Introduction to Network Security

Authors

  • Deshpande AV Department of Electronics & Telecommunication Engineering, Prof. Ram Meghe Institute of Technology & Research, Badnera, Amravati-444701,India

Keywords:

Network Security, TCP/IP, Cryptography, UUCP, Firewall, Denial of Service, UDP

Abstract

Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become “wired”, an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them. Some history of networking is included, as well as an introduction to TCP/IP and internet working. We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a reference, nor is it a document describing how to accomplish specific functionality. It is hoped that the people will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace.

References

. The New Lexicon Webster's Encyclopaedic Dictionary of the English Language, New York: Lexicon.

. R.T. Morris, “A Weakness in the 4.2 BSD Unix TCP/IP Software Computing Science”, Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey, 1985.

. S.M. Bellovin, “Security Problems in the TCP/IP Protocol Suite”, Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989.

. Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear, “Address Allocation for Private Internets”, RFC 1918.

. J.P. Holbrook, J.K. Reynolds, “Site Security Handbook”, RFC 1244.

. M. Curtin, “Snake Oil Warning Signs: Encryption Software to Avoid”, USENET

. Abhinav Gupta, Prabhdeep Singh, “Improving the Performance of Mobile Wireless Sensor Networks Using Modified DBSCAN”, International Journal of Computer Sciences and Engineering (IJCSE), Volume 3, Issue 8, August 2015.

Downloads

Published

2025-11-10

How to Cite

[1]
A. V. Deshpande, “Introduction to Network Security”, Int. J. Comp. Sci. Eng., vol. 3, no. 9, pp. 124–134, Nov. 2025.