StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security & Applications - Research Proposal Example

Cite this document
Summary
Name Date Web 2.0 security Securing a network is a becoming a major issue, and in the past only tackled by skilled and qualified people. On the other hand, as increasingly the people become `wired', an increasing number of people need to recognize the fundamentals of security in a networked world…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Network Security & Applications
Read Text Preview

Extract of sample "Network Security & Applications"

Web 2.0 security Securing a network is a becoming a major issue, and in the past only tackled by skilled and qualified people. On the other hand, as increasingly the people become ``wired'', an increasing number of people need to recognize the fundamentals of security in a networked world. Additionally, at present a lot of people get chances to work from home and connect to systems distantly, in this regard network security becomes a significant subject for the companies. In this regard, the most excellent way to keep away from inconsequential security issues and threats is that education of end-user though the right software can help diminish the threat.

Thus, this is very important to train the basic computer users and information systems manager in mind, teaching the ideas required to read through the hype in the marketplace and recognize threats associated with the computer security and how to cope with them (Network Security, 2010; Curtin, 1997). In addition, the network security is turning out to be more and more significant in view of the fact that people spend more and more time connected. In this scenario, compromise on network security is frequently much easier than compromise on physical or local security, and is much more frequent.

However, there are numerous good tools available to help improve network security, as well as majority of them are shipping with Windows features (The Linux Documentation Project, 2010). The new web based or web-supported tools offer a range of effective software features and services to the consumers, workers and business associates. These services could be easily managed and handled. Additionally, the new information technology offers access to a major business resource such as the web server, which gives the capability to access various other useful information resources, for instance database servers (ITSecurity).

The major examples of Web 2.0 includes social networking websites such as wikis, blogs, hosted services, video-sharing websites, mashups, web applications and folksonomies. Cloud computing (a broad term for anything that engages distributing hosted services over the internet) also integrates Web 2.0 utilities for the distribution and coordination of data across a range of tools and devices. In spite of these Web 2.0 advantages and technology based solutions, there is an expenditure that is further than the cost of the systems and software: major security contests.

In current years, websites like that Gmail, Yahoo! Mail, Facebook along with MySpace have all been overwhelmed by hateful code. However, the absolute openness of today’s computing setting is outstanding. In this regard, consumers, human resources and business associates utilize a range of systems, comprising smartphones and other portable units to beat someone delicate or intellectual possessions, personal data, credit card details, health care records and more (Greengard) and (TechTarget).

With the capability of adware, malware and spam dispensers to utilize the websites as delivery mediums for their newest effort for cyber-hackers to expertise tremendously overwhelmed attacks through the information gathered from individual outlines placed on web pages of Web 2.0 characteristics. In such type of situation social networking is quickly turning out to be a serious pain position, investigators uphold (Hines). In Web 2.0 based environment a user can face following attacks and assaults: (Perez) 1.

Injection mistakes 2. Inadequate Authentication Controls 3. Reliability of Information 4. Inadequate Anti-automation 5. Outflow of Information 6. Phishing 7. Cross Site Scripting (XSS) 8. Cross Site Request Forgery (CSRF) These possible security susceptibilities are more aligned to the web 2.0 based environment. In this current web based business and working arrangement such categories of safety and privacy assaults are turning out to be more frequent. Therefore there is a dire need for even much better ways and techniques to deal with such type of attacks.

The section below is aimed to offer such type of ways or mechanisms for better protection and privacy administration (Perez). In case of web 2.0 based setting we can take the following efficient steps for the better management of security associated vulnerabilities (SpamLaws) Validation of User-Input: In web applications there is vital need for the validation of all the data that is entered by various users. This can be done by implementing proper login and password based security mechanism (SpamLaws).

Default Configurations: In Web2.0 based arrangement we need to overlook the requests for rearrangement of web servers by setting their default configurations. In this way hackers will not be able to change the configurations to perform or to launch a security attack (SpamLaws). Encryption: It is a very useful technique for the protection of the data and information in the Web2.0 based arrangement. It can efficiently protect from the outsider attacks (SpamLaws). Protected Servers: By making web based server protected against the outsider attacks we can implement better security and privacy management.

This can be done through the establishment of highly sophisticated firewall systems or intrusion detection system (SpamLaws). Web 2.0 is becoming a very useful tool for the businesses. It is very helpful for improving the performance of the corporations. However, there are lots of security related issues in Web 2.0. This paper has presented a brief overview of some of the main aspects regarding the Web 2.0 security. This paper has also suggested possible mitigation actions those can be taken for an effective Web 2.

