doi:10.3850/978-981-08-7301-1_0331


Design and Implementation of Secure Network System using Windows Environment


Nitin and Yogendra Kumar Jain

Department of Computer Science & Engineering, Samrat Ashok Technological Institute, Vidisha, M.P., India.

ABSTRACT

Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. The basic reasons we care about information systems security are that some of our information needs to be protected against unauthorized disclosure for legal and competitive reasons; all of the information we store and refer to must be protected against accidental or deliberate modification and must be available in a timely fashion. Consumers have expressed widespread concerns over privacy and the safety of their data; companies with strong security can leverage their investment to increase the pool of willing buyers and to increase their market share. We no longer have to look at security purely as loss avoidance: in today’s marketplace good security becomes a competitive advantage that can contribute directly to revenue figures and the bottom line. Networks today run mission-critical business services that need protection from both external and internal threats. In this thesis proposed a secure design and implementation of a network and system using Windows environment. Reviews of latest product with an application to an enterprise with worldwide branches are given. And also establish and maintain the authenticity (correct attribution) of documents. All the mechanisms thoroughly discussed in this project proved to work well together and provide the needed security in any professional setting.

Keywords: Network design, LAN, WAN, Security, Encryption, VPN, IPSec.



     Back to TOC

FULL TEXT(PDF)