Security

Comparative Analysis of Data Security Techniques in Network Environment

Date Added: Jun 2011
Format: PDF

In the network, data are transformed in form of packets to transfer from one place to another for the communication. To make the communication successful and effective, data should remain protective at sender and receiver end. Various attacks and vulnerable actions are performed by the hackers and attackers to affect the data. In the seven layer network environment, various attacks are fired at different layers. To make the network most fired proof, various network securities are implemented. In this paper, the authors discuss about the OSI layers, vulnerable attacks and security techniques, and a comparative analysis of network security techniques is done against the vulnerable attacks to make the data on network error free and through analysis to find the best security techniques.