• About us
  • Disclaimer
  • Privacy Policy
Friday, May 20, 2022
  • Login
  • Register
W-SE (Web - SEcurity)
  • Tech today
  • Security
    • Vulnerabilities
    • Malware
    • Android
    • Top list
  • Cyber Attacks
  • How To?
    • All
    • gaming
    • Smart phone
    • smart tv
    • software
    Ideal Internet Speed for Online Gaming

    Ideal Internet Speed for Online Gaming

    Cybersecurity Tips to Protect Your Mac

    Nighthawk Mr5100 Bridge Mode

    What are Data Centers, and Why Are They Important

    What are Data Centers, and Why Are They Important?

    Blanket

    The Main Reasons Why Every Home Needs at Least One Faux Fur Throw

    How to Find a Powerful Laptop

    How to Find a Powerful Laptop?

    how to connect second monitor to laptop windows 10

    Is 300 Mbps Good For Gaming

    Trending Tags

    • Security
    • Web Security
    • cyber-security
    • Enhanced Security
    • Data Security
    • Security Bugs
    • Network Security
    • Cybersecurity
    • Security Updates
    • Mobile Security
    • Microsoft Security Updates
    • Data security and compliance
  • Contact
  • About us
    • Disclaimer
  • Write For Us
No Result
View All Result
  • Tech today
  • Security
    • Vulnerabilities
    • Malware
    • Android
    • Top list
  • Cyber Attacks
  • How To?
    • All
    • gaming
    • Smart phone
    • smart tv
    • software
    Ideal Internet Speed for Online Gaming

    Ideal Internet Speed for Online Gaming

    Cybersecurity Tips to Protect Your Mac

    Nighthawk Mr5100 Bridge Mode

    What are Data Centers, and Why Are They Important

    What are Data Centers, and Why Are They Important?

    Blanket

    The Main Reasons Why Every Home Needs at Least One Faux Fur Throw

    How to Find a Powerful Laptop

    How to Find a Powerful Laptop?

    how to connect second monitor to laptop windows 10

    Is 300 Mbps Good For Gaming

    Trending Tags

    • Security
    • Web Security
    • cyber-security
    • Enhanced Security
    • Data Security
    • Security Bugs
    • Network Security
    • Cybersecurity
    • Security Updates
    • Mobile Security
    • Microsoft Security Updates
    • Data security and compliance
  • Contact
  • About us
    • Disclaimer
  • Write For Us
No Result
View All Result
W-SE (Web - SEcurity)
No Result
View All Result
Home Cyber Security

Computer Networks & Security

Computer Network Security

Melina Richardson by Melina Richardson
in Cyber Security, Error
A A

During the early days of the internet, its use was restricted to the military and universities for research and development. Later, when all of the networks came together to become the internet, the data used to go over the public transportation network.. People from all walks of life may provide information that is potentially highly sensitive, such as their bank credentials, username and passwords, personal documents, online shopping information, and private documents.

All security threats are deliberate, in the sense that they only occur when they are deliberately activated. These are the kind of security dangers that can be found in the world today:

  • Interruption

When the availability of resources is threatened, this is referred to as an interruption in security. For example, a user may be unable to access its web-server, or the web-server may have been hijacked by an attacker.

Get into the Cyber Security Career now!
  • Privacy-Breach

A user’s privacy can be violated in this situation. Someone who is not allowed to access or intercept data sent or received by the originally authenticated user has gained access to or intercepted the data.

  • Integrity

Any alteration or modification to the original context of communication falls under this kind of threat. The attacker intercepts and gets the data transmitted by the sender, and the attacker then either modifies or generates false data, which the attacker then sends to the intended recipient. The data is received by the receiver under the assumption that it has been sent by the original Sender.

  • Authenticity

This type of hazard occurs when an attacker or a security offender impersonates a legitimate person and gains access to resources or communicates with other legitimate users.

There is no technology available now that can guarantee 100 percent security. However, some procedures may be taken to protect data when it is traveling over an unsecured network or the internet. Cryptography is the technology that is most extensively employed.

Cryptography
In cryptography, plaintext data is encrypted using a technique that makes it difficult to read and interpret the data. There are various cryptographic methods available today, which are detailed in greater detail below:

  • Key to the Kingdom
  • Key that is available to the public
  • Digest of Messages

Secret Key Encryption

Both the sender and the receiver own the same secret key. This secret key is used to encrypt the data at the sender’s end, and it is never revealed. After the data has been encrypted, it is transmitted to the recipient over the public network. Because the recipient is aware of and possesses the Secret Key, decryption of the encrypted data packets is straightforward.

Learn Cyber Security Career Guide here!

The Data Encryption Standard (DES) is an example of secret key encryption (DES). Secret Key encryption necessitates the creation of a separate key for each host on the network, which makes it difficult to maintain the key pool.

