Welcome to YLOAN.COM
yloan.com » Internet » Securing Data over Computer Networks
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Securing Data over Computer Networks

Securing Data over Computer Networks

Securing Data over Computer Networks

When designing a network, data security must be included in the design plan because protecting data while it is transmitted is very important especially if is is sensitive data. additionally, authenticating users when trying to open protexted pages is also very important to avoid stoling data. finally receiver must assure that the data is received as transmitted. the previous points are explained below separately.

When transmitting data across a network, many attackers exist that can intercept the data and read it. the data are transmitted in the form of binary signals. any one having a detector can read this pulses on the line. the data transmitted can be very sensitive especially in milattery applications.

The solution to the above problem is to scrample the data before transmitting them according to some rules. on the receiver, these rules must be known in order to extract the original data from the scrambled data. this process of scrampling is called encryption. encrypting data involves replacing each block of data with different block or shifting a block to the place of another block.

Another issue for network security is user authentication. when some one opens a protected page on a site or download a protected file, he must provide the server first with the username and password. this is done to know that the person who atempting to open the page or download the file is a known person who is allowed to do so. this process is called authentication. generally, authentication involves matching the user credentials with a set of credentials stored on the server.

The last issue concerned with data security over a computer network is integrity. integrity involves assuring that data is received as transmitted without being altered. this is because that an attacker can intercept the data, modify it and re-transmit it. this will decept the receiver because he receives the wrong data. to avoid this attack, a signature mmust be inserted along with the data before transmission. the signature is function of the bits forming the data. at the receiver, this signature is calculated and if it is the same, the data is received as transmitted.
Starting an Internet Business: Challenges What Points To Consider When Choosing Child Care Network For Your Children? Why Should one Download Star Trek Episodes? Insider Secrets to Making Money with Internet Marketing Remove Internet Security Suite (fake) - The best way to Uninstall/remove Internet Security Suite (fake) Rapidly Best way to Uninstall/ Remove Win 7 Internet Security 2011 Virus 5 Little Known Ways to Get More Internet Web Traffic Comcast Internet Specials News Release Trading With Dustin Pass-Download The Oracle Trader Software FREE! Product Launch Formula 30 For Internet Success Product Launch Formula 30 For Real Internet Success Jeff Walkers Product Launch Formula 30 To Create An Internet Business Cheap Pay As You Go Phones Enjoy Any Network Of Your Choice With These Payg Phones
print
www.yloan.com guest:  register | login | search IP(216.73.216.170) California / Anaheim Processed in 0.017442 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 11 , 2312, 49,
Securing Data over Computer Networks Anaheim