0% found this document useful (0 votes)
11 views4 pages

Net Assignment 2

The document discusses network security, defining it as policies to prevent unauthorized access and ensure data integrity in computer networks. It outlines various threats such as viruses, hacker attacks, and identity theft, and categorizes network security into cryptography, digital signatures, communication security, and social issues. Key concepts include message confidentiality, integrity, sender authentication, and the use of protocols like IPsec and firewalls to enhance security.

Uploaded by

mberengakelvin0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

Net Assignment 2

The document discusses network security, defining it as policies to prevent unauthorized access and ensure data integrity in computer networks. It outlines various threats such as viruses, hacker attacks, and identity theft, and categorizes network security into cryptography, digital signatures, communication security, and social issues. Key concepts include message confidentiality, integrity, sender authentication, and the use of protocols like IPsec and firewalls to enhance security.

Uploaded by

mberengakelvin0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

MALAWI COLLEGE OF ACCOUNTANCY

BACHELOR APPLIED ACCOUNTING; AUDITING


& INFORMATION SYSTEMS

TO : MR MPUWA

FROM : JIMMY NKHOMA MLAVIWA

SUBMISSION DATE : 11TH SEPTEMBER 2020

STUDENT NUMBER : ML 0134

PROGRAMME : BACHELOR OFAPPLIED ACCOUNTING;

AUDITING & INFORMATION SYSTEMS

PROGRAMME CODE : BAA-AIS

MODULE : NETWORKING

TITLE : NETWORK SECURITY

MODULE CODE : NET 225

YEAR : TWO
Network security has a lot of definitions. Among all other definitions, can be
defined as policies that are adopted to prevent and monitor unauthorized access,
misuse, modification or denial of a computer network and network accessible
resources. These policies are designed on network as usable, reliable, integrity and
safe on your data and network for both the public and private network.
There are threats to communication network, and this includes;
 Viruses, worms and Trojan horses
 Spyware and adware
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft
 Phishing attacks
Network security has been categorized into four major categories, as follows;
1. Cryptography security
2. Digital signatures and public keys management
3. Communication security, and
4. Social issues security
Cryptography Security
This is secret writing and is about constructing and analyzing protocols that prevent third parties
or the public from reading private messages. It involves the following;
 Message confidentiality: Only an authorized recipient should be able to extract the
contents of the message from its encrypted form.
 Message integrity: The recipient should be able to determine if the message has been
altered.
 Sender authentication : The recipient should be able to verify from the message, the
identity of the sender and the origin or path it traveled so to validate from emitter or
validate the recipient expectations.
 Sender non repudiation: The emitter should not be able to deny sending the message.
Cryptography is based on a principle that all legitimate users of information have the keys
required to access the information. And it includes the following ways;
 Cyphers; To encipher is to convert information into codes that only authorized parties can
read it, hence, it can use substitution or transposition methods.
 Symmetric key cryptography; This method, both sender and receiver share the same key
or easily related in a computable way. Ciphers are implemented as either block or stream
ciphers.
 Asymmetric key cryptography: It uses a pair of different, though related cryptographic
keys to encrypt and decrypt hence uses both public and private networks.

Digital Signatures and Public Keys Management

This is a mathematical scheme for demonstrating the authenticity of a digital


message or documents. Digital signatures are equivalent to traditional handwritten
signatures in many respects, but properly implemented digital signatures are more
difficult to forge than that handwritten type hence, secured reliable data.
Communication Security
Communication security is the discipline of preventing unauthorized interceptors
from accessing telecommunication in an intelligible form, while still delivering
content to the intended recipients. It uses the following protocols:
 IPsec ; Internet Protocol Security (IPsec) is a protocol suite for secure
internet protocol communications by authenticating and encrypting each IP
packet of a communication session.
 Firewalls :This is a network security system that monitors and controls the
incoming and outgoing network traffic based on predetermined security
rules hence it can be a hardware or software.
 E-mail Security: Email encryption by using public key cryptography while
keeping secret a private key to decrypt the message can secure emails from
hackers, viruses, phishing and identity theft.
Social Issues
The internet and security technology is an area where social issues, public policies
and technology meets. These issues on internet are privacy, freedom of speech,
copyrights and patents.

You might also like