Public Key Encryption

In this encryption method, each user has his or her own Secret Key, which is not stored in the common database. The secret key is never made available to the general public. Along with a secret key, each user has a unique yet public key of their own. The public key is always publicly available to the public and is used by Senders to encrypt the data they are sending. When the user receives the encrypted data, he or she may quickly decrypt it by using the Secret Key that was provided to him or her.

Rivest-Shamir-Adleman encryption is an example of public-key encryption (RSA).

Message Digest

It is not necessary to send actual data while using this method; instead, a hash value is calculated and delivered. The second end-user then computes its hash value and compares it to the one that was just received in the previous step. If both hash values match, the message is accepted; otherwise, the message is refused.

The MD5 hashing algorithm is an example of a Message Digest. It is most commonly used in authentication when the user’s password is compared to the one that has been stored on the server.

Tags: Computer Network SecurityComputer Networks & Security
ShareTweetShare
Previous Post

Network Security Scanners

Next Post

AWS Network Security

Melina Richardson

Melina Richardson

Melina Richardson is a Cyber Security Enthusiast, Security Blogger, Technical Editor, Certified Ethical Hacker, Author at Cybers Guards & w-se. Previously, he worked as a security news reporter.

Next Post
Top 4 Low-Code development Security Concerns

AWS Network Security

Please login to join discussion
  • Trending
  • Comments
  • Latest
router

192.168.0.1 – 192.168.1.1 Router Login Password

April 6, 2020
inurl technology

Latest Carding Dorks List for Sql Injection 2022

March 16, 2022
connect monitor to laptop two screens

How To Connect A Monitor To A Laptop And Use Both Screens?

February 10, 2021
how to connect two monitors to my laptop

How Do I Connect 2 Monitors To My Lenovo Laptop?

January 22, 2021
Windows Flaw

If Older Battleye software is used, Windows 10 1903 Blocked

0
Mac Os

New unpatched macOS bypass gatekeeper published online

0
Siemens Medical Products

Wormable Windows Flaw Affected Siemens Medical Products

0
Cloud Computing

5 Tips of the Personal Data Protection in the Cloud

0
Quick Fix Laptop Keys

Airport Extreme 7.8.1

May 19, 2022
Blanket

Spectrum Wifi 6 Router no WPS Button

May 19, 2022

How to Set up an Airport Express?

May 19, 2022
Ideal Internet Speed for Online Gaming

Linksys Re6300 Reset

May 19, 2022
ADVERTISEMENT

Quick Links

Learnopedia
Tech Write For US
Technology Write For US
Casino Write For Us
Mr.Perfect Reviews
Cyber Security Career

Recent News

Quick Fix Laptop Keys

Airport Extreme 7.8.1

May 19, 2022
Blanket

Spectrum Wifi 6 Router no WPS Button

May 19, 2022

How to Set up an Airport Express?

May 19, 2022
Ideal Internet Speed for Online Gaming

Linksys Re6300 Reset

May 19, 2022
W-SE (Web – SEcurity)

W-SE regularly updates cyber attacks, hacking and events that provide IT security professionals with information throughout the world. Also offering news in W-SE. We spent two years living and sharing guidance and insights with IT experts, detailed analyzes and news.

We also train people with product reviews in different form of content.

Browse by Category

  • Android
  • Camera
  • computer
  • Cyber Attacks
  • Cyber Security
  • Cybercrime
  • Encryption
  • Error
  • Featured
  • Fraud & Identity
  • gaming
  • How To?
  • laptop
  • Login
  • Malware
  • Microsoft
  • Mobile
  • photography
  • Privacy
  • Reviews
  • Security
  • Security Degree
  • Smart phone
  • smart tv
  • Social
  • software
  • Tech
  • Tech today
  • Top list
  • Uncategorized
  • Virus & Threats
  • Vulnerabilities
  • Website
  • What is?

Recent News

Quick Fix Laptop Keys

Airport Extreme 7.8.1

May 19, 2022
Blanket

Spectrum Wifi 6 Router no WPS Button

May 19, 2022
  • About us
  • Contact
  • Disclaimer
  • Home
  • Privacy Policy
  • Resources
  • Support Forum
  • Tech Blog
  • Technology Write For Us
  • W-SE (Web Security)

© 2020 w-se.com - Powered by Fix Hacked Website, Cyber Special , SSL Authority Reviews Powered by Mr.Perfect Reviews.

No Result
View All Result
  • Tech today
  • Security
    • Vulnerabilities
    • Malware
    • Android
    • Top list
  • Cyber Attacks
  • How To?
  • Contact
  • About us
    • Disclaimer
  • Write For Us

© 2020 w-se.com - Powered by Fix Hacked Website, Cyber Special , SSL Authority Reviews Powered by Mr.Perfect Reviews.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In