Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Network Security

Network Security

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Introduction to Broadband Communication Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

We use computer networks for everything from banking and investing online to communicating with others through email or chat programs. Due to the value of information on these networks, it has become a lucrative target for unauthorized users or criminals. To protect both the network and the information on it, network managers must consider taking some security measures. Security measures help you to stop unauthorized users from accessing any part of your computer network. As more and more people become 'wired' or 'connected' and the world becomes more tightly interconnected, network security becomes more important. Network security is the process of preventing and detecting unauthorized use of your network. We begin this chapter by looking at the network security requirements. We then discuss the types and sources of threats there are against computer networks. We go on to consider access control methods, cryptography, firewalls, intrusion detection, and security standards.

Chapter Contents:

  • 17.1 Security Requirements
  • 17.2 Network Threats
  • 17.3 Access Control Methods
  • 17.4 Cryptography
  • 17.4.1 Substitution Cipher
  • 17.4.2 Transportation Ciphers
  • 17.4.3 RSA
  • 17.5 Firewalls
  • 17.6 Intrusion Detection
  • 17.7 Security Standards
  • 17.7.1 IPSec
  • 17.7.2 DES
  • Summary
  • Review Questions
  • Problems

Inspec keywords: cryptography; computer networks; firewalls

Other keywords: access control methods; cryptography; intrusion detection; security standards; network managers; banking; investing; firewalls; network security; computer networks; security measures

Subjects: Data security

Preview this chapter:
Zoom in
Zoomout

Network Security, Page 1 of 2

| /docserver/preview/fulltext/books/te/sbte501e/SBTE501E_ch17-1.gif /docserver/preview/fulltext/books/te/sbte501e/SBTE501E_ch17-2.gif

Related content

content/books/10.1049/sbte501e_ch17
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address