Download complete project materials on Design And Implementation Of Network Security from chapter one to five
ABSTRACT
PASS 2024 UTME WITHOUT STRESS:- 👉 DOWNLOAD and PRACTICE with 2023 UTME CBT APP 📱👈
CLICK to DOWNLOAD NOW.:- 👉 PASS Your POST UTME by Downloading Your School's Post UTME Past Questions and Answers 📱👈
Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier.
This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of visual basic programming language and other programming language.
For the first few decades of their existence, computer\ networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem.
The requirements of information security within an organization have undergone two major changes in the last several decades before the widespread use of data processing equipment the security of information felt to be valuable to an organization was provided primarily by physical and administrative means with the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident.
This is especially the case for a shared system such as time sharing system and the need is even more acute for systems that can be accessed for a public telephone or a data network the generic name for the collection of tools to protect data and to thwart hackers is ―computer security‖. Network Security is a broad topic and covers a multitude of sins.
In its simplest form, it is concerned with making sure that nosy people cannot read, or worse yet, secretly modify messages intended for other recipients. It is concerned with people trying to access remote services that they are not authorized to use.
Most security problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm someone. Network security problems can be divided roughly into four closely intertwined areas: secrecy, authentication, non repudiation, and integrity control. Secrecy, also called confidentiality, has to do with keeping information out of the hands of unauthorized users.
This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. Non repudiation deals with signatures.
CHAPTER ONE
INTRODUCTION
Several recent proposals have argued for giving third parties and end-users control over routing in the network infrastructure. Some examples of such routing architectures include TRIAD [6], i3 [30], NIRA [39], Data Router [33], and Network Pointers [34].
While exposing control over routing to third-parties departs from conventional network architecture, these proposals have shown that such control significantly increases the flexibility and extensibility of these networks.
Using such control, hosts can achieve many functions that are difficult to achieve in the Internet today. Examples of such functions include mobility, multicast, content routing, and service composition. Another somewhat surprising application is that such control can be used by hosts to protect them
selves from packet-level denial-of-service (DOS) attacks [18], since, at the extreme, these hosts can remove the forwarding state that malicious hosts use to forward packets to the hosts. While each of these specific functions can be achieved using a specific mechanism—for example, mobile IP allows host mobility— we believe that these forwarding infrastructures (FIs) provide architectural simplicity and uniformity in providing several functions that makes them worth exploring.
Forwarding infrastructures typically provide user control by either allowing source-routing (such as [6], [30], [39]) or allowing users to insert forwarding state in the infrastructure (such as [30], [33], [34]).
NETWORK SECURITY
(NS) is an important aspect of any system. NETWORK SECURITY is the act of ensuring that an authenticated user accesses only what they are authorized to and no more. The bad news is that security is rarely at the top of people’s lists, although mention terms such as data confidentiality, sensitivity, and ownership and they quickly become interested.
The good news is that there is a wide range of techniques that you can apply to help secure access to your system. The bad news is that as Mitnick and Simon (2002) point out ―…the human factor is the weakest link. Security is too often merely an illusion, an illusion sometimes made even worse when gullibility, naivette, or ignorance come into play.‖
The go on to say that ―security is not a technology problem – it’s a people and management problem.‖ Having said that, my experience is that the ―technology factor‖ and the ―people factor‖ go hand in hand; you need to address both issues to succeed.
STATEMENT OF THE PROBLEM
Owing to:
Fraudulent act of some customer/workers
Accessing the organizational data/information unauthorized
Sensitive nature of bank data/information
Valuable or costly items in bank
PURPOSE OF STUDY
The main purpose of this project is to design a NETWORK SECURITY that will assist UBA in the area of ensuring effective security measures.
AIMS AND OBJECTIVES
This project will have the following aims and objectives:
SEE >> HOW TO DOWNLOAD THE COMPLETE PROJECT (CHAPTER 1-5) NOWÂ Â
>GUARANTTEE|:| Score 280 Above in 2024 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE 📱👈WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894