This website uses cookies to ensure you have the best experience. Learn more

A Report On Network Security Based On The Text: Ahuja, V. (1996). Network & Internet Security. Massachusetts: Academic Press Inc.

1343 words - 5 pages

A secure network is critical for the survival and success of many businesses. The rapid evolution of client/server networks, the phenomenal increase in the number of networks attached to the Internet, the widespread use of web browsers, and the growing commerce on the internet each require that communication networks are secure. Security concerns for private networks as well as for the Internet range from exposures to computer viruses to break-ins by an intruder on the Internet.The purpose of this book was to present the concepts in security and describe approaches to securing the networks. It introduced the risks to networks, followed by a review of basic security concepts such as passwords and encryption. For each concept, the book also provided an overview of the existing and emerging technologies. In particular, it focused on various security aspects of attaching to and communication over the Internet.This book serves the growing need to understand and enhance the security of networks. The audience for this book is the computing professional who has the need or desire to understand the risks to networks and the approaches to addressing them.As networks grow in size, so do their risks. Network growth has vastly exceeded the corresponding improvements to ensure network security. Info processing entered the business world in the 1950s. However, the third-generation computers, such as the IBM System/360, became the turning point in our transformation to the current age of information technology. The first signs of networking appeared in what was then called "time-shared systems." Some of the early operating systems that also supported time sharing were IBM's System/360 Model 65 and IBM and Honeywell's GECOS. By the end of the 1960s, keyboard terminals and peripheral equipment had taken hold in numerous data processing installations. Next, the users on different time-shared systems wanted to communicate with each other. The time was ripe for the birth of networking.During the same time, research had started in the area of resource sharing, under the auspices of the then known ARPA (Advanced Research Projects Agency, Department of Defense) network. ARPA network started in 1968 with four nodes. The objective of the project was to achieve resource sharing, but it also yielded some of the groundbreaking technologies such as packet switching, packet routing, and flow control. During the 1970s several networking architectures were developed to incorporate the same concept. The primary goal for these architectures was to define a common set of protocols that allow useful data interchange between communicating devices. During the 1970s, it became obvious that there was a need for high-speed local interconnection and data exchange between several devices. The term "local area network" or LAN was coined in the mid-1970s. A LAN can be viewed as a collection of interconnected devices that can interchange data among themselves. The communication medium for the...

Find Another Essay On A report on Network Security based on the text: Ahuja, V. (1996). Network & Internet Security. Massachusetts: Academic Press Inc.

network security Essay

667 words - 3 pages segment limits the area vulnerable to attacks. Implementing VLANs and VLAN trunking helps to segment the network effectively. VLANs are logically separate within the same physical installation and define security domains inside one network. However, VLAN based security depends on proper switch configuration and vendor documentations (Kiravuo, Sarela, & Manner, 2013). This means that default switch settings should be changed to prevent VLAN hopping

Network Security Essay

2198 words - 9 pages disclosures from the internet burn more and more people and companies. These security techniques and others being developed on the horizon will help ensure throughout the digital age, secure, confidential data remains secure. The digital society will demand it. As the consequences of lax network security grow graver and graver, more and more sophisticated methods will evolve. In a culture which demands instant access to all types of

Network Security

977 words - 4 pages A secured network is something that not only businesses but also regular day to day people with personal computers must have. Unless you want a computer that will start to run slow and/or is infected with many different types of viruses which will ultimately lead to the crash of your system then it is a good idea you invest in network security. "The term virus refers to malicious software that requires help from computer users to spread to other

Network Security

3522 words - 14 pages client side software that protects the patient’s data. We will look at some of the software that hospitals may employ and the applications they provide. The following is a comparison of our research and our decision of what would be the optimum choice for the hospitals server side software needs. Black BerryOne of the more widely known hand held devices is the Black Berry. In this we knew that it’s a great way to access email, text-based web

