Sei sulla pagina 1di 4

Data Protection Techniques

Introduction:
The low-cost nature of the Internet coupled with the ease of making transactions has led to an explosive growth in e-business but trust in this medium is still a major concern. E-security is the foundation that enables trust in e-business. In this sense, main cryptographic aspects of modern TCP/IP computer networks, addressed here are digital signature technology based on

asymmetrical cryptographic algorithms, data confidentiality by applying symmetrical cryptographic systems, and PKI system Public Key Infrastructure.

Here a computer network security based on Public Key Infrastructure (PKI) systems. First, we consider possible vulnerabilities of the TCP/IP computer networks and possible techniques to eliminate them. We signify that only a general and multi layered security infrastructure could cope with possible attacks to the computer network systems. We evaluate security mechanisms on application, transport and network layers of ISO/OSI reference model and give examples of the today most

popular security protocols applied in each of the mentioned layers (e.g. S/MIME, SSL and IPSec). Namely, we recommend a secure computer network systems that consists of combined security mechanisms on three different ISO/OSI reference model layers: Application layer security (end-to-end security) based on strong user authentication, digital signature, confidentiality protection, digital certificates and hardware tokens (e.g. smart cards), Transport layer security based on establishment of a cryptographic tunnel (symmetric cryptography) between network nodes and strong node authentication procedure and Network IP layer security providing bulk security mechanisms on network level between network nodes protection from the external network attacks.

These layers are projected in a way that a vulnerability of the one layer could not compromise the other layers and then the whole system is not vulnerable. User strong authentication procedures based on digital certificates and PKI systems are especially emphasized. We also evaluate and signify differences between software-only, hardware-only and combined software and hardware security systems.

Existing System :

The Internet has revolutionized the ways in which companies do business, since the Internet Protocol (IP) is undeniably efficient, inexpensive and flexible. However, the existing methods used to route IP packets leave them vulnerable to a range of security risks such as spoofing, sniffing and session hijacking and provide no form of non- repudiation for contractual or monetary transactions. Besides securing the internal environment, organizations need to secure communications between remote offices, business partners, customers and traveling and telecommuting employees. Transmitting messages over the Internet or Intranet to these different entities poses an obvious risk, given the lack of protection provided by the existing Internet backbone. Control and management of security and access between these different entities in a co companys business environment is of paramount importance. Without security, both public and private networks are susceptible to unauthorized monitoring and access. Internal attacks might be a result of minimal or nonexistent intranet security. Risks from outside the private network originate from connections to the Internet and extranets. Password-based user access controls alone do not protect data transmitted across a network. The common types of network attacks that are applied to fixed and mobile TCP/IP computer networks are :

Eavesdropping Data Modification Identify Spoofing Password-Based Attacks

Denial-of-Service (DoS) Attack Man-in-the-Middle Attack Compromised-Key Attack Sniffer Attack Application-Layer Attack

Proposed System :

In the proposed system we have a computer network security based on Public Key Infrastructure (PKI) systems. We consider possible vulnerabilities of the TCP/IP computer networks and possible techniques to eliminate them. We signify that only a general and multi layered security infrastructure could cope with possible attacks to the computer network systems. We evaluate security mechanisms on application, transport and network layers of ISO/OSI reference model and give examples of the today most popular security protocols applied in each of the mentioned layers. We recommend secure computer network systems that consist of combined security mechanisms on three different ISO/OSI security based on reference model layers: application layer

strong user authentication, digital signature, confidentiality

protection, digital certificates and hardware tokens, transport layer security based on establishment of a cryptographic tunnel between network nodes and strong node authentication procedure and network IP layer security providing bulk security

mechanisms on network level between network nodes. User strong authentication procedures based on digital certificates and PKI systems are especially emphasized. Here we also evaluate and signify differences between software-only, hardwareonly and combined software and hardware security systems. Therefore, ubiquitous smart cards and hardware security modules are considered. Hardware security modules (HSM) represent very important security aspect of the modern computer networks. Main purposes of the HSM are twofold: increasing the overall system security and accelerating cryptographic functions . In the proposed system we have

eliminated all the overall possibilities of an attack. Without security measures and controls in place, your data might be subjected to an attack. Some attacks are passive in that information is only monitored. Other attacks are active and information is altered with intent to corrupt or destroy the data or the network itself. Your networks and data are vulnerable to any of the following types of attacks if you do not have a security plan in place.

Modules :

Login and User Management Network Management & Tunneling Encryption & Decryption File Management

Requirements
1. 2. 3. 4. 5. 6. 7. 8. Types of securities going to implement. Description about the features of security that you are going to implement. Explain some of the features of 1 level ,2 level and 3 level security Compare them How you are going to implement If so , give some examples with some inputs What are the different changes that are going to happen at each level of security At the time of running please display suitable dialog boxes showing the various stages that are going to happen to the original message . 9. Also please note down what are the vulnerabilities that might affect your security 10. Identify what are the various possible subliminal channels that an intruder can enter .

Potrebbero piacerti anche