The dependence of humans on computers is increasing in today's era of technology. All transactions, as well as digital data transformations, are done with the help of the network, so third parties or intruders can attack the network to access data and use it in the wrong way. Organizations and individuals use the network for their work. Due to the easy availability of the internet, there is always a risk of information falling into the wrong hands. This paper presents a detailed study of networking attacks and security algorithms, as well as an analysis of various viable network attack observation tools to detect attacks. The algorithms discussed include Symmetric Key Algorithm, Asymmetric Key Algorithm, and their respective types.