0 security management. Works Cited Curtin, Matt. Introduction to Network Security. March 1997. 06 February 2011 . Greengard, Samuel. Web 2.0 Security Strategy. 12 October 2010. 09 February 2011 . Hines, Matt. Experts hammer Web 2.0 security. 21 February 2008. 09 February 2011 . ITSecurity. Best Practices for Web 2.0 Security. 2011. 09 February 2011 . Network Security. Education: Basic Foundation to Business Network Security. 03 October 2010. 07 February 2011 . Perez, Sarah. Top 8 Web 2.0 Security Threats.

17 February 2009. 09 February 2011 . SpamLaws. 5 Best Methods for Web 2.0 Security . 2009. 09 February 2011 . TechTarget. Cloud Computing. 28 December 2007. 09 February 2011 . The Linux Documentation Project. Network Security. 2010. 08 February 2011

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security & Applications Research Proposal”, n.d.)
Retrieved from https://studentshare.org/other/1407605-network-security-applications
(Network Security & Applications Research Proposal)
https://studentshare.org/other/1407605-network-security-applications.
“Network Security & Applications Research Proposal”, n.d. https://studentshare.org/other/1407605-network-security-applications.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security & Applications

Business Strategy

The school would provide the opportunity for Libyans to learn computer applications, and join the digital regime.... The document provides detailed information on the business strategy plan, which is an important tool in the beginning or expansion of any business.... This includes comparing various business alternatives followed by appropriate or economical business solutions....
9 Pages (2250 words) Admission/Application Essay

Privacy of social media

According to the Huffington post, with the increased use and applications of the different social networks it has been difficult to maintain privacy in relation to social media especially at the workplace.... The good part is that a number of the relevant parties have come in and placed several strategies that guarantee security and privacy for the users of social media sites....
5 Pages (1250 words) Admission/Application Essay

Monitoring Our Home Planet

Every year across the world, natural phenomena and hazards pose a threat to lives and the livelihoods of millions of people, resulting in deaths and damages worth billions of dollars.... Some of the more common natural hazards that threaten the lives and livelihoods of human… Nevertheless, the internet has become a useful resource in the monitoring, assessing, forecasting, and responding to these natural This paper aims to explore the impact of three different natural phenomena that are responsible for natural disasters, and analyse how these phenomena are monitored via the internet....
4 Pages (1000 words) Admission/Application Essay

Sip trunk

In contrast to PSTN services, a SIP trunk has backup solutions so that it can function more reliably without loss or infringement of valuable data in case there is a technical problem or a security breach.... It is mainly used for establishing multimedia enabled communication sessions so that both video and voice calls can be made over and Internet based network (Johnston 2004).... It is mainly used for establishing multimedia enabled communication sessions so that both video and voice calls can be made over and Internet based network (Johnston 2004)....
2 Pages (500 words) Admission/Application Essay

The Importance of iCloud Computing System

This implies that the access their files in real time thus using their in the applications on their... In this assessment, therefore I strive to decipher the importance of icloud computing system.... As such, I maintain the use of technical terms in order to enhance… In the four outcomes below, I present my findings from the review of the technical article....
6 Pages (1500 words) Admission/Application Essay

New technology

The stored applications and tools can be easily accessed with the help of an internet connection.... Organizations implementing cloud computing are able to collaborate applications, software and information over the network.... In this context, organizations are planning to outsource applications that are less sensitive, which minimizes service provisions.... Additionally, users are concerned about accessing and managing data over the cloud network due to different security considerations....
2 Pages (500 words) Admission/Application Essay

Security Best Practice Guidelines for Businesses

The author of this essay entitled "security Best Practice Guidelines for Businesses" touches upon the Intrusion Detection System (IDS) which is a critical precautionary tool that monitors the network through monitoring packets that are passed within users.... hellip; The first and easiest application of an Intrusion Detection Systems for security purposes is known as application isolation.... One of the most interesting tools that provide Optimum security is known as Secunia PSI....
4 Pages (1000 words) Admission/Application Essay

Impact of Ubiquitous Sensors

1) reveals that one of the applications of sensor in Internet of things is on the use of Radius Frequency Identification (RFID).... It also offers knowledge to everyone, anywhere and at any time.... The context awareness helps in data generation.... Ubiquity anywhere is very practical in a… In a case where USN is under consideration to offer services everywhere, it applies to both civilians and the military fields....
4 Pages (1000 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us