Vol 5 Issue 9 Oct 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap
Welcome to ISRJ RNI MAHMUL/2011/38595 ISSN No.2230-7850 Indian Streams Research Journal is a multidisciplinary research journal, published monthly in English, Hindi & Marathi Language. All research papers submitted to the journal will be double - blind peer reviewed referred by members of the editorial board.readers will include investigator in universities, research institutes government and industry with research interest in the general subjects. International Advisory Board Flávio de São Pedro Filho Federal University of Rondonia, Brazil Kamani Perera Regional Center For Strategic Studies, Sri Lanka Janaki Sinnasamy Librarian, University of Malaya Romona Mihaila Spiru Haret University, Romania Delia Serbescu Spiru Haret University, Bucharest, Romania Anurag Misra DBS College, Kanpur Titus PopPhD, Partium Christian University, Oradea,Romania Mohammad Hailat Dept. of Mathematical Sciences, University of South Carolina Aiken Abdullah Sabbagh Engineering Studies, Sydney Ecaterina Patrascu Spiru Haret University, Bucharest Loredana Bosca Spiru Haret University, Romania Fabricio Moraes de Almeida Federal University of Rondonia, Brazil George - Calin SERITAN Faculty of Philosophy and Socio-Political Sciences Al. I. Cuza University, Iasi Editorial Board Hasan Baktir English Language and Literature Department, Kayseri Ghayoor Abbas Chotana Dept of Chemistry, Lahore University of Management Sciences[PK] Anna Maria Constantinovici AL. I. Cuza University, Romania Ilie Pintea, Spiru Haret University, Romania Xiaohua Yang PhD, USA...More Pratap Vyamktrao Naikwade Iresh Swami ASP College Devrukh,Ratnagiri,MS India Ex - VC. Solapur University, Solapur R. R. Patil Head Geology Department Solapur University,Solapur Rama Bhosale Prin. and Jt. Director Higher Education, Panvel Salve R. N. Department of Sociology, Shivaji University,Kolhapur N.S. Dhaygude Ex. Prin. Dayanand College, Solapur Narendra Kadu Jt. Director Higher Education, Pune K. M. Bhandarkar Praful Patel College of Education, Gondia Sonal Singh Vikram University, Ujjain Rajendra Shendge Director, B.C.U.D. Solapur University, Solapur R. R. Yalikar Director Managment Institute, Solapur Umesh Rajderkar Head Humanities & Social Science YCMOU,Nashik S. R. Pandya Head Education Dept. Mumbai University, Mumbai Govind P. Shinde Bharati Vidyapeeth School of Distance Education Center, Navi Mumbai Chakane Sanjay Dnyaneshwar Arts, Science & Commerce College, Indapur, Pune Awadhesh Kumar Shirotriya Secretary,Play India Play,Meerut(U.P.) G. P. Patankar Alka Darshan Shrivastava S. D. M. Degree College, Honavar, Karnataka Shaskiya Snatkottar Mahavidyalaya, Dhar Maj. S. Bakhtiar Choudhary Director,Hyderabad AP India. S.Parvathi Devi Ph.D.-University of Allahabad Sonal Singh, Vikram University, Ujjain Rahul Shriram Sudke Devi Ahilya Vishwavidyalaya, Indore S.KANNAN Annamalai University,TN Satish Kumar Kalhotra Maulana Azad National Urdu University Address:-Ashok Yakkaldevi 258/34, Raviwar Peth, Solapur - 413 005 Maharashtra, India Cell : 9595 359 435, Ph No: 02172372010 Email: ayisrj@yahoo.in Website: www.isrj.org
Indian Streams Research Journal Impact Factor : 3.1560(UIF) ISSN 2230-7850 Volume - 5 Issue - 9 Oct - 2015 SECURITY TECHNIQUES USED IN COMPUTER NETWORKING Aarti Ramesh Sonone Assistant Professor, Department of Management Science, VSS College, Jalna. ABSTRACT Security is one of the important in several areas as personal computer user, organizational computer network etc. because most of the time data will be share from one network to other network via the internet. The rapid growth in the use of internet there is need of computer network security to prevent and protect data or information from the internal and external attacks. Online security includes protection of information from theft, corruption or unauthorized access etc. In this paper we discuss the security techniques used in computer network to protect information and information system from unauthorized user and their advantages. KEYWORDS Threats. :Computer Network Security, Treats in computer, Security Techniques used to avoid INTRODUCTION In the personal or business organization generally every day data being shared over a network from one computer to other and for that security is one of the most essential aspects of networking to protect data or information from unauthorized access. The computer network is a telecommunication network which allow computer to exchange data through some networking devices which are link with each other by establishing either cable media or wireless media but the best and most preferable way is to use internet. The use of internet for communication needs some security for protecting the data from unwanted access and the security is refer as Network Security. Network security is the policies or technique adopted to prevent and monitor authorized access, modification or denial of a computer network and network accessible resources. Network security covers variety of computer networks like conduction transactions and communications among business, government agencies, personal etc. SURVEY OF LITERATURE: To devise the way to evaluate the objectives of study, it is necessary to have an idea of the methodology followed by the earlier related studies along with their findings. A review of literature connected with the computer network their security and advantages. 1
