Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
M.phil (CS)
Topics Covered
Types of Computer Networks - LAN WAN MAN and
Area Networks
Virtual Private Network ( VPN )
Ad-Hoc Network
Heterogeneous Network
Next Generation Networking ( NGN )
Information Security
Network Security
Cryptosystem
A computer network is very helpful in a business. Most of the time a business will have
more than one computer set up and it often very beneficial to network all of the
computers in the office. A local area network (LAN) will connect your company’s
computers. This will allow them to share and exchange different types of information. If
you haven’t considered networking your office computers, listen to these reasons.
There are several types of computer networks. A computer network can be very simple,
such as only connecting two computers or a computer and a printer, or it can be very
complex, connecting millions of computers and devices. Here is a list of different
computer network types.
The smallest type of network is a Personal Area Network (PAN). This type of computer
network connects a computer to a number of devices. These devices may include, but are
not limited to, printers, PDAs, and telephones. Usually these are located very close to a
computer. A Local Area Network (LAN) is used to network a small geographical area.
An example of this type of computer network is a home network with two or more
computers or computers that are connected in a workplace. A version of a LAN is a
Wireless Local Area Network (WLAN).
A Campus Area Network (CAN) is ideal for a university but they are also found in
industrial facilities. This type of computer network connects computers in a number of
buildings. This is generally accomplished through bridging and routing. A Metropolitan
Area Network (MAN) consists of any number of interconnected LANs and WANs but it
will not extend certain boundaries, such as those of a town, city, or metropolitan area.
Many of these are operated at public utilities and are used by businesses and individuals
in the area.
A Wide Area Network (WAN) is a step up from a MAN. This type of computer network
can cross metropolitan or even national boundaries. The best known WAN is the Internet.
This computer network uses routers and public communication links to carry data. Many
WANs are run by private companies and restricted, unlike the Internet. Although these
are the MAN types of network that most users come across there are other computer
networks ranging from as small as a Desktop Area Network (DAN) to a very large
Global Area Network (GAN).
A VPN works by using the shared public infrastructure while maintaining privacy
through security procedures and tunneling protocols such as the Layer Two Tunneling
Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and
decrypting it at the receiving end, send the data through a "tunnel" that cannot be
"entered" by data that is not properly encrypted. An additional level of security involves
encrypting not only the data, but also the originating and receiving network addresses.
Ad-Hoc Network
An ad-hoc network is a local area network (LAN) that is built spontaneously as
devices connect. Instead of relying on a base station to coordinate the flow of messages to
each node in the network, the individual network nodes forward packets to and from each
other. In Latin, ad hoc literally means "for this," meaning "for this special purpose" and
also, by extension, improvised or impromptu.
In the Windows operating system, ad-hoc is a communication mode (setting) that allows
computers to directly communicate with each other without a router.
Heterogeneous Network
A heterogeneous network is a computer network that combines one or more different
types of computers, operating systems and/or protocols. A LAN that connects a PC
with an Apple Macintosh computer is heterogeneous. Also, more commonly,
Microsoft Windows networks connecting Microsoft Windows servers and Microsoft
Windows PCs and UNIX-based networks are heterogenous networks since,
frequently, engineers will control software on a UNIX or Linux server, via a
"Camper" editing session on a PC using software which connects a PC to a
UNIX/Linux server. A wireless network which connects using different access
technologies could also be called a heterogenous network since it maintains its
connections while switching to a cellular network.
Information Security
Information security means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification or destruction.
The terms information security, computer security and information assurance are
frequently incorrectly used interchangeably. These fields are interrelated often and share
the common goals of protecting the confidentiality, integrity and availability of
information; however, there are some subtle differences between them.
These differences lie primarily in the approach to the subject, the methodologies used,
and the areas of concentration. Information security is concerned with the confidentiality,
integrity and availability of data regardless of the form the data may take: electronic,
print, or other forms.
Computer security can focus on ensuring the availability and correct operation of a
computer system without concern for the information stored or processed by the
computer.
For the individual, information security has a significant effect on privacy, which is
viewed very differently in different cultures.
The field of information security has grown and evolved significantly in recent years.
There are many ways of gaining entry into the field as a career. It offers many areas for
specialization including: securing network(s) and allied infrastructure, securing
applications and databases, security testing, information systems auditing, business
continuity planning and digital forensics science, to name a few, which are carried out by
Information Security Consultants.
• Network Security
In the field of networking, the specialist area
of network security consists of the provisions
and policies adopted by the network
administrator to prevent and monitor
unauthorized access, misuse, modification, or
denial of the computer network and network-
accessible resources.
Once authenticated, a firewall enforces access policies such as what services are allowed
to be accessed by the network users. Though effective to prevent unauthorized access,
this component may fail to check potentially harmful content such as computer worms or
Trojans being transmitted over the network. Anti-virus software or an intrusion
prevention system (IPS) helps detect and inhibit the action of such malware. An anomaly-
based intrusion detection system may also monitor the network and traffic for unexpected
(i.e. suspicious) content or behavior and other anomalies to protect resources, e.g. from
denial of service attacks or an employee accessing files at strange times. Individual
events occurring on the network may be logged for audit purposes and for later high level
analysis. Communication between two hosts using a network could be encrypted to
maintain privacy.
General meaning
In this meaning, the term cryptosystem is used as shorthand for "cryptographic
system". A cryptographic system is any computer system that involves cryptography.
Such systems include for instance, a system for secure electronic mail which might
include methods for digital signatures, cryptographic hash functions, key management
techniques, and so on. Cryptographic systems are made up of cryptographic primitives,
and are usually rather complex. Because of this, breaking a cryptosystem is not restricted
to breaking the underlying cryptographic algorithms - usually it is far easier to break the
system as a whole, eg, through the not uncommon misconceptions of users in respect to
the cryptosystem.
Typically, a cryptosystem consists of three algorithms: one for key generation, one for
encryption, and one for decryption. The term cipher (sometimes cypher) is often used to
refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the
term "cryptosystem" is most often used when the key generation algorithm is important.
For this reason, the term "cryptosystem" is commonly used to refer to public key
techniques; however both "cipher" and "cryptosystem" are used for symmetric key
techniques.
www.authentify.com/solutions/voice_biometrics.html