Nobody downloaded yet

Network Security Paper - Essay Example

Comments (0) Cite this document
Summary
The OpenSSL is intended to act as a sort of secret handshake at the beginning of a secure conversation through encryption of communications between a users computer and a web…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Network Security Paper
Read TextPreview

Extract of sample "Network Security Paper"

Download file to see previous pages This essay focuses on the increased concern over the effects of the heartbleed bug on the internet security (Codenomicon, 2014).
This loophole allows stealing of secured information and data under normal settings, by the SSL/TLS encryption used to protect the Internet. The SSL/TLS covers privacy and communication security for applications found in the Internet such as the web, instant messaging (IM), email and virtual private networks (VPNs). The Heartbleed bug permits any user accessing the Internet to read the systems’ memory secured by the weaker versions of the OpenSSL applications. This jeopardizes the secret keys used to pinpoint the service providers and to encode the movement, the names and passwords of the users and the authentic content. This permits hackers to spy on data, steal information straight from the services and users and to impersonate services and users (Codenomicon, 2014).
The Heartbleed bug is listed in the Common Vulnerabilities and Exposures system as CVE-2014-0160. CVE (Common Vulnerabilities and Exposures) is the Standard for Information Security Vulnerability Names preserved by MITRE. The technical name, CVE-2014-0160 is named from the line of code that the bug is contained. However, a secure version of OpenSSL was released on April 7, 2014, after the Heartbleed bug was publicly revealed. At the time close to 17% an estimated half a million of the Internets protected web servers licensed by trust authorities were alleged to be exposed to the bug. Hence, permitting the stealing of the servers digital keys used to encrypt data and gain access over users session cookies and passwords (BBC News, 2014).
The loophole allows a hacker to gain access of up to 64 kilobytes of server memory. However, the hackers execute the attack repeatedly to access a substantial amount of information. Therefore, a hacker can gain access to users’ cookies from web browsers and servers that keep ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Paper Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Network Security Paper Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1680297-network-security-paper
(Network Security Paper Essay Example | Topics and Well Written Essays - 1000 Words)
Network Security Paper Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1680297-network-security-paper.
“Network Security Paper Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1680297-network-security-paper.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Security Paper

Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘www.businessdictionary.com’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... ...
24 Pages(6000 words)Essay

Network Security

...; Kaminsky and Foster; Bhattacharya and Ghosh). This paper will present a detailed overview of network security, network security policy, importance of network security policy, its implementation and design considerations for network security. At the moment, network security is a hot topic for the organizations as well as individuals. This research is aimed to highlight technology involved in network security, future trends of network security, companies adopting this issue, regulatory...
13 Pages(3250 words)Research Paper

Research Paper on iPhone Network or Security

...of the network, and the hardware components required for the functioning of the network. For each topic, after giving general background information, the paper will focus on the network used by the iPhone, that is 3G. The third part will relate to the security methods and procedures employed by the iPhone in order to provide the best possible network security to its customers. A general discussion on the different security options will be followed by a discussion on the specific network security method of the iPhone, analyzing both its benefits and drawbacks. This will...
3 Pages(750 words)Research Paper

Network Security

...transport architectures, and all devices have a specific transport mode that it associates with. Ultimately blackberry security is best when linked up with the blackberry enterprise server, which is designed specifically cooperate and commercial use. This server allows the smartphone to run on a remote platform with all the essential functionalities stored separate from the device. In essence, the blackberry can successfully be used for corporate business functions, and for personal use without any compromise on data integrity. Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks. Through least cost routing, a wireless connection can be configured to...
7 Pages(1750 words)Essay

Project Paper: Best Practices for Network Security

...? Best Practices for Network Security Grade April 14, Best Practices for Network Security Best practices for network security are the actions, plans and steps taken to ensure that the network is always safe and secured. It is something that is so compromising for a network without a security policy. The responsibility of protecting the computer files and all information (e.g., employer’s information) in the network depend on the practices that are applied for the security. There are those procedures that are followed to see that the...
8 Pages(2000 words)Essay

Network Security

...? Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor...
3 Pages(750 words)Case Study

Project Paper: How to Use Linux Operating Systems as a Network Security Device or Component

...? Project Paper: How to Use Linux Operating Systems as a Network Security Device or Component Internet has offered the entire world with an opportunity to interconnect remotely. There are large and small networks that allow people to retrieve and distribute information across the network. However, the growing network traffic and the increasing threat from intruders’ ability to gain unauthorized access to information travelling over the network and potential threat of malicious substances have swayed the immediate attention of the concerned entities to secure their networks against such attacks. In this regard, the primary aim of network security is to prevent data loses and protect system from unwanted threats. Correspondingly... , the...
11 Pages(2750 words)Essay

Network security

...Network Security Part Today, the computer networking systems are highly vulnerable and prone to the hackers, viruses and other cyber dacoits. Therefore the network security systems have to be sound dependable and free from risks (Marcel Dekker, New York, 1997). This is only possible if the systems and service packs are continuously updated and different versions are enhanced. This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation in an effective manner. As far as the computer hardware compatibility list (HCL) is concerned the peripherals must be compatible... with the...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Rogue Access Point Network Security Paper

...Rogue Access Point Network Security Introduction In the daily operations of organizations, firms are exposed to various vulnerabilities, particularly as a result of the engagement of activities through a network. In most occasions, firms have been known to use wide area and local area networks for communication purposes between it and the numerous mail and web servers that it interacts with. As such, it is essential to note that a control system’s security analysis requires the sealing of all possible means by which vulnerable activities of hackers and hacking may be expounded (Chen, Ji & Zhang, 2013). This implies that it is essential to determine the...
10 Pages(2500 words)Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Network Security Paper for FREE!

Contact Us