­NETWORK playing with children in short we use technology

­NETWORK SECURITY IN DIGITALIZATION: ATTACKS AND DEFENCE  Name: M [email protected]: 26/12/2017 Abstract:                                        As we know the world completely change.

Nowa days we use technology to accomplish our task no matter how small or big theyare. We send our picture video and other documents and file etc. Before sendingall Theas things Theas are convert into digital signal and then further processapply on them.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

After converting our information will send by using network. weface different problem while doing work with networks in both ends sender andreceiver  we have security risk always wetry to safe our information from hacker and third party. Digitalization playingimportant role in digital technology. As we know network security become veryimportant in modern days. Network Administrator have to record all the trafficon the network and also ensure that the whole network is safe from unauthorizedperson. In this paper I will give review on different attacks and also thedefending methods which is use in world to secure the network security.

 Introduction:                                                  Before I go in detaildiscussion of the topic first I want to tell about the digitalization.Digitalization is process of converting information into signal normally we sayconverting into bits, analog signal etc. Now a days we use technology in ourdaily life not only in office school hospital we use technology in home duringmaking food playing with children in short we use technology every time. Mainpoint is are we secure or not..? Is our data is secure or not..

? Is our networksecure or not..? Is our message send to whom we want to send..?  Theas are some common question which comes inevery person who use internet. Network security are very impotent in everyfield like military, education, government, business etc. To secure network isvery difficult work because every organization based on their security systemif organization has not secure network then it’s very easy for hacker to comeand stole the important information like information of bank accounts or someother documents etc. Network security is not done in one step it has differentstep and each step related to other.

In network security we have to secure allthe network like our switches socket router because data passed through thesesocket switches and router so we have to secure so that our information safefrom unauthorized person. As I discuses that digitalization is just a processof transferring data in form of signal etc.So wediscuss in this paper about the attack and their types and also defending systemlike firewall etc., this paper is related to discussion about attacks and theirdefenses. DIFFERENT TYPES OF SECURITYATTACKS  A.      Passive Attacks                            Passive attack is anattack in which hacker just come and monitor our data or listen our informationin passive attack attacker does not change our data he just monitor and listenit so passive attack is very difficult to detect by user because attacker doesnot change anything he just monitor so we cannot detect attacker easily.

Passiveattack has two types.·        Interception·        Traffic analysis   B.      Active Attacks                                             Active attack is an attack in which attacker can change data between twouser attackers does not monitor data only some time change data and send touser and sometime attacker pretends to first user that he is second user andstart conversation to first user. Active attackhas three types·        Interruption·        Modification·        Fabrication   C.

      DOS Attack              Dos attack become major threat for allthe networks of the world. Dos attack easily launched by any person who haslittle knowledge of network security dos attack does not require planning andmuch time for launching if you have some knowledge about network security thesimply go on internet and download a file and launched on network. Dos attackuse different user connection to a network know as zombie it target thebandwidth of network.­     Types of network security                               First of all we should know that our systemgot hacked by someone due to many reason we cannot say that our system gothacked or our data has stolen by someone because  designer does not design properly oursecurity structure our a man who configure our system does not configure itproperly. We find solution but we cannot blame anyone suddenly. Sometime byimproving our system security we make some mistake and our system becomes weakdue many reason like poor design poor configuration poor implementation andpoor management. By secure the system network we require our configuration asfollow  A: configurationManagement                        Whenever you configure a networkafter the configure and completing the setup of network we should altered thelogins, address and ID as soon as possible.

Because anyone can use remittancelogin to access the account and put all the network on risk.  B. Firewalls                          It is the mostgenerally sold and accessible framework security in the market.

There are threedivergent sorts of firewalls be needy after filtering at the IP level, Packetlevel, TCP level or application level. Firewalls help in dismissing unapprovedarrange development through an unsecured framework through a private framework.They can alert the customer when an untrusted application need to access to theweb.. Firewall does not control any sort of inward development where anextensive segment of the ambushes arrive. Numerous associations are underimperfection doubts that by basically using a firewall its safe, yet reallythey are not under safe condition, firewall can be viably be avoided. The bestthing while in the meantime orchestrating firewall is to revoke anything whichisn’t allowed.

 C.Encryption  Utilizingencryption section one can redirect designer tuning in to the information inlight of the path that without the mystery key it will be trash to him. Distinctiveencryption part, for example, HTTPS or SHTTP amidst the informationtransmission between the customer and server. Utilizing VPN, which willscramble every single one of the information experiencing the structure; itwill in like way redesign the affirmation of the client.

Encryptionadditionally has traps as all the blended mail and site pages are permittedthrough firewall they can in like way understand malware in them. Scramblinginformation comprehend arranging power from the CPU.  D. Guardagainst DOS Attacks  To dismissDoS strike various developments have been progressed, for instance,interference acknowledgment structures (IDSs), updated switches, firewalls etcetera. These things which are used between the servers and the web. They supervisormoving toward relationship notwithstanding dynamic affiliations and whichnormally figure out how to maintain the framework. They have movement surveyget the opportunity to control and redundancies are consolidated with them.IDSs have been marked into both the drawing nearer and dynamic affiliations.

 We have moresort of system security and their name are specify beneath  •           Vulnerability Testing  •           ENCRYPTING THE WORLD WIDE WEB (WWW)  •           Secure Sockets Layer  •           Secure HTTP (SHTTP)  •           VPN (virtual private system) •           E-Mail Security  Conclusion  As web hastransformed into an impressive bit of our regular daily existence, so expect offramework security has moreover extended exponentially from the before decades.As much as the customers are interfacing with the web it enthralls a lot ofguilty parties pulls in. By and by a day’s as demonstrated by the each andeverything is related with web from essential looking for sustenance to theprotection secretly, so accordingly there is tremendous need of security to theframework. Trade more than Billions of dollars is going on reliably completedthe web, at any cost this must be secured. Undoubtedly, even a minute inmystery feebleness in a framework can have destroying sway, if associations recordsare transmitted, it can lay the customers data, for instance, their keepingcash unobtrusive components, MasterCard, plastic information in danger, itlooks like a constant sit back and watch diversion between orchestrate securitymaster and software engineers, so per the essential of web clues at nodiminishing it’s simply going to pick up altogether harder.