Game Theory for Network Security

Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Г.С. Мокану

Угрозы информационной безопасности в компьютерных сетях стали одной из основных проблем для владельцев ПК. При этом особое распространение этих угроз коснулось сетей WI-FI, в которых происходит как несанкционированный доступ к данным, так и только снижение уровня защиты сети. Практически все современные мобильные устройства (смартфоны, планшеты, ноутбуки и нетбуки) имеют возможность подключения к беспроводному Интернету или, точнее, к сети WI-FI, эта функция теперь является стандартной для этих устройств. nformation security threats in computer networks have become one of the main problems for PC owners. At the same time, a particular spread of these threats affected WI-FI networks, in which both unauthorized access to data and only a decrease in the level of network protection occur. Almost all modern mobile devices (smartphones, tablets, laptops and netbooks) have the ability to connect to the wireless Internet or, more precisely, to the WI-FI network, this function is now standard for these devices.


Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


Author(s):  
Divya J Nair

Abstract: Cryptography is a tool that guards a network and data transmission over a network. Data Security is the core aspect of secure data transmission over untrustworthy network. Network security encompasses the authorization of access to data in a network, which is organized by the network administrator. Users select or are assigned an ID and password or other authenticating information that permits them access to information and programs within their control. Network security covers a wide range of computer networks, both public and private, that are used in ordinary jobs performing transactions and communications among businesses, government agencies and individuals. Networks may be private, such as within a company, or private which allow access to the public. Network security is involved in every type of institutions. In this article we concisely outlined Network security and cryptography along with its basic principles. Keywords: Network, Network Security, Cryptography, Asymmetric Cryptosystems, Symmetric Cryptosystems


Author(s):  
Rahul Jain ◽  
Rizwan Khan

In Modern era Internet is expanding at a very fast pace, so as its security needs. Security is an important concept because it contains certain rules, policies and provisions that are being adopted by a network admin to prevent misuse of network accessible resources. It is necessary for both public and private network because there are different type of work including transactions, business communications and government agencies. Network security has become need to prevent information from various threats and viruses.


Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


2018 ◽  
Vol 2 (5) ◽  
Author(s):  
Yuantian Zhang ◽  
Wei Yang ◽  
Zhongxi Zhang

Abstract: In the context of the information age, on the basis of the convenience of computer networks, security issues have gradually emerged. The data encryption technology is reasonably applied in the process of computer network security practice, which promotes the safe and reliable operation of the computer network to a certain extent. Based on this, our article regards data encryption technology as the main research object, focusing on its specific application in computer network security.


2021 ◽  
pp. 174-179
Author(s):  
Mustafa Abdulkadhim ◽  
Sami Hasan

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed


2012 ◽  
Vol 605-607 ◽  
pp. 2387-2390
Author(s):  
Jing Chen

The rapid upgrading internet has brought to us many shortcuts and conveniences. Simultaneously, the underlying security problems have surfaced. These include unauthorized access, posing as legitimate users and destroyed data integrity, which interferes with the normal operation of the system. In addition, these computer network invasions are characterized by the focused attacking source, flexible attacking strategies and expanded scope of the attacked target. This paper analyzes the existing network security risks and means of invasion from various aspects; the network security defense measures are discussed here.


Sign in / Sign up

Export Citation Format

Share Document