• Dr. R.K.P. Yadav
  • Akhilesh Kumar
Keywords: NETWORK


Computer networks were primarily used by university researches for sending email, and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem. In the following sections, we will study network security from several angles, point out numerous pitfalls, and protocols for making networks more secure. Network security problems can be divided roughly into four intertwined areas: secrecy, authentication, Non-repudiation, and integrity control. Secrecy has to do with keeping information out of hands of authorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. In the network layers, firewalls are installed to keep packets in or keep packets out. In the transport layer entire connections can be encrypted, end-to-end, that is, process to process. To tackle these problems, the solutions must be in the application layer, which is why these are being studied in this paper. Network security is becoming more and more crucial as the volume of data being exchanged on the Internet increases. When people use the Internet, they have certain expectations. They expect confidentiality and the data integrity. They want to be able to identifij the sender of a message. They want to be able to prove that a message has in fact sent by a certain sender even if the sender denies it.

Author Biography


Research Scholar (M.U. Bodh Gaya)

Dr. R.K.P. Yadav

Akhilesh Kumar