Anda di halaman 1dari 18

CONTENT 1.ABSTRACT 2.PREFACTORY REMARKS 3.ASPECTS OF PALLADIUM 4.WORKING OF PALLIDIUM 5.PROTECTION USING PALLADIUM 6.

SHORTCOMINGS AND PITFALLS OF PALLADIUM 7.FIREWALLS 8.CONCLUSION

1.ABSTRACT
SECURTIYIN THIS CONTEMPORARY SENARIOUS HAS BECOME A MORE SENSIBLE ISSUE EITHER IT MAY BE IN THE REAL WORLD OR IN THE CYBER WORLD

2.PREFACTORY REMARKS
Network Security is indeed the crux of discussion amongst all computer enthusiasts and it has also become a major concern in boardrooms across the globe. Most computer criminals thrive not on knowledge but instead blossom due to ignorance on the part of system administrators

3.ASPECT OF PALLADIUM
Palladium comprises two key components : HARDWARE & SOFTWARE

Hardware component : Engineered for ensuring the protected execution of application and processes, the protected operating environment provides the following basic mechanisms.

TRUSTED SPACE -Stored for the R.A.M. SEALED STORAGE -Secured and Encrypted part of the hard disk. SECURE INPUT&OUTPUT -Secured path of I/O. ATTESTATION -External request of system.

SOFTWARE COMPONENTS NEXUS -A technology formerly refer to as the trusted operating root (TOR). TRUSTED AGENTS -A trusted agent is a program.

4.WORKING OF PALLADIUM
Palladium is a new hardware & software architecture. This architecture will include a new security computing chip and design changes to the CPU. The pc-specific secret coding within palladium makes stolen files useless on other machines as they are physically & cryptographically locked within the hardware of the machine.

5.PROTECTION USING PALLADIUM


Palladium prevents identity theft and unauthorized access to personal data on the users device while on the internet and on other networks. Transaction and processes are verifiable and reliable through the attestable hardware & software architecture and they cannot be imitated.

6.SHORTCOMINGS AND PIT FALLS OF PALLADIUM


PROBLEMS:

1. Software and applications have to be rewritten to synchronize with palladium or new applications must be written. 2. Changes are to be made to the existing computer hardware to support palladium. 3. Long term technology.

ADVANTAGES
As the process of question paper download is highly secure, the chances of leakage are literally nil. An advanced system of internet communication can be adopted for a broader reach, thus eliminating the role of C.D. Requesting-specific and time bound there cannot be a case of question miss-match.

FIREWALLS
PROXY SERVER (ex-for firewalls)

A proxy server basically acts as a shield by protecting your IP address form getting into malicious hands. It acts as a very own personal secretary and a buffer between thy and thy host.

OUR SYS.

PROXY SERVER

REMOTE SYSTEM

WORKING OF PROXY SERVER

IP section

Encryption and authentication controls can be implemented at several layers in computing infrastructure. Every system use the SSL (Secure Socket Layer) Military using this network based on link-level encryption. IP protocol is import one of network.

8.CONCULSION
Using some technique to secure our network connection.
BIOMERTIC SYSTEMS. QUANTUM-CRYPTOGRAPHY. -SECURE Global village in near future.