The network security is a level of assurance that all machines on the network are working optimally and the users of those machines have only the rights they were granted.
These may include:
prevent unauthorized persons to act on the system maliciously
to prevent users from executing unintended harm to the system capable of
secure data by providing breakdowns
ensure non-interruption of service
There are generally two types of uncertainty:
the active state of insecurity, that is to say non-knowledge by the user functionality of the system, some of which may be harmful (e.g. non-disabling unnecessary network services to the user )
the passive state of insecurity, that is to say when the administrator (or user) of a system does not know the security features available to it
The computer network security is a key issue to promote the development of trade in all areas. One word "security" covers very different aspects, technical, organizational and legal. Latitude users against security problems are often irrational, which does not help to simplify the discussion. The safety of paying by credit card over the Internet is part of controversial topics.
From a technical perspective, safety covers both access to information on workstations, servers and network data transport. In this short paper, we focus on the problems of information security in trade through public or private networks. Internet, the network of networks, is a tool that allows all computers regardless of their type to communicate with each other. Technology (TCP / IP) has simplified the creation of networks, thus reducing the cost of telecommunications. However, the security features are not addressed by this protocol. (Simmonds, 2004)
Securing data is secure:
The mutual authentication of correspondents to be sure of his interlocutor
The integrity of transmitted data to be sure they have not been changed accidentally or intentionally.
Confidentiality to prevent data from being read by systems or unauthorized
Non-repudiation to prevent a challenge by the transmitter sending data
One way to ensure data security is to physically protect the access to the equipment. It is possible in a room or building. It is impossible when the network is physically extended. For a very long time, researchers have worked on these topics. In all countries, the military has developed techniques to ensure confidentiality. Gradually, these techniques have become necessary for many economic activities and their use has spread, fostered by the diffusion of high performance computing at low prices.
Security and privacy of the information
Adequate mechanisms for the information of an organization or company is safe; require the user to apply protection for normal use. This is achieved with the guarantees of confidentiality ensures that information is accessible, protecting the integrity and completeness of the information and processing methods. It also ensures the availability guarantees authorized users' access to information and resources. (Dave, 2005)
Threats
Viruses, worms, Trojans, backdoors: programs usually hidden within another program, e-mail, file, etc. Run automatically, making copies of themselves into other programs to infect. Depending on how they attack and spread are named. SOLUTION: antivirus
Intruders: They use hacking tools to access a computer from another computer, confidential information, launch attacks, etc ...