Sunday, October 31, 2010

Network security and privacy


Security is needed in order to maintain privacy. Thus network must provide security to the data whenever transmitted from one end point to another end point. The desirable properties of secure communication are confidentiality, authentication, message integrity and non repudiation.

Cryptography technique is generally used in order to provide security to the data while transmitting over network. Thus cryptography keeps information secure from getting into the unauthorized hands or intruders . Basically, Cryptography is the process in which plain text is first encrypted and then transmitted over the network and is then recovered into plain text at destination by using decryption. Process of Cryptography is as shown in following figure.





Encrypted data is referred as cipher text. Various cryptography algorithms are available and are used for encryption as well as decryption of data transmitted over the communication channel. Algorithm uses one or more keys. there are two types of keys: Public key which is publicly available and private key which is known to belonging person only. Intruders may present in between the communication channel. Encryption or decryption algorithms are classified into two types as symmetric and/or asymmetric algorithms. These algorithms help in achieving confidentially and privacy.

Network security can also be achieved by using digital signature and digital certificate. Digital signature and digital certificate are useful in verification of records. A DSA (digital signature algorithm) is used to sign a digital document. Digital signature is used to identify the sender. It specifies that the particular document belong to the person who signed the document. Once a document is signed by a particular person then he cannot say that the document does not belong to him/her. Digital certificate is an electronic certificate issued by a certificate authority. Digital certificate includes digital signature.
In this manner, security is provided to data over the network.
(


This article is the topic of unit " Communication Technologies-II " from RTMNU MBA 3 rd sem IT syllabus notes.Further topics will be covered in upcoming blogs For more notes you can also refer to other links as given below:


)

3 comments:

  1. Digital Signature is one of the great achievement that is coming very quickly in every country. I salute the all the people who put their hand in finding such a great and powerful system by considering people privacy.

    ReplyDelete
  2. I am grateful to you on the grounds that your article is exceptionally useful for me to continue with my exploration in same region. Your cited illustrations are all that much significant to my exploration field.This is extraordinary! It really exhibits to me where to broaden my online diaryQNAP TS ECx80 R2 Series

    ReplyDelete
  3. Thanks for the detail blog.The blog contain informational content about the topic.We really appreciate your effort in posting such an valuable topic.
    For more informaion visit- network security certifications

    ReplyDelete