Verified Document

Network Security Term Paper

Network Security History and Evolution of Network Security:

The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include the various operations of the access to a program, the deletion of any particular program and the modification to any program. (Network Security: The Concise Tech encyclopedia)

It was during the 1960's that the vacuum-based computers that were being manufactured in the U.S.A. began to become popular, and it was in the year 1967 that the idea of developing 'encrypted passwords' in order to maintain security for the user of the computer was mooted, and, accordingly, the first encrypted password that would bar access to unauthorized persons trying to access programs on the computer was created. There was further progression during the next decade when the year 1970 saw the development of the idea of a computer user being able to log onto a remote computer. Telnet initially introduced the concept. BBN, under Ray Tomlinson of ARPANET was able to introduce the '@' sign for the users of e-mail programs on the Internet in the same year. ARPANET also introduced the very first International Internet connections from the University College of London, England to Norway.

In the year 1974, Vint Cerf and Bob Khan introduced the first 'Transmission Control Program' in their publication, 'A Protocol for Packet Network Interconnection', and by the year 1977, the easy to use computer began to be mass produced and the first company to have achieved this is the 'Apple', followed by the introduction of the 'Personal Computer' by IBM in the year 1981. When in 1982 the TCP/IP a set of protocols for the Internet user was introduced by DCA and ARPA, the Internet began to be defined as a set of connected networks, and this idea became standardized. The 'domain name' system came into being in the year 1984 and this in itself led to the growing popularity of the Internet, and by the next year the term 'hacker' had come into being. The hacker is a person who is able to push his way through the security system of the computer in order to illegally gain access to whatever he needs from such a program.

Challenge response protocols and password tokens were soon introduced, and the 'Symbiolics.com' became one of the first names to be registered as a 'domain'. The concept of 'virus' came into being for the first time in 1986, and one of the first viruses to be discovered was the 'Brain' that had supposedly been developed in Pakistan. Hackers began to do brisk illegal business by the year 1988, and one of the famous hackers of the time is the 'Cuckoos Egg' hacker, and the 'worm' virus that was responsible for infecting about 6,000 internet hosts single-handedly was also discovered at this time. The CERT or the 'Computer Emergency Response Team' was founded in the same year and this team was supposed to respond to emergencies related to infections caused by viruses like the 'worm' and the 'brain'. The fact was that even in the year 1989 the security for the Internet was not at all sufficient enough to promise safety, as demonstrated by the example of a 14-year-old child being able to crack open the computer coding of the U.S. Satellite Positioning System.

It was only during the year 1990 that the issue of Internet security was given serious enough attention, and this led to the creation of modern software that promised to provide adequate Internet security for all its users. In 1991 the 'www' formula was created in order to establish dial up connections to the Internet, by which time the number of computer viruses that had been officially discovered was 1000. The year 1993 saw the creation of the concept of 'firewalls' to fight intruders of Internet security, and in order to provide better security for the more than 100,000 hosts who provided Internet services to the more than millions of users world wide. Internet security became even more important by the year 1994 when the idea of 'shopping' on the Internet began to gain in popularity, as did banking and also advertising for several products. In 1995, the first 'Internet Wiretap' was introduced officially, and this helped the Secret Service and also the Drug Enforcement...

Hackers were now being able to penetrate even the best kept and the most confidential records, like for example, the records of thousands of patients of the University of Washington Medical Center. The 'Code Red Worm' and also the 'Sircam' were discovered to have caused unlimited damage to thousands of servers and e-mail accounts at this time, and in the year 2002, there was a DDoS or 'distributed denial of service attack' wherein 13 out of 18 root servers were attacked and destroyed, and the SQL Slammer Worm was responsible for causing a massive attack of DDoS in about ten mere minutes and causing damages to five of thirteen root servers and also affecting bank ATMs and even air traffic control systems. The Sobig F virus, the Blasterworm and many other viruses also managed to damage a lot of sites and domains and this resulted in the introduction of the 'wildcard' service that was actually a site finder, to the various dotcoms. (History of Internet Security)
Motivation for the Development of Network Security:

