Explorer is implemented as a web application, which is publicly available at https://biomine.ijs.si. Registration is not required but registered users can benefit from additional features such as private network repositories.


Author(s):  
Divya J Nair

Abstract: Cryptography is a tool that guards a network and data transmission over a network. Data Security is the core aspect of secure data transmission over untrustworthy network. Network security encompasses the authorization of access to data in a network, which is organized by the network administrator. Users select or are assigned an ID and password or other authenticating information that permits them access to information and programs within their control. Network security covers a wide range of computer networks, both public and private, that are used in ordinary jobs performing transactions and communications among businesses, government agencies and individuals. Networks may be private, such as within a company, or private which allow access to the public. Network security is involved in every type of institutions. In this article we concisely outlined Network security and cryptography along with its basic principles. Keywords: Network, Network Security, Cryptography, Asymmetric Cryptosystems, Symmetric Cryptosystems


2020 ◽  
Vol 8 (1) ◽  
Author(s):  
Sari Dewi

AbstractSistem Keamanan Jaringan semakin berkembang seiring dengan perkembangan  teknologi. Instansi - instansi sudah melakukan komputerisasi, dimana setiap bagian di dalam instansi tersebut sudah menggunakan komputer dalam operasionalnya, hal ini membuat instansi pemerintahan meningkatkan kualitas dan kuantitas sistem teknologi informasi. Dengan adanya komputerisasi di pemerintahan perlu adakannya Sistem Keamanan Jaringan yang baik, agar pertukaran data dari kantor kabupaten ke kantor desa dapat dilakukan secara aman dan terkendali. Berbagai software sudah bisa mengatasi permasalahaan tersebut, akan tetapi dari segi keamanan data itu sendiri yang masih sangat dikhawatirkan kebocoran datanya, oleh karena itu dengan menggunakan teknologi VPN dengan metode PPTP sangat cocok digunakan untuk mengamankan pertukaran data, karena proses kerja VPN yaitu dengan membuat jaringan sendiri yang sifatnya rahasia dengan menggunakan IP Publik, membuat keamanan data lebih terjaga kerahasiaannya dan mencegah kebocoran data oleh pihak-pihak yang tidak bertanggung jawab. Keywords: VPN, PPTP, Keamanan Jaringan, mikrotik, Data. AbstractNetwork Security Systems are increasingly developing along with technological developments. Agencies have done computerization, where every part in the agency has used computers in its operations, this has made government agencies improve the quality and quantity of information technology systems. With computerization in government it is necessary to have a good Network Security System, so that data exchange from district offices to village offices can be done safely and in a controlled manner. Various software can overcome these problems, but in terms of data security itself that is still very much concerned about data leakage, therefore using VPN technology with PPTP method is very suitable to be used to secure data exchange, because the VPN work process is to create its own network which is confidential by using Public IP, makes data security more confidential and prevents data leakage by irresponsible parties.Keywords: VPN, PPTP, Network Security, proxy, Data.


2021 ◽  
Vol 6 (1) ◽  
pp. 47-57
Author(s):  
Sophia Tanady ◽  
Jessy Meilavia ◽  
Wilsa Road Betterment Sitepu

In this modern era, the services of an auditor are very much needed by government agencies and private agencies because the results of the decisions made by auditors can reflect the transparency of an organization. An auditor must have an attitude of competence and good skepticism so that when assessing an organization, no mistakes occur. The attitude of complexity is also an attitude that must be possessed by an auditor where an auditor must be able to know what difficulties or obstacles will be faced in determining the outcome of the decision. Complexity also requires auditors to think about whether the task being carried out can be completed properly or not. The characteristics that exist in the auditor may reflect the quality of the audit produced by the auditor. The research method used is quantitative research methods with all members of public accountants used as population data and the use of the Likert scale as a reference in collecting questionnaire data. From the results of research that has been conducted in Medan, it can be concluded that.


2021 ◽  
Vol 7 (9) ◽  
pp. 479-485
Author(s):  
J. Arzieva ◽  
N. Nukusbaev

This article defines a VPN as a virtual private network. This technology is based on the formation of an internal network within another network to exchange all information between users in order to provide reliable protection.


Living in this modern era – the epitome of communication GSM networks is one of the mainly used architectures. But GSM architecture has its own shortcomings; the GSM network is vulnerable to various security threats. For any network to provide security to the user, the algorithms should be planned and designed in such a way that it provides cellular secrecy, data and signaling confidentiality to the concerned user. Keeping in mind the above features, the A5/1 algorithm provides network security. Initially, the A5/1 algorithm dealt with a pre-defined secret key but they still possess the threat of being decrypted by cryptanalytic attacks. Although decrypting this algorithm is not easy and requires high computational power. Such attacks lead to the necessity to modify the A5/1 algorithm; in our paper, we have proposed a better method to enhance the already existing algorithm.


2021 ◽  
Vol 6 (2) ◽  
pp. 29-40
Author(s):  
Mohd Nizam Osman ◽  
Khairul Anwar Sedek ◽  
Nor Arzami Othman ◽  
Muhammad Afiqhakimi Rosli ◽  
Mushahadah Maghribi

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 


Sign in / Sign up

Export Citation Format

Share Document