StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

How Operational Routers May Retain Functionality and How Data May Be Safely Transmitted over Them - Research Paper Example

Cite this document
Summary
The primary aim of the "How Operational Routers May Retain Functionality and How Data May Be Safely Transmitted over Them" paper is the determination of how operational routers may retain functionality and, more importantly, how data may be safely transmitted over them…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
How Operational Routers May Retain Functionality and How Data May Be Safely Transmitted over Them
Read Text Preview

Extract of sample "How Operational Routers May Retain Functionality and How Data May Be Safely Transmitted over Them"

Download file to see previous pages

By compromising routers, attackers can inflict substantial, wide-ranging harm upon an organization.  It is, thus, that routers functions as attractive targets, upon which hackers routinely wreak their subversive efforts.  Given the ever-increasing number of operational routers which have been compromised, the imperatives of securitizing networks can hardly be overestimated. As important, however, is ensuring that networks remain operational and data transmission is secure even within the context of an adversarial operational environment. Indeed, ensuring that networks remain available despite adversary presence is the focus of considerable research attention because it implies the capacity not only to detect but to recover from the failures inflicted by adversaries.

The course covered numerous issues related to network security, information assurance, the security vulnerabilities to which systems/data are exposed, and the variant strategies/tools for the maximization of security. Weekly assignments, insofar as they covered single issues, did not simply force us, as students, to engage with the material and to critically examine its implications they but, it gave us an understanding of the topics which we could confidently handle and those which we were less able to.

After identifying those topics which I believed I could handle well and write a good extended research report on, I sought the advice of our Chief Information Security Officer. From my perspective, if the objective of this report was to truly be the provision of a study that could be of use t my place of employment, none was in a better position to direct me towards a research focus than our CISCO. After discussing the topics covered with him, he suggested that rather than focus on securitizing routers against unauthorized infiltration, since much had already been written on the topic and, at the end of the day, it was better left to the experts,' I should research how networks can be kept operational even following an attack.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security: How Operational Routers May Retain Functionality and Research Paper”, n.d.)
Network Security: How Operational Routers May Retain Functionality and Research Paper. Retrieved from https://studentshare.org/information-technology/1517808-network-security-essay
(Network Security: How Operational Routers May Retain Functionality and Research Paper)
Network Security: How Operational Routers May Retain Functionality and Research Paper. https://studentshare.org/information-technology/1517808-network-security-essay.
“Network Security: How Operational Routers May Retain Functionality and Research Paper”, n.d. https://studentshare.org/information-technology/1517808-network-security-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF How Operational Routers May Retain Functionality and How Data May Be Safely Transmitted over Them

Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks

Other types of threats that may affect the domestic wireless network operating on an 802.... IntroductionMANET is constructed on multiple routers knows as multi-hop communication paths, these multi-hop communication paths can be dislocated any time and in any direction....
35 Pages (8750 words) Term Paper

Routing Protocols for Ad-hoc Wireless Network

GHz unlicensed frequency spectrum that offers a maximum data rate of 11 Mbps.... GHz unlicensed frequency spectrum that offers a maximum Mbps rate of data by using Orthogonal Division Multiplexing in the frequency band.... These nodes serve as both hosts as well as routers routing data to and from other nodes within MANET [21].... Commonly, a base station in mobile network within a cell can access all the wireless nodes without the mechanism of routing through the broadcasting method whereas in the MANETs, each node should be transmitting the data on behalf of the other nodes....
20 Pages (5000 words) Dissertation

Electronic-Commerce Security: Voice Over Internet Protocol

This essay "Electronic-Commerce Security: Voice over Internet Protocol" is about the communication technology that uses for transmitting sound signals via the internet.... Mostly done over long distances via internet connection.... esearch conducted in South Africa showed that self-provided VoIP has proven to be the most successful of all kinds of Voice over Internet Protocol (Uys 2005).... The only advantage that handheld gadgets have over laptops lies in their smaller sizes and is easier to carry....
19 Pages (4750 words) Essay

The Stakeholders in Emergency Response

This information will mainly comprise of the types and frequency of the various types of emergencies and how the cases were handled prior to the designing of the software.... Data on how the functionality and information paths and protocol that the VoIP service uses will be necessary in order to design a software that will be easily integrated in the working of the VoIP service.... To enable effective communication to organisations that can supply these specialists, this research proposes the establishment of a medical alert system to communicate to all of them instantly....
10 Pages (2500 words) Dissertation

The Negative Impacts of Cybercrime on Business and Society

Even the most secure of networks, be them owned and operated by government or private individuals, have been hacked into from time to time, leading one to wonder if true security is even possible (Kirschner, Buckingham, & Carr, 2002).... This type of activity has been increasing at alarming rates over the past few decades, to the point that seemingly no one is immune from becoming a victim.... NO matter how advanced the security controls are, still incidents and security breaches are on the rise....
27 Pages (6750 words) Research Paper

The Role of IT Management in Organizations

As such, I wish to outline my understanding of what this important role entails, and how such effective management of new software and hardware to implemented company-wide can help to facilitate a more streamlined and profitable business model in the end.... Instead, they are tunnel visioned on creating the best product they can, regardless of the end user or industry that will eventually make use of them.... In fact, some software packages and hardware tools may the best available, yet be determined to be inefficient within the working organisation that we ourselves have created....
20 Pages (5000 words) Research Paper

LAN Computer Platform

Personal cable runs are made from centralized dynamic hubs to every workstation, network printer, server, or router The crucial individuality of LANs, in distinction to Wide Area Networks (WANs), comprise there greatly superior data transfer rates, lesser geographic range, and a shortage of require for telecommunication lines.... It explains how a LAN computer network can be organized and execute....
15 Pages (3750 words) Essay

Exploring Advancement in Crowd Sensing through Smartphones

Crowdsensing through using smartphones can be a cheap and scalable way to implement static wireless sensor networks for Crowdsensing over a large coverage area.... This paper ''Exploring Advancement in Crowd Sensing through Smartphones'' tells that The term 'crowdsensing' refers to sharing data collected by sensing devices to measure phenomena of common interest.... It will also provide an opportunity to work on data collection and analysis that involves crowdsensing through smartphones....
28 Pages (7000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us