This website uses cookies to ensure you have the best experience. Learn more

Network Security Issues. Essay

9689 words - 39 pages


1.1 Introduction

With the spread of Hackers and Hacking incidents, the time has come, when not only system administrators of servers of big companies, but also people who connect to the Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have a static IP or a dynamic one, if your system is connected to the Internet or an Ethernet system, and then there is every chance of it being attacked.
The challenge of operating a secure web site is very real. The 1999 Information Security Industry Survey conducted by ICSA reports the number of companies that have been attacked by hackers jumped 92 percent from 1997 to 1998. The losses from security breaches averaged US$256,000 and a total of more than US$23 million for the 91 businesses surveyed. CERT, which monitors reports of computer network security breaches from around the world, has registered a steep rise in the number of reported incidents in the past few years (see chart below).
The current mainstay for securing web transactions is the Secure Socket Layer, or SSL, developed by Netscape and embedded in standard browsers. The SSL security protocol is used to create a secure session between a user and a web server using digital certificates. SSL provides for the encryption of data transmitted between client and server, allows for server authentication, ensures the integrity of messages, and can also provide for client authentication. It is very likely that the browser you are using provides SSL security When needed. The cryptographic strength (that is, how secure it is) depends on the length of the key used. SSL uses public key cryptography to send data between client and web server during a secure session. Public key cryptography is based on a pair of asymmetric keys used for encryption and decryption. Each key pair has a public key and a private key. The public key is just that -- made publicly available on a key server. The owner keeps the private key secret. Data encrypted with the public key can be decrypted only with the private key. Conversely, data encrypted with the private key can be decrypted only with the public key.

The asymmetric nature of public key cryptography makes it a valuable encryption tool for messaging on the web because it means the two parties (sender and receiver) do not need to share a single key. When you encrypt a message with your private key, then a recipient using your public key to decrypt the message will know that it is in fact from you. When someone uses your public key to encrypt a message to you, they will know that only you (as the holder of the private key) will be able to decrypt and read it.

1.2 Security of the "Networks"

1.2.1 Basic Security Concepts

Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication,...


Types of Networks Essay

1351 words - 6 pages wired method such as Ethernet cables or by optical cables etc. we can transfer the information from one computer to other via cables the data transmit by physical medium only. Security is major issue or concern in internet and in our society or in many organizations so there are many methods through which we will give security to our network. Now here is concern about the how to secure the data from unauthorized user and unauthorized access by

Implementing a New Wide Secure Wireless Network at Brigham Young University Hawaii

2628 words - 11 pages LAN configurations. VLANs can address scalability, security, and network management. It covers several key issues when designing and building switched LAN networks: • LAN segmentation • Security • Broadcast control • Performance • Network management • Communication between VLANs PART 2 INTRODUCTION: The wireless networks are being used by many organizations and they are highly increased this is because of the low cost compared to fixed

Corporate Network Management

2150 words - 9 pages threats are usually the greatest source of security problems. Outsiders amount to between only 1 to 6 per cent of concerns. Many types of insider security threats do create substantial risks for organizations (Melford 1993). Network management can help manage internal issues but network management cannot act in a smart manner to solve problems without external operations from network staff. Within recent weeks, the Heartbleed SSL vulnerability

Security Management Models for Information Systems

1014 words - 4 pages security systems are failing, with serious results” (Fumey-Nassah, 2007). To remedy the increase threats to information security systems, organizations are seeking alternatives to network vulnerabilities from malicious attacks. There are several management measures that organizations must take to fully understand the vulnerabilities at stake. There are dominant security management frameworks that encompass security management models for

Key Management for Multicast Groups using Broadcast Encryption and Group Key Agreement

583 words - 3 pages key management method to extend demerit point-to-point quantum channel, adopting VPN technique to construct or join a private network across an existing public network by creating an encrypted tunnel between both of them, and one- time pad algorithm to provide perfectly secure communication as well. This paper is organized as follows. Section II security requirement and related issues for key management system will be discussed in greater detail

Cloud COmputing as an Advanced Technology

639 words - 3 pages layer software. The security problems and challenges of these layers are different. Data center construction, physical security, network security, transport security and system security are the key point for IaaS. However, for PaaS, data security, data availability, computing availability and the problems of disaster and recovery are paid more common. But mostly these issues fall into two broad categories: Security issues faced by cloud providers

wireless sensor networks

1238 words - 5 pages . CONCLUSION: We have introduced the framework for trust management for key issues in wireless sensor networks. The proposed framework of the trust management in sensor networks may be integrated into many real time applications. The design of the trust management in WSN must be taken into the account with diverse needs including reliability and security. In future, we are planning to deal with more attributes like accuracy, scalability, and fault tolerance of the network.

vocation area report

1917 words - 8 pages INTRODUCTION I am required to write a report on an industry sector within my vocational area relating to my course of study. This report will be worth 20% towards my final result of my work experience. I will be choosing to write about Computer Network Security for my vocational report. In my report I will be giving a description of the industry sector (Computer Network Security) and will name the range of occupations associated with it. Also

Security and the OSI Model

1605 words - 6 pages and interacts with when working on the network. Any and all functions that do not directly pertain to the network happen at this layer. Some of the security issues that can occur at the application layer are (Reed, 2003): • Open design issues allow free use of application resources by unintended parties • Backdoors and application design flaws bypass standard security controls • Inadequate security controls force "all-or-nothing" approach

Security Audit

2192 words - 9 pages place to protect the company against loss of information to the outside world. This paper addresses all the issues involved in security auditing of Ariam travel agency’s network and its premises. Security Audit Ariam travel agency handles bulk information that contains sensitive customers and employees’ information; it contains multiple external users and various e-commerce applications. Therefore, data security at this company is very

Cloud and Its Effect on Businesses

2619 words - 11 pages the same lines. A hybrid cloud computing deployment model combines both public and private cloud models for use within one network. With the cost efficient payment and resources in the public cloud and the security available in the private cloud the two technologies combined can be useful to networks to ensure resources are provided as well

Similar Essays

Intorduction To It Security Essay

1201 words - 5 pages Introduction to IT Security (ITM 431) Module #1 Case Assignment The Oxford American Dictionary of Current English defines admonition as "to reprove. Urge. Give earnest advice to. Warn". Understanding this how do we employ admonitions systems to information technology to make it more useful in-regards to Network and system security? Using admonition software we are attempting to create an environment that will either prevent

Network Security Essay

1286 words - 5 pages – who have better communications than normal nodes. (Meghdadi 90) Hackers and the government are not the only things that can cause network security issues, but also low encryption levels. If a computer network is at risk of having low encryption, then it needs to have stronger passwords to keep hackers at bay. Network security is not where it needs to be. It still has some imperfections to be squared away. With that being said, routing path

Small Office Secure Network Proposal Essay

668 words - 3 pages This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company. I would suggest conducting a site survey before finalizing a network layout. A site

Investigation Of Network Security Requirements And Their Impact On Performance With The Aim Of Establishing Configurations Fit For The Purpose

1015 words - 5 pages challengers to the organization e.g. performance issues due to filtering of packets as they enter and leave the network. In this project, I aim to investigate some of the security challenges that exist in modern networks and how these security challenges are mitigated. After identifying mitigation techniques I intend to design a network and configure it with these mitigation techniques. The network will be designed in OPNET IT guru academic edition