Consequences on Network Security and Cryptography
Keywords:
security, threats, cryptography, encryption, decryptionAbstract
Network securities have become a gambol in our whole world. The need of network security is accelerate at the same speed of better internet usage. The first and prime thing of every network design, plan, build and operating a network is the importance of a strong security. Information security is the great basic issue in an assurance safe transmission of data. Network security and cryptography is a concept to protect network and data transmission over wireless network. More users connect to the internet is attracts a lot of cyber attacks. Data securities are the main feature of safe data transmission above changeable network. User chooses is assign an id and password and figure print or network authentication information that allows them access to information and program within their authority. The internet structure itself allowed for more security threats to occur.
References
[1]A Review Paper On Network Security And Cryptography , Dr.Sandeep Tayal1,Dr.Nipin Gupta2,Dr.Pankaj Gupta3,Deepak Goyal4,Monika Goyal5.ISSN :0973-6107.
[2] Network Security With Cryptography ,Prof.Kukund R.Joshi,Renuka Avinash Karkade ISSN :2320-088x.
[3] Network Security In Digitalization:Attacks And Defence, Shruthi Prabakar ISSN: 2320-7345.
[4] Network Threats,Attacks And Security Measures:A Review,Ruzaina Khan,Mohammad Hasan, ISSN :0976-5697.
[5] Security Issues Of Firewall,Dr.A R.Pon Periyasamy,ISSN:2277-128.
[6] The Study Of Network Security With Its Penetrating Attacks And Possible Security Mechanisms, Monali S.Gaigole,Prof.M.A.Kalyankar,ISSN:2320-088x.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
