Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i33/98921
Year: 2016, Volume: 9, Issue: 33, Pages: 1-8
Original Article
Ashwani Kumar Dubey1*, Ayush Sharma1 and Priyanka Mehta2
1 Department of Electronics and Communication Engineering, Amity School of Engineering, Amity University Uttar Pradesh, Noida – 201313, Uttar Pradesh, India; [email protected]
[email protected]
2 Amity Institute of Information Technology, Amity University, Noida – 201301, Uttar Pradesh, India; [email protected]
*Author for correspondence
Ashwani Kumar Dubey
Department of Electronics and Communication Engineering
Email:[email protected]
This paper presents a critique of the work done in field of network security with a focus on attacks which are further classified into active and passive and how to safeguard information. Active attacks are classified into masquerade, fabrication and modification of message which is further categorized into replay attacks and alterations. Passive attack includes release of message content and traffic analysis. For securing our network, analysis of various network security techniques which include Virtual Private Network (VPN) technology, antivirus, firewalls, intrusion prevention systems and spyware protection is discussed by taking up relevant case studies. Detailed analysis of biometric security is concluded on the basis of following factors such as: biometric accuracy, its verification capabilities and their interaction with users. Security of network as well as end point users can be increased manifolds by implementing biometrics to our present networks. Biometrics acts as an extra shield in safeguarding our confidential information by implementing 2-step verification. Biometrics are classified into active and passive biometric and these systems include fingerprint, iris scanning, face detection and voice analysis.
Keywords: Biometric, Fingerprint, Firewall, Information Security, Iris Scanning, Virtual Private Network
Subscribe now for latest articles and news.