{"title":"在数据中验证网络加密","authors":"Priyanka Agarwal, Sloni Mittal, Ankita Tiwari, Ishu Gupta, Ashutosh Kumar Singh, Bharti Sharma","doi":"10.1109/ICCS45141.2019.9065608","DOIUrl":null,"url":null,"abstract":"The instantaneous growth for the world being digital is- \"Expeditious growth of a network system and high-speed internet\". This leads to both ease as well as security threats to the users. Network security issues can broadly be classified into two main categories: System security and Data security. The system security issue protects the system from unwanted attacks by malicious threats. Data security is protecting the leakage or modification of data from the unauthorized party in the network. The main goal and sole purpose of the network security are to achieve Authenticity, Integrity, Availability, and Confidentiality in the wireless network. This paper mainly instigates with all the network security issues and classify various encryption technologies, tools, and keys used in the network for ensuring Confidentiality and Integrity over the network.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Authenticating Cryptography over Network in Data\",\"authors\":\"Priyanka Agarwal, Sloni Mittal, Ankita Tiwari, Ishu Gupta, Ashutosh Kumar Singh, Bharti Sharma\",\"doi\":\"10.1109/ICCS45141.2019.9065608\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The instantaneous growth for the world being digital is- \\\"Expeditious growth of a network system and high-speed internet\\\". This leads to both ease as well as security threats to the users. Network security issues can broadly be classified into two main categories: System security and Data security. The system security issue protects the system from unwanted attacks by malicious threats. Data security is protecting the leakage or modification of data from the unauthorized party in the network. The main goal and sole purpose of the network security are to achieve Authenticity, Integrity, Availability, and Confidentiality in the wireless network. This paper mainly instigates with all the network security issues and classify various encryption technologies, tools, and keys used in the network for ensuring Confidentiality and Integrity over the network.\",\"PeriodicalId\":433980,\"journal\":{\"name\":\"2019 International Conference on Intelligent Computing and Control Systems (ICCS)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Intelligent Computing and Control Systems (ICCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS45141.2019.9065608\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS45141.2019.9065608","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The instantaneous growth for the world being digital is- "Expeditious growth of a network system and high-speed internet". This leads to both ease as well as security threats to the users. Network security issues can broadly be classified into two main categories: System security and Data security. The system security issue protects the system from unwanted attacks by malicious threats. Data security is protecting the leakage or modification of data from the unauthorized party in the network. The main goal and sole purpose of the network security are to achieve Authenticity, Integrity, Availability, and Confidentiality in the wireless network. This paper mainly instigates with all the network security issues and classify various encryption technologies, tools, and keys used in the network for ensuring Confidentiality and Integrity over the network.