SECURITY TECHNIQUES USED IN COMPUTER NETWORKING Type of Security Threats and It s Prevention (Ateeq Ahmad ): Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats. Information Security: Components and Techniques( Aniruddha Singh, Abhishek Vaish, Pankaj Kumar Keserwani): Institutions of all sizes collect and store huge volumes of confidential information. Most of this information is collected, processed and stored on computers and transmitted across networks to other computers. The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences of international terrorism, fueled the need for better methods of protecting the computers and the information they store, process and transmit. Information security means protecting information and information systems from unauthorized access, use, disruption, or destruction. It also includes a wide range of physical security measures such as protecting your information assets against natural disasters or theft, and social engineering attacks. The paper undertakes the concepts of information security and also review the current technologies related to information security. Network Security: History, Importance, and Future(Bhavya Daya): Network security has become more important topersonal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an intranet to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed. The Future of Organization s Computer Network Security for the Next 5 Years (2011-2015) by Using Delphi Technique(Cholatip Yawut and Phattarapong Keawpipop): Security is one of the important factors in an organization s computer network because the network connects to other networks through the internet. An attack on the organization s computer network can be possible from outside of the organization. Therefore, computer network security is very important to prevent and protect the organization from internal and external attacks. The purpose of this research is to predict the future of computer network security for the next 5 years (2011-2015) by using Delphi technique which is a widely used and accepted method for achieving convergence of opinion concerning real-world knowledge solicited from experts within certain topic areas. The 2
SECURITY TECHNIQUES USED IN COMPUTER NETWORKING research result can be used to ameliorate and develop organization s computer network security including staff, hardware, software and privacy system. Research Methodology: The present research article is mostly depends on secondary sources of data, which is collected by the research from various books, research journals, research articles and various official websites. OBJECTIVES OF THE STUDY: Following are the objectives have been made for the current study: To know about the computer network. To know about Network Security. To know the need for providing security. To study the security Techniques used in Computer Network. ABOUT COMPUTER NETWORK: Computer network is allowing people to communicate people efficiently and easily via email, massaging, telephones, video conferencing etc. Network allows sharing of files, data and other types of information giving authorized users the ability to access information stored on other computer on the network. Through computer network we can share the networking devices as like distributed computing. Some time when working over a network there is possibility to corrupt the system or break the system due to unwanted threats or viruses or the possibility to access data by unauthorized user to avoid this computer network need to protect data and prevent and detect the unauthorized use of computer. The prevention helps to stop the unauthorized user for accessing part of computer system and detection helps to determine whether or not someone attempt to break the system. COMPUTER NETWORK SECURITY: Network security is generally handled by network administrator or system administrator who implements some security polices, network software and hardware needed to protect network and resources through network form unwanted or unauthorized access and also ensure to access the network resources to work. The security system is based on layer of protection and consists of multiple components including networking monitoring and security software, hardware and appliances. All components work together to increase the overall security of computer network. The security is the quality of state being secure means it is free from danger. The business organization has the different of layers of security for the protection of its operations as 1.Physical security protect physical items, objects, areas of an organization from unauthorized access. 2.To protect the personal of group of personal. 3.To protect the series of activity as operations security. 4.To protect organizations communication media, technology and content. 5.To protect networking component, connections and content. 6.To protect the information including systems and hardware. GENERALLY CAUSED TREATS: Following are some treats that attack the system 1. Viruses: computer virus is a program written to alter the way a computer operates, without the 3
