Bibilo

Submitted by: Submitted by

Views: 258

Words: 585

Pages: 3

Category: Music and Cinema

Date Submitted: 08/10/2011 02:18 PM

Report This Essay

Abstract:

In realworld network is used by each and every one for different needs but the data we are sending and receiving is not a secured one because of the vulnerability in network connections The main threat to data transfer is attackers they are the one who steals data when we are transferring it,.it is not at all possible to provide web security to everyone when they are surfing on the network in this journal we are going to look each and every users who are using the network and then to track what is their visited websites during the meantime ofsurfing, some methods we can find the websurfers history but when its come under security criteria it is an bigtask to work. Inorder to provide an secure network we should have to follow some policy measures.

Now we can find persons who are all web surfing and their sessions vice versa. Web surfers visited websites can be detected by using some strategies’ like cookies, tracking devices, IP sec , Authentication protocols, Server and Proxy Logs, Eavesdropping, Redirectors, Spoofing , Scripting ,TCP mapping. By using the above policies we can find the web surfers used websites, IP address and so on. It will also help us to mask data of them. And then we are having large number of policies to restrict hackers from stealing data (or) information and to look at the various approaches to attain minimal risk in web security.

I. INTRODUCTION

Whenever we are loading an webpage, it is subjected to numerous attacks from the attacker . In this we are going to learn how to upload and use an secured website. Now we will see howthe data are transmitted from sender to receiver by using various devices. Take an simple example consider two system in an network namely A,B If A wants to send an information to B , it will sets connection first that is connection establishment and then both will acknowledge each other for data transfer after that A will send data to B by means of connecting devices such as router, hub...

More like this