You are here:   HomeComputer Networking
by Dinesh Thakur Category: Security

To encrypt a file or other information stored in a computer means to convert it into a secret code so that it can't be used or understood until it is decoded or decrypted. You might want to encrypt a file if it contained a secret formula for a new invention, or some financial plans that your competitors would love to know about in advance. When you encrypt something, the computer will ask you to set up a password. After that, no one will be able to make sense of the information unless they have the same password.

Encryption hides your data from curious eyes. This is a process of encoding data to prevent unauthorized person from viewing or modifying it. The main features of data encryption are:



 
by Dinesh Thakur Category: Security

Network security can provide the following services related to a message and entity.

 
by Dinesh Thakur Category: Security

• Signature is the proof to the receiver that the document comes from the correct entity. The person who signs it takes the responsibility of the content present in the document.

• A signature on a document, when verified, is a sign of authentication; the document is authentic.

 
by Dinesh Thakur Category: Security

• Security Hash Algorithm (SHA) was developed in 1993 by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA).

 
by Dinesh Thakur Category: Security

Virtual Private Networks creates a tunnel for using a public network (such as Internet) to transfer information between client's PC and office's network. To initiate tunnel in client PC it must have VPN software to connect the ISP router (RAS). After verification of validity of user, software establishes the connection between ISP and use client machine. The data packets sent through tunnel are encapsulated by the tunneling protocol in an additional header. The additional header provides routing information so that the encapsulated payload can traverse the intermediate inter-network (Public network, i.e. Internet). When the packets arrive at destination, the VPN software strips the header off the packets (or unencapsulates the packets) and send it to its destination on the local network.



 
by Dinesh Thakur Category: Security

• There are a number of popular message digest algorithms known as MDn for various values of n.

• MD5 is the most popular and is fifth in a series of message digests designed by Ronald Rivest.

 
by Dinesh Thakur Category: Security

A VPN is a private connection between two machines or networks over a shared or public network. VPN technology lets an organization securely extend its network services over the Internet to remote users, branch offices, and partner companies. VPN turn the Internet into a simulated private WAN.

 
by Dinesh Thakur Category: Security

• Message authentication ensures that the message has been sent by a genuine identity and not by an imposter.

• The service used to provide message authentication is a Message Authentication Code (MAC).

 
by Dinesh Thakur Category: Security

A user remotely located must be first authenticated before accessing the network or Intranet of an organization. The authentication procedures must be built into the firewall applied to the network or Intranet for the security measures. The procedures to validate remote login or access have been described in the following lines along with their comparison and features:

 

Page 36 of 36

What's New and Popular