This website uses cookies to ensure you have the best experience. Learn more

Network Security Essay

2913 words - 12 pages

Network Security in the New Millenium
My family is installing DSL and wireless networking, which will expose us to substantially more security problems than in the past. Wireless networking is likely to appear soon at the UCLA Mathematics Department as well. My goal is, therefore, to assess what the threats are and how they might be mitigated. It is generally believed that a determined attacker with plenty of time and large but achievable resources is likely to successfully perpetrate any exploit he pleases, just as a determined burglar or embezzler is likely to be able to steal any of your resources. Nonetheless, most people who are careful about physical security do not get burgled, and I ...view middle of the document...

In the academic setting occasional undergraduates concoct elaborate schemes to steal examinations or to tamper with grades. They may also retaliate against unfavorable outcomes by embarrassing the department or specific professors in it.
In random threats, on the other hand, the only relation between the hacker and the victim is that the victim is vulnerable. Nowadays we can expect blanket attacks in which an automated script attacks every address in a range, and does the exploit on all vulnerable machines. Dupes are generally selected at random. Random threats can become targeted, if the exploit is to scan for resources that the hacker considers valuable; the hacker would then return in a targeted attack to collect the resource.
Another dimension distinguishing threats is the purpose of the attack. Vandalism is common, in which the victim's disc is wiped. Targeted vandalism more often takes the form of putting embarrassing material in a public place such as the victim's web pages. A particularly insidious form of targeted vandalism is to introduce subtle corruption, for example by adding a nickel here and a dime there to financial records, that is likely not to be noticed until an audit (internal, the victim hopes). Recent months have seen targeted denial of service attacks, in which vast numbers of dupes are caused to bombard the victim with traffic which is legitimate as to form.
Another purpose variant is a virus attack, in which the purpose of the virus is to reproduce. Except possibly for the initial infection, viruses appear randomly. Generally the virus has some kind of payload, which is more or less subtle vandalism.
The next variant on this dimension is stealing or falsifying data. Sometimes the data itself is valuable, such as an examination before it is administered, or the data may simply give the hacker access to the real object of value.
Finally the hacker may be interested in impersonating the victim. For example a professor (impersonated by a student hacker) might notify the members of his class that an exam had been postponed. In this kind of attack the message is accepted as authoritative by the recipient, even though the sender did not actually authorize it. Another serious threat is for the hacker to impersonate the victim at a financial institution.
Stealing and impersonation pretty much have to be targeted attacks, unless there is a piece of software, such as a home banking interface, that is vulnerable and that is common enough that a blanket attack will turn up numerous instances before the hole is plugged.
In the family DSL scenario, targeted attacks are unlikely, and the major threat will be random and blanket attacks. On the other hand, at any one time there may be one or two students who are motivated and technically able to mount a targeted attack on the department, given a vulnerability; and (unsuccessful) random attacks are seen daily.
Types of Exploits
It's a fact of life that desktop computers, and particularly...

Find Another Essay On Network Security

Network Security Essay

2198 words - 9 pages Network Security You can think of network security as an insurance policy in a dangerous new world. In the good old days of centralized processing, is all you had to do was simply lock the computer room door and restrict entrance access. Those days are long gone in light of decentralized processing, the internet and vast communi-cation networks. Personal data and transaction security through networks is of paramount concern when

Network security Essay

2852 words - 11 pages the system. This is an attack on authentication . an example of this is when the insertion of spurious messages in a network or the addition of record file. 2.4 Methods of securing business information Most of today's network needs to meet all possible security measures in terms of securing the business information. The protection against the business information is depends on how much security issues concerned and these can be distributed

Network Security

977 words - 4 pages A secured network is something that not only businesses but also regular day to day people with personal computers must have. Unless you want a computer that will start to run slow and/or is infected with many different types of viruses which will ultimately lead to the crash of your system then it is a good idea you invest in network security. "The term virus refers to malicious software that requires help from computer users to spread to other

Network Security

3522 words - 14 pages and cell security within there network (Blue Socket, 2005). Windows Server 2003 R2The world renowned Microsoft Corporation also offers an excellent server solution. Windows Server 2003 R2 ("release 2") is the updated version of Windows Server 2003. R2 includes all of the free out-of-band updates Microsoft shipped for Windows Server 2003 since April 2003, including the Group Policy Management Console and Windows Share Point Services. Microsoft

What Is Network Security

631 words - 3 pages What is network security? It relates to any activity done that applies some kind of network protection. Specifically, these activities protect the ability to use and rely on, integrity, and safety of your network and data. It protects against threats such as spyware, malware, identity theft, denial of service, and viruses. It also prevents unauthorized people from being a disturbance or doing damage to a network system. Network security is used

All about Network Security

873 words - 4 pages Network security is as important as securing your own home. There are networks all around us and large or small businesses all rely on their computer network to keep running smooth. Network security is not as easy an issue as it sounds. There are many technicalities involved especially when your network is the backbone of your business. Increment in the number of networks brings with it new and lethal security threats. All the important

Overview of Network Security

1050 words - 4 pages Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to

Elements Of Network Security

1606 words - 6 pages Elements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and

Network Security Practices

810 words - 3 pages ones on the 10’oclock news you have to ensure you have proper security practices in place to secure your network. Most people in the security field agree that good security policies are necessary to keep intruders out and keep the users along with the information on their network safe. The best way to do this is to have some kind of written security policy. This policy should be made available for anyone to see and read so they have a better

Network Security Monitoring Tools

788 words - 3 pages There are numerous network security devices and tools available to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. When acting alone, the current generation of security devices has an exceedingly difficult time providing an effective defense against such threats, and the situation is particularly grim for targeted or novel attacks. It

Network Security Sensors

922 words - 4 pages There are numerous network security devices and tools available intended to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. This will be an analysis of the features and benefits for various Intrusion Detection/Prevention Systems (IDPS) and other network traffic monitoring tools in regards to defending high value targets against attacks from

Similar Essays

Network Security Essay

1286 words - 5 pages Network Security Network security is a problem that network administrators face. It is something that network administrators should keep a careful eye on. For example, if the home network does not have any security measures in place, then the person is at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly because they want to protect their valuable information and network

Network Security Essay

1567 words - 6 pages Network Security 1. What is network security? Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to

Network Security Essay 1735 Words

1735 words - 7 pages therefore can enter your computer or network and then get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. Sometimes a Trojan horse is disguised as a program that is supposed to find and destroy computer viruses, but instead introduces viruses onto your system (Barrett). With all these different types of threats, many security and defense programs have been developed to help fight these

Network Security Essay

667 words - 3 pages segment limits the area vulnerable to attacks. Implementing VLANs and VLAN trunking helps to segment the network effectively. VLANs are logically separate within the same physical installation and define security domains inside one network. However, VLAN based security depends on proper switch configuration and vendor documentations (Kiravuo, Sarela, & Manner, 2013). This means that default switch settings should be changed to prevent VLAN hopping