Sei sulla pagina 1di 7

Weekly Report Submission

M.phil (CS)

Roll No:25 Name:Komal .A.Vora


Weakly Report :

Topics Covered
 Types of Computer Networks - LAN WAN MAN and
Area Networks
Virtual Private Network ( VPN )
Ad-Hoc Network
Heterogeneous Network
Next Generation Networking ( NGN )
Information Security
 Network Security
Cryptosystem

Voice Biometric Authentication.


Types of Computer Networks - LAN WAN MAN and
Area Networks
A computer network is the practice of linking two or more computing devices
together for the purpose of sharing data. Networks are built with a mix of computer
hardware and computer software. This interconnected system will share services and
interact through a communications link.

A computer network is very helpful in a business. Most of the time a business will have
more than one computer set up and it often very beneficial to network all of the
computers in the office. A local area network (LAN) will connect your company’s
computers. This will allow them to share and exchange different types of information. If
you haven’t considered networking your office computers, listen to these reasons.

There are several types of computer networks. A computer network can be very simple,
such as only connecting two computers or a computer and a printer, or it can be very
complex, connecting millions of computers and devices. Here is a list of different
computer network types.
The smallest type of network is a Personal Area Network (PAN). This type of computer
network connects a computer to a number of devices. These devices may include, but are
not limited to, printers, PDAs, and telephones. Usually these are located very close to a
computer. A Local Area Network (LAN) is used to network a small geographical area.
An example of this type of computer network is a home network with two or more
computers or computers that are connected in a workplace. A version of a LAN is a
Wireless Local Area Network (WLAN).

A Campus Area Network (CAN) is ideal for a university but they are also found in
industrial facilities. This type of computer network connects computers in a number of
buildings. This is generally accomplished through bridging and routing. A Metropolitan
Area Network (MAN) consists of any number of interconnected LANs and WANs but it
will not extend certain boundaries, such as those of a town, city, or metropolitan area.
Many of these are operated at public utilities and are used by businesses and individuals
in the area.

A Wide Area Network (WAN) is a step up from a MAN. This type of computer network
can cross metropolitan or even national boundaries. The best known WAN is the Internet.
This computer network uses routers and public communication links to carry data. Many
WANs are run by private companies and restricted, unlike the Internet. Although these
are the MAN types of network that most users come across there are other computer
networks ranging from as small as a Desktop Area Network (DAN) to a very large
Global Area Network (GAN).

Virtual Private Network ( VPN )


A virtual private network (VPN) is a network that uses a public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users with
secure access to their organization's network. A virtual private network can be contrasted
with an expensive system of owned or leased lines that can only be used by one
organization. The goal of a VPN is to provide the organization with the same capabilities,
but at a much lower cost.

A VPN works by using the shared public infrastructure while maintaining privacy
through security procedures and tunneling protocols such as the Layer Two Tunneling
Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and
decrypting it at the receiving end, send the data through a "tunnel" that cannot be
"entered" by data that is not properly encrypted. An additional level of security involves
encrypting not only the data, but also the originating and receiving network addresses.
Ad-Hoc Network
An ad-hoc network is a local area network (LAN) that is built spontaneously as
devices connect. Instead of relying on a base station to coordinate the flow of messages to
each node in the network, the individual network nodes forward packets to and from each
other. In Latin, ad hoc literally means "for this," meaning "for this special purpose" and
also, by extension, improvised or impromptu.

In the Windows operating system, ad-hoc is a communication mode (setting) that allows
computers to directly communicate with each other without a router.

Heterogeneous Network
A heterogeneous network is a computer network that combines one or more different
types of computers, operating systems and/or protocols. A LAN that connects a PC
with an Apple Macintosh computer is heterogeneous. Also, more commonly,
Microsoft Windows networks connecting Microsoft Windows servers and Microsoft
Windows PCs and UNIX-based networks are heterogenous networks since,
frequently, engineers will control software on a UNIX or Linux server, via a
"Camper" editing session on a PC using software which connects a PC to a
UNIX/Linux server. A wireless network which connects using different access
technologies could also be called a heterogenous network since it maintains its
connections while switching to a cellular network.

Next Generation Networking ( NGN )


Next generation networking (NGN) is a broad term to describe key architectural
evolutions in telecommunication core and access networks that will be deployed over
the next 5–10 years.The general idea behind NGN is that one network transports all
information and services (voice, data, and all sorts of media such as video) by
encapsulating these into packets, like it is on the Internet. NGNs are commonly built
around the Internet Protocol, and therefore the term "all-IP" is also sometimes used
to describe the transformation toward NGN.

Information Security
Information security means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification or destruction.

The terms information security, computer security and information assurance are
frequently incorrectly used interchangeably. These fields are interrelated often and share
the common goals of protecting the confidentiality, integrity and availability of
information; however, there are some subtle differences between them.
These differences lie primarily in the approach to the subject, the methodologies used,
and the areas of concentration. Information security is concerned with the confidentiality,
integrity and availability of data regardless of the form the data may take: electronic,
print, or other forms.

