GAJANAN D. KURUNDKAR1*, SANTOSH D. KHAMITKAR2*, NITIN A. NAIK3*
1Department of Computer Science S.G.B. College, Purna
2Director, School of Computational Sciences S.R.T.M.University, Nanded
3Department of Computer Science and IT, Yeshwant College, Nanded
* Corresponding Author : nitinnaik@live.com
Received : - Accepted : - Published : 01-11-2011
Volume : 1 Issue : 1 Pages : 1 - 5
Int J Cryptography Secur 1.1 (2011):1-5
Conflict of Interest : None declared
Cryptography is the science of writing in secret code. In data and telecommunications, cryptography is necessary when communicating over any entrusted medium, which includes just about any network, particularly the Internet. Cryptography, then, not only protects data from theft or alteration, but it can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public key (or asymmetric) cryptography, and hash functions, in all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into cipher text, which will in turn (usually) be decrypted into usable plaintext. Before we talk about network security, we need to understand in general terms what security is. Security is a continuous process of protecting an object from attack. Due to heavy use of network based systems now days it is necessary to maintain our computer secured from external threats such as hackers or crackers. Computer attacks are now routine. Security involves the security of all its resources such as its physical and logical. Security means preventing unauthorized access, use, alteration, and theft or physical damage to these resources. This paper identifies security issues for Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse.
[1] What is Web 2.0? Ideas, technologies and implications for
education by Paul Anderson,http://www.jisc.ac.uk/media/
documents/techwatch/tsw0701b.pdf
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[2] http://en.wikipedia.org/wiki/Web_2.0.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[3] Anderson, Paul. 2007. What is Web2.0? Ideas, technologies and
implications for education. JISC reports.
http://www.jisc.ac.uk/media/documents/techwatch/
tsw0701b.pdf
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[4] Graeme, Daniel (2006b). Web 2.0 and Education. At Wwwtools
for Education.
http://magazines.fasfind.com/wwwtools/magazines.cfm?rid=275
6
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[5] Web 2.0 and New Learning Paradigms By: Antonio Bartolomé
( University of Barcelona )
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[6] Business Models for the Next Generation of Software. O'Reilly
Network
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus