Verified Document

Network Security Term Paper

¶ … networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere in the world. This may be due to the fact that a computer can be accessed by anybody who knows how to handle it and also because it can store a lot of information both confidential and general. A computer is connected through a physical network that allows a person or many persons to share any information necessary. (Conceptual Overview of Network Security) Though network security in Information Technology is an issue that has been discussed endlessly, implementation has definitely taken a back seat in this part of the world. There is a lot of discussion on how an unauthorized stranger can access a persons emails and files; on how the management of a company has a need to keep track of employee activities through the monitoring of the network but the fact remains that there is great fear of a virus infection and not every company has done anything regarding network security for the protection of the company. The action, if any, is taken as a reaction to a threat of a virus attack, since viruses are extremely common in these parts of the world. The companies involved keep not even records of such attacks. Hackers have been known to take over persons or a company's bank accounts or even stealing database from its database server that is the sole property of the company. This proves that it is better to be prepared in the event of such an attack. (Network Security - a functional approach)

Body of the Paper

Networks among computers are generally made to share resources such as printers, folders, etc., and within an organization, networks are used for more efficient cooperation between the various departments by the use of e-mail, instant messaging, etc. A local area network can make available folders and other documents to any user on the other side, through a server. In fact, any number of users can avail a single printer; the printer can be shared from one computer on the network and users can print their work without even having to rise from their seats and walking to the computer. (Network Security - a functional approach) The fact is that though they have to get up to collect their printouts, they do not have to copy their work onto a diskette and then carry it to the printer and than get their work done. This type of extra work can easily be avoided in this day. In other words, computer networks make operations easier; communications easier, cut down on expenses and dramatically improve productivity. But all this improvement does not come without a hitch! It entails an increased security risk and the need for definitive measures to be taken to combat this risk. (Network Security - a functional approach)

However, the only problem that may arise is that the information must be accessible to the person for whom it is intended. Anyone who gains access to information from the computer can read and modify it very easily. This is where computer security is needed. Computer security prevents unauthorized persons from gaining illegal access to information that has been stored on the computer while network security protects any one from retrieving information being transmitted through the network. (Conceptual Overview of Network Security)

In the past, network security was considered as a very complicated subject that was handled only by experts in the field. But as more individuals got themselves accustomed to the using of the network, it became essential that they all have a basic knowledge of networking. A network can be defined as a set of interlinking lines that was similar to the net, like a network of roads or an interconnected system or a network of alliances. It is important that to understand the various principles of network security that we have a basic knowledge of computer networks. In the last twenty five years odd, a lot of different kinds of networks and network protocols have been made distinct, out of these the emphasis to be laid upon in this summary is that of two networks, that are...

(Introduction to Network Security)
Any individual to connect to these networks and also they can use these networks to connect to their host computers together without actually connecting to the public network system. These different types of network providers use different methods to provide their network support. The UUCP or the Unix -to Unix Copy was first introduced to connect Unix hosts together. But since then it has also been used to connect various other architectures also like PCs, Macs, Amigas, AppleIIs, VMS hosts, and a lot of other architectures. After UCCP there have also been many other principles too that have been developed, and these entire support batch oriented systems. In this system of networking, all the processes are added on to a queue and are executed one after another at a specified time. (Introduction to Network Security)

The Internet can be considered as the world's largest network of numerous networks. The actual fact about the Internet is that when we actually try to connect to the Internet we are not really accessing the Internet but connecting to a network that is eventually connected to the Internet backbone that is a network of extremely fast network components. The Internet is actually a network of networks and not a network of hosts. A very simple and concise network can be assembled using the same protocols without actually connecting it to anything else. There are a number of networks that are actually connected on a backbone that is a network of all networks. This backbone is then connected to various other networks, out of which one of them is connected to the Internet Service Provider or the ISP that has a backbone that is in turn connected to other networks out of which one of them is the Internet backbone. The TCP/IP or the Transport Control Protocol/Internet Protocol is actually the language of the Internet. In the sense anything that can operate on the TCP/IP can work on the Internet. (Introduction to Network Security)

The actual way that the Network and the Transport layers in the ISO/OSI reference model works is that IP has a lot of important features that actually makes it a very tough and accommodating protocol. While talking about the security of IP or the lack of it, we realize that it is actually possible to attack the IP in numerous ways. Most frequently this is because of the fact that the IP does not really execute a tough mechanism for authentication. In such a network if a packet claims to have originated from a particular address there would be no proof to prove it otherwise or to make sure that what is being put forth is the truth. Though this may not counted as a back lag but at the same time it is a weakness in the model that indicates that it is essential that we bring about a high layer of authentication in the ISO/OSI model. In most application these days where such an authentication is required like in the cryptographic application this is performed in the application layer. (Introduction to Network Security) computer virus is one security risk that attacks a computer easily. A virus can disturb a network and even corrupt it beyond repair. It is amazing that people actually put in a lot of time and effort into attacking or rather, hacking, as it is called. Such people even create software or hardware for such illegal purposes. This fact emphasizes the importance of computer security that can control such activities to a certain extent. The various methods employed by these hackers are outlined as follows: some of the important networks are Ethernet 1, Wireless, and CATV. Some networks use links to broadcast by nature wherein a lot of other people can access what is being transmitted; if the link is actually point to point, the invader can still attack. This is where encryption comes in. This is a method whereby the information sent from person A to person B. could remain confidential; it is called confidentiality. (Conceptual Overview of Network Security)

But the crux of the problem is, how can person A be sure that he is, in fact, communicating with person B. A person, C, could be accessing information from A or B. pretending to be one or the other. He could communicate with A using the IP address of B. this is called IP spoofing. This means that person A and person B. have to ensure the other's authenticity before starting their communication.…

Sources used in this document:
References

Bolding, Darren. "Network Security, Filters and Firewalls." Retrieved from ACM Cross Roads Student Magazine, 17 January, 2001 http://www.acm.org/crossroads/xrds2-1/security.html. Accessed on 03/09/2004

Curtin, Matt. "Introduction to Network Security March" 1997. Retrieved at http://www.interhack.net/pubs/network-securityAccessed on 03/09/2004

Home Internet security: Protection against network security attacks" Retrieved at http://www.buildwebsite4u.com/articles/home-internet-security.shtml. Accessed on 03/09/2004

Magalhaes, Ricky M. "Network Security recommendations that will enhance your windows" network" Oct 22, 2002. Retrieved at http://www.windowsecurity.com/articles/Net_Security_Recommendations.html. Accessed on 03/09/2004
Morrissey, Peter. "The Interactive Network Design Manual How To Secure Your Network." Network Design Manual. Retrieved at http://www.networkcomputing.com/netdesign/security1.html. Accessed on 03/09/2004
Network Security and Web Services Deployment: Ideas for Securing your services," 7 November, 2001 Retrieved at http://www.webservicesarchitect.com/content/articles/hankison02.asp. Accessed on 03/09/2004
Network Security Myths - Think your network is hack proof?" Retrieved at http://www.cramsession.brainbuzz.com/articles/files/network-security-myths-9.asp. Accessed on 03/09/2004
Olubosi, Femi. "Network Security - a functional approach." 15th January 2003 Retrieved at http://www.olubosi.com/articles/05072003.htm. Accessed on 03/09/2004
Shimonski, Robert J. "Minimizing Security Incidents" Mar 11, 2003 Retrieved at http://www.windowsecurity.com/articles/Minimizing_Security_Incidents.html. Accessed on 03/09/2004
Sivaram, S. "Conceptual Overview of Network Security." Wipro. Retrieved at http://www.wipro.com/dwlphp/form.php3?pdf=Conceptual_Overview_of_Network_Security.pdf&url=http://www.wipro.com/insights/networksecurity.htm. Accessed on 03/09/2004 key steps to real network security" Retrieved from Cisco Systems. http://www.bcentral.com/articles/networking/152.asp. Accessed on 03/09/2004
Wasserman, Margaret. "IPv6 and Network Security" Retrieved at http://developer.windriver.com/resources/articles/06-2003-00.html. Accessed on 03/09/2004
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Security
Words: 1437 Length: 4 Document Type: Case Study

Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

Network Security
Words: 3307 Length: 10 Document Type: Research Paper

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Network Security
Words: 3486 Length: 8 Document Type: Term Paper

Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include

Network Security the Practice of
Words: 1551 Length: 5 Document Type: Term Paper

Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are

Network Security: Opening to the
Words: 575 Length: 2 Document Type: Term Paper

The main lesson learned from viewing the tutorials and programs is the ease and flexibility of configuring each specific session to the unique needs of an audience. Feasibly these technologies could be used for creating highly unique and tailored learning experiences for students who were learning through online universities only for example. The ability to tailor all forms of digital content, from music and video to drawing boards and

Network Security As an Issues for Business Data Communication
Words: 1631 Length: 5 Document Type: Term Paper

Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now