Computer security can focus on ensuring the availability and correct operation of a
computer system without concern for the information stored or processed by the
computer.

Governments, military, corporations, financial institutions, hospitals, and private


businesses amass a great deal of confidential information about their employees,
customers, products, research, and financial status. Most of this information is now
collected, processed and stored on electronic computers and transmitted across networks
to other computers.

Should confidential information about a business' customers or finances or new product


line fall into the hands of a competitor, such a breach of security could lead to lost
business, law suits or even bankruptcy of the business. Protecting confidential
information is a business requirement, and in many cases also an ethical and legal
requirement.

For the individual, information security has a significant effect on privacy, which is
viewed very differently in different cultures.

The field of information security has grown and evolved significantly in recent years.
There are many ways of gaining entry into the field as a career. It offers many areas for
specialization including: securing network(s) and allied infrastructure, securing
applications and databases, security testing, information systems auditing, business
continuity planning and digital forensics science, to name a few, which are carried out by
Information Security Consultants.

• Network Security
In the field of networking, the specialist area
of network security consists of the provisions
and policies adopted by the network
administrator to prevent and monitor
unauthorized access, misuse, modification, or
denial of the computer network and network-
accessible resources.

Network security concepts


Network security starts from authenticating the user, commonly with a username and
a password. Since this requires just one thing besides the user name, i.e. the password
which is something you 'know', this is sometimes termed one factor authentication. With
two factor authentication something you 'have' is also used (e.g. a security token or
'dongle', an ATM card, or your mobile phone), or with three factor authentication
something you 'are' is also used (e.g. a fingerprint or retinal scan).

Once authenticated, a firewall enforces access policies such as what services are allowed
to be accessed by the network users. Though effective to prevent unauthorized access,
this component may fail to check potentially harmful content such as computer worms or
Trojans being transmitted over the network. Anti-virus software or an intrusion
prevention system (IPS) helps detect and inhibit the action of such malware. An anomaly-
based intrusion detection system may also monitor the network and traffic for unexpected
(i.e. suspicious) content or behavior and other anomalies to protect resources, e.g. from
denial of service attacks or an employee accessing files at strange times. Individual
events occurring on the network may be logged for audit purposes and for later high level
analysis. Communication between two hosts using a network could be encrypted to
maintain privacy.

Honeypots, essentially decoy network-accessible resources, could be deployed in a


network as surveillance and early-warning tools as the honeypot will not normally be
accessed. Techniques used by the attackers that attempt to compromise these decoy
resources are studied during and after an attack to keep an eye on new exploitation
techniques. Such analysis could be used to further tighten security of the actual network
being protected by the honeypot.
Cryptosystem

General meaning
In this meaning, the term cryptosystem is used as shorthand for "cryptographic
system". A cryptographic system is any computer system that involves cryptography.
Such systems include for instance, a system for secure electronic mail which might
include methods for digital signatures, cryptographic hash functions, key management
techniques, and so on. Cryptographic systems are made up of cryptographic primitives,
and are usually rather complex. Because of this, breaking a cryptosystem is not restricted
to breaking the underlying cryptographic algorithms - usually it is far easier to break the
system as a whole, eg, through the not uncommon misconceptions of users in respect to
the cryptosystem.

Meaning in the context of cryptography


In this meaning, a cryptosystem refers to a suite of algorithms needed to implement
a particular form of encryption and decryption.

Typically, a cryptosystem consists of three algorithms: one for key generation, one for
encryption, and one for decryption. The term cipher (sometimes cypher) is often used to
refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the
term "cryptosystem" is most often used when the key generation algorithm is important.
For this reason, the term "cryptosystem" is commonly used to refer to public key
techniques; however both "cipher" and "cryptosystem" are used for symmetric key
techniques.

Voice Biometric Authentication


Voice has emerged as a viable authentication method, because just like a
fingerprint or iris, voice is unique to the individual. What sets voice apart as a preferred
authentication method for online transactions is its ability to partner with the telephone to
deliver extremely accurate remote authentication.

A voice biometric is a numerical model of the sound, pattern and rhythm of an


individual’s voice. A voice biometric or "voice print," is as unique to an individual as a
finger or palm print. Any Authentify application that employs a voice channel during the
Authentify session is able to add voice biometric authentication to the process for even
higher levels of authentication and security.
References
 http://computer.howstuffworks.com/vpn.htm
 http://searchmobilecomputing.techtarget.com/definition/ad-hoc-network
 www.interhack.net/pubs/network-security
 en.wikipedia.org/wiki/Network_security
 www.cryptosystem.org/
 www.answers.com/topic/cryptosystem
 www.sans.org/reading_room/.../exploration-voice-biometrics_1436

 www.authentify.com/solutions/voice_biometrics.html

Potrebbero piacerti anche