Network Security

2913 words - 12 pages Network Security in the New Millenium My family is installing DSL and wireless networking, which will expose us to substantially more security problems than in the past. Wireless networking is likely to appear soon at the UCLA Mathematics Department as well. My goal is, therefore, to assess what the threats are and how they might be mitigated. It is generally believed that a determined attacker with plenty of time and large but achievable

NETWORK SECURITY ISSUES

9689 words - 39 pages dependent on an agent-based model of computing, with significant implications for Internet security. Agents are executable software objects with executions that are not tied to any specific host or computing resource or to any geographical or logical network location. Agents perform computation and communication defined by a user, but the execution platforms are typically outside the user's administrative control (and outside the administrative

What Is Network Security

631 words - 3 pages What is network security? It relates to any activity done that applies some kind of network protection. Specifically, these activities protect the ability to use and rely on, integrity, and safety of your network and data. It protects against threats such as spyware, malware, identity theft, denial of service, and viruses. It also prevents unauthorized people from being a disturbance or doing damage to a network system. Network security is used

Wireless Network Security

3559 words - 14 pages authentication in Internet Protocol security (IPsec). It is a simple ?challenge-response? scheme based on whether a client has knowledge of a shared secret. In this scheme, a random challenge is generated by the access point and sent to the wireless client. The client, using a cryptographic key (WEP key) that is shared with the AP, encrypts the challenge (or ?nonce,? as it is called in security vernacular) and returns the result to the AP. The

Overview of Network Security

1050 words - 4 pages maximize protection. It is good to know who all is on your network and internet; because if someone were to log on to your internet from a distance, they could plant viruses and other things into your files on the network. Quite a bit of problems occur in network when file sharing takes place in a work place to copy or manage files. Most of the time when this happens, no one sets the security setting up themselves, and so that automatically sets the

All about Network Security

873 words - 4 pages Network security is as important as securing your own home. There are networks all around us and large or small businesses all rely on their computer network to keep running smooth. Network security is not as easy an issue as it sounds. There are many technicalities involved especially when your network is the backbone of your business. Increment in the number of networks brings with it new and lethal security threats. All the important

Network Security Monitoring Tools

788 words - 3 pages Host-Based (HIDPS). HIDPS observes only a single host (in many cases a vital device such as a database server), which gives them the benefits of seeing unencrypted traffic and having direct input to the machine they are on. Wireless systems have many unique vulnerabilities and Wireless IDPS will not be discussed in this report. 2.2 NIDPS Goals Some vendors have begun to merge the Network-Based and Network Behavior Analysis types together

Similar Essays

Network Security Essay

1286 words - 5 pages points, voice-over-internet-protocol phones and security cameras are allowing many businesses options, along with the opportunity to run phone and even electric lines. (10 Problems 36) Network security is a problem for many reasons. Government intrusions are one of the many network security problems, hackers are also one of the causes of network security problems in the U.S as well as low encryption. “Every time you send an e-mail or a text

Network Security Essay

2852 words - 11 pages the system. This is an attack on authentication . an example of this is when the insertion of spurious messages in a network or the addition of record file. 2.4 Methods of securing business information Most of today's network needs to meet all possible security measures in terms of securing the business information. The protection against the business information is depends on how much security issues concerned and these can be distributed

Network Security Essay 1567 Words

1567 words - 6 pages through the Internet. The most popular forms of security rely on encryption which is a process of encoding information that only the person (or computer) with the key can decode it. 4. Where would we be without network security? The Internet is a gigantic place full of viruses, worms, hackers and sniffers; all wanted to defeat and take your network. Without network security it would be like a riot that's unstoppable. Everyone taking what they

Network Security Essay 1735 Words

1735 words - 7 pages available; one of them is packet filter, which examines each packet entering or leaving the network and accepts or rejects it based on user defined rules. Application gateway, apply security mechanisms to specific applications, such as FTP and Telnet servers. Another type of firewall is Circuit-level gateway which applies security mechanisms when a TCP or UDP connection is established. And last there is the proxy server, which intercepts all messages