IT industry is seeking for remedies to security problems which would enable to reduce the influence to their functioning of businesses. Hence an all-inclusive model for security solutions is essential for any firm which seeks to find a solution to the dangers involved in security concerns and for minimizing the expenses of business. (Brenton, 1998) Even though the idea of survival is foremost in the running of any sort of business establishment, the question of how to survive is more important, since all of the business's data is prone to a breach of security at any time, both external as well as internal. The results of such breaches can be extremely damaging to the enterprise in terms of losses or changes in important data, and a complete disruption of services. For example, even a high school student will be bale to penetrate all of the company's records and cause such a breach that it will lose important data that will make the company in - operational for quite some time. The breach may even occur in the company's web pages where an infiltrator can corrupt all its information, or even turn over the entire web page to a competitor, or add obscene and unwanted content or pictures into the web page, which the company will not even be aware of. However, there exists in the world of business a conflict between the objectives behind security and the operational requirements of the company. All organizations will produce information that is critical to the running of the company, and this information can be termed as 'high secret' or 'secret' or 'sensitive', and all such information will have to be protected under a blanket of security. This then is the motivation for a company to formulate and develop good security plans so that there is no breach in security. (Information Security Program Development)

The Importance of Network Security:

Despite all the facts about the various ways and means of breaching network security being used by professional all over the world, certain businesses are yet to come to terms of increasing the security for their computers and related networks. Today, companies are no longer the fortresses that could withstand any attack on their security network; they rather need more fortification against the newer methods being created by hackers and other breaches of the security of a network. It is therefore a basic requirement for all companies to have a written copy of all its formal security plans as well as of its various security policies, keeping in mind the fact that the management of the company must be able to accept this cost as part of the company's essential expenditure. (Head in the Sand- Importance of Network Security)

Network security would enable to break the hazards of the original perfect state of one's computer network. It also enables to threaten the monetary integrity of one's firm. Hence safeguarding one's network from the dangers occurring both inside as well as outside should be accorded great significance.…

Sources used in this document:
References

"Advanced Encryption Standard" Retrieved From

http://www.nwfusion.com/details/597.html Accessed on 2 November, 2004

"Authentication and Authorization" Retrieved From

http://www.acm.uiuc.edu/workshops/security/auth.html Accessed on 31 October, 2004
http://kingkong.me.berkeley.edu/~kenneth/courses/sims250/des.ppt
"DES (Data Encryption Standard)." Network World fusion. Retrieved From: http://www.nwfusion.com/details/596.html Accessed on 31 October, 2004
http://www.flicks.com/tutorial/authentication / Accessed on 31 October, 2004
Gabrielson, Bruce C. (September, 1994) "Information Security Program Development. SAIC Center for Information Security Technology." Columbia, Maryland. Retrieved From http://www.blackmagic.com/ses/bruceg/progmgt.html Accessed on 31 October, 2004
http://techrepublic.com.com/5100-6263-1029582.html Accessed on 31 October, 2004
http://protectingthenet.com/history / Accessed on 31 October, 2004
http://www.iec.org/pubs/print/ntwk_security.html Accessed on 31 October, 2004
http://www.tech-encyclopedia.com/network-security-3.htm Accessed on 31 October, 2004
Patrick, John. (10 November 2003) "The Ultimate Internet." Network World. Retrieved From http://www.nwfusion.com/ee2/2003/1110patrick.html Accessed on 31 October, 2004
http://www.wordiq.com/definition/Personal_identification_number Accessed on 31 October, 2004
http://wp.netscape.com/security/techbriefs/ssl.html Accessed on 31 October, 2004
http://www.findarticles.com/p/articles/mi_m0BKU/is_2001_May/ai_75995992 Accessed on 31 October, 2004
http://www.infobrary.com/computersinternet/dataencryption/00001.html Accessed on 31 October, 2004
http://www.wordiq.com/definition/Token_%28Windows_NT_architecture%29 Accessed on 31 October, 2004
http://www.howstuffworks.com/firewall.htm Accessed on 31 October, 2004
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Security
Words: 1437 Length: 4 Document Type: Case Study

Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

Network Security
Words: 3307 Length: 10 Document Type: Research Paper

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Network Security the Practice of
Words: 1551 Length: 5 Document Type: Term Paper

Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are

Network Security: Opening to the
Words: 575 Length: 2 Document Type: Term Paper

The main lesson learned from viewing the tutorials and programs is the ease and flexibility of configuring each specific session to the unique needs of an audience. Feasibly these technologies could be used for creating highly unique and tailored learning experiences for students who were learning through online universities only for example. The ability to tailor all forms of digital content, from music and video to drawing boards and

Network Security and Security
Words: 1504 Length: 5 Document Type: Research Paper

Network Security Systems for Accounting Firm Vulnerabilities Assessment In the contemporary IT environment, the implementation of the IT tools has become an effective strategy that organizations employ to achieve competitive market advantages. In other words, the IT tools have become an effective strategy that organizations can employ to be ahead of competitors, and be first in the market. One of the crucial features of the information systems is the network connectivity that

Network Security As an Issues for Business Data Communication
Words: 1631 Length: 5 Document Type: Term Paper

Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now