SECURITY TECHNIQUES USED IN COMPUTER NETWORKING permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process 2.Hackers: Hackers are programmers who victimize others for their own gain by breaking into computer systems to steal, change or destroy information as a form of cyber-terrorism. 3.Spyware Threats: spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information. We ve amassed a wealth of knowledge that will help you combat spyware threats and stay safe online. 4.Viral Web Sites: Users can communicate by email messages, to visit web sites that contain viruses or Trojans. These sites are known as viral web sites and are often made to look like well known web sites and can have similar web addresses to the sites they are imitating. Users who visit these sites often inadvertently download and run a virus or Trojan and can then become infected or the subject of hacker attacks. 5.Social Engineering: Tricking computer users into revealing computer security or private information, e.g. passwords, email addresses, etc, by exploiting the natural tendency of a person to trust and/or by exploiting a person's emotional response. 6.Bluesnarfing: The act of stealing personal data, specifically calendar and contact information, from a Bluetooth enabled device. 7.Denial of Service: Denial of Service is an attack when the system receiving too many requests cannot return communication with the requestors. The system then consumes resources waiting for the handshake to complete. Eventually, the system cannot respond to any more requests rendering it without service. Security Techniques used to avoid Threats: Generally there are three methods to secure the system from online security attack as 1.Prevention: prevention is nothing but lock the window and installing chain link fence around yard. 2.Detection: Detection is put up the alarms and it will off when someone breaks the system. 3.Reaction: If someone breaks into your house and triggers the burglar alarm, one hopes that the local police force can quickly respond. The same holds true for information security. Once you have detected a failure, you must execute an effective response to the incident Instead of these methods there are number of techniques to defense and detection mechanism was developed to deal with attacks as. 1.Firewall: A firewall is border control mechanism it blocks the traffic from the outside as well as inside. Is the front line defense against intruders. Firewall is system designed to prevent unauthorized access over private network and is implemented both in combination of hardware and software. 2.Intrusion Detection Systems (IDS): It helps to ward off computer intrusions. IDS is used to monitor the connection in determining whether attacks are been launched. Some IDS only monitor and alert of an attack while others to block the attacks. 3.Keep patches and updates current: Cyber criminals exploit vulnerabilities in operating systems, software applications, web browsers and browser plug-ins when administrators are lax about applying patches and updates. 4.Use strong passwords: Definition of a strong password is one that s difficult to detect by humans and computers, is at least 6 characters, preferably more, and uses a combination of upper- and lower-case letters, numbers and symbols. 4
SECURITY TECHNIQUES USED IN COMPUTER NETWORKING 5.Clean up inactive accounts: Hackers use inactive accounts once assigned to contractors and former employees to gain access and disguise their activity. The HP/Ponemon Institute report did find that the companies in the survey were doing a good job deleting accounts once an employee quit or was laid off. Software is available for cleaning up inactive accounts on large networks with many users. 6.Anti-Malware Software and scanners: Anti Malware tools used to detect and cure infected system. Viruses, worms, Trojans are the examples of Malware. 7.Secure Socket Layer (SSL): Is a suit of protocol that achieves a good level of security between web browser and website. SSL designed to create secure channel or tunnel in between web browser and web server. So that information exchanged is protected within secured tunnel. It provide certificates to the client for authentication, user prove their identity using this certificate. CONCLUSIONS: In this paper we conclude that using some above general techniques we protect our personal computer or business organization from online attack like viruses, threats and unauthorized access. REFERENCES: 1.http://compnetworking.about.com/od/networksecurityprivacy/a/introduction-to-computer-net work-security.htm 2.https://en.wikipedia.org/wiki/Network_security 3.https://en.wikipedia.org/wiki/Computer_network 4.http://www.webopedia.com/TERM/N/network_security.html 5.http://www.itmanagerdaily.com/network-security-fundamentals 6.Information Security: Components and Techniques(January 201)( Aniruddha Singh, Abhishek Vaish, Pankaj Kumar Keserwani) 7.Type of Security Threats and It s Prevention (Ateeq Ahmad) 8.The Future of Organization s Computer Network Security for the Next 5 Years (2011-2015) by Using Delphi Technique(Cholatip Yawut??and Phattarapong Keawpipop) 5
Publish Research Article International Level Multidisciplinary Research Journal For All Subjects Dear Sir/Mam, We invite unpublished Research Paper,Summary of Research Project,Theses,Books and Book Review for publication,you will be pleased to know that our journals are Associated and Indexed,India International Scientific Journal Consortium OPEN J-GATE Associated and Indexed,USA Google Scholar EBSCO DOAJ Index Copernicus Publication Index Academic Journal Database Contemporary Research Index Academic Paper Databse Digital Journals Database Current Index to Scholarly Journals Elite Scientific Journal Archive Directory Of Academic Resources Scholar Journal Index Recent Science Index Scientific Resources Database Directory Of Research Journal Indexing Indian Streams Research Journal 258/34 Raviwar Peth Solapur-413005,Maharashtra Contact-9595359435 E-Mail-ayisrj@yahoo.in/ayisrj2011@gmail.com Website : www.isrj.org