Verified Document

Router Security Understanding Network Security Term Paper

There are a number of ways that a company's network can get attacked. One being if you have a single component to provide security, an attacker only has that one thing to get around in order to gaining full control of your system. Also not having secure modems can give access to unwanted attacks. However, these are evolving every single day. The first one being shortened URLs, a Shortened URL nickname can be handy, but pose risks. Since they give no hint of the destination, attackers can exploit them to send you to malicious sites. Then it discusses data harvesting of your profile. This is when an attacker collects enough information to access your sensitive accounts. They do this by the information you share on social networks, such as your high school, hometown, or birthday, which are often "secret" security questions or even passwords. Which also leads into social network imposters, attackers can take control of your friends online persona and exploit that trust. You also have to worry about web snooping. Now that we use our private PC for entertainment, shopping, and socializing, every Internet user leaves a digital trail of preferences; the books you read, movies you rent, different people you interact with, the items you buy and other details can be a gold mine of demographic data for search engines, advertisers, or anyone that might want to snoop around on your computer. There is an attack tool called Scareware. This program has a twist on the standard phishing attack, in that it tricks you into installing rogue antivirus software by "alerting" you that your PC has been infected. There is another type of attack where one might receive a text message to your mobile phone that looks as if it's from your network provider or financial institution. These attacks are called Trojan horse text messages and they can request permission to implement an update that allows an attacker to capture sensitive information such as usernames and passwords. They can also direct you to malicious sites or even unpatched software. Some very knowledgeable programmers can create Rogue Wi-Fi spots that appear to be regular free Wi-Fi but are being used by an attacker...

A really good hacker could get into a weak Wi-Fi network to do this as well. You could also be at risk if you happen to lose any of your personal devices. This includes data backups if you happen to use CDs, DVDs, flash card, things that can be portable.
One step that can be taken is to begin using Ciscos' Security Device Manager Version 1.0. This function handles the internetwork operating system-based security functions for access routers. Security Device Manager is a Web-based device-management tool for Cisco routers that can improve the productivity of network managers, simplify router deployments, and help troubleshoot complex network and VPN connectivity issues. Network and security administrators can use SDM for faster and easier deployment of routers for integrated services such as dynamic routing, WAN access, WLAN, firewall, VPN, SSL VPN, IPS, and QoS. Network Security is and will always be a large issue for administrators. As long as you have a connection to the outside world, an attacker has access to you. In order to be able to sufficiently protect yourself is to identify and evaluate all possible avenues, as well as having a good security policy implemented (Musich, 2003).

In conclusion, network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "wired," an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them at any size company or organization.

References

Bradley, T. (January 24, 2010). How to Stop 11 Hidden Security Threats. Retrieved from http://www.pcworld.com/article/187199/how_to_stop_11_hidden_security_threats.html

Curtin, M. (March 1997). Introduction to Network Security. Retrieved from www.interhack.net/pubs/network-security/

Musich, P. (2003). Cisco Beefs up Security Tools. EWeek, 36.

Sources used in this document:
References

Bradley, T. (January 24, 2010). How to Stop 11 Hidden Security Threats. Retrieved from http://www.pcworld.com/article/187199/how_to_stop_11_hidden_security_threats.html

Curtin, M. (March 1997). Introduction to Network Security. Retrieved from www.interhack.net/pubs/network-security/

Musich, P. (2003). Cisco Beefs up Security Tools. EWeek, 36.
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Plan for ABC Corp
Words: 2595 Length: 9 Document Type: Essay

The paper creates Extended Access Control Lists for ABC Corporation using Port Numbers. Extended Access Control Lists for ABC Corporation using Port Numbers access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20 access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21 access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22 access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25 access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35 access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18 access-list 101

Security Systems and Security
Words: 3042 Length: 10 Document Type: Research Paper

Auditing, Monitoring, Intrusion Prevention, Detection, and Penetration Testing The network vulnerability is a major security weakness that allows an attacker reducing computer information assurance. Vulnerability intersects three elements: a system flaw, the attacker is having access to the flaw, and ability to exploit the flaw. Thus, a security risk is classified as a vulnerability that is tied to a great significant loss. The vulnerability can erode data confidential, system integrity and

Network Management and Systems Administration
Words: 937 Length: 3 Document Type: Case Study

Network Management and System Administration The aim of the paper is to establish the difference between a system administrator and a network administrator. The paper is thus divided into three sections. The first section deals with the basic definition and responsibilities of a system administrator; the second does the same for a network administrator and the third compares their responsibilities to clearly identify the differences between the two. System Administrator The maintenance of

Network Design Network Engineers Together
Words: 995 Length: 3 Document Type: Essay

During the PDIOO procedure one has to define main deliverables and related actions with a direct connection to the additional value and advantage for the customer network. For instance, understanding business objectives, usage features, and network necessitieshelps a person avoid pointlesselevations and network redesigns, thus reducing the time taken to introduce fresh services in the network. Planning Phase During the planning period one can test the significance of the design for future

Security Policy of a Dental
Words: 1254 Length: 3 Document Type: Term Paper

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now