StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security in Computer Networks - Research Paper Example

Cite this document
Summary
The paper "Security in Computer Networks" tells us about threats to security in computer networks and techniques used as a control mechanism. Millions of computer users across the globe today are exposed to the Internet that has raised safety concerns concerning personal data and information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Security in Computer Networks
Read Text Preview

Extract of sample "Security in Computer Networks"

Security in Computer Networks Millions of computer users across the globe today are exposed to the Internet that has raised safety concerns with respect to personal data and information. The use of computers for online banking and monetary transactions as well as communicating with friends and associates online has left the users vulnerable to hackers and spywares. Apart from the Internet that is the largest public data network there are private networks such as Wide Area Networks (WANs) of companies connecting their offices located remotely as well as billions of Local Area Networks (LANs) within the premises that connect computers in a local environment. The paper provides a broad discussion on threats to security in computer networks and techniques used as control mechanism. The discussion provides a comparative analysis of these control mechanism and their relative effectiveness in implementing computer network security. Introduction Computer security is the "protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)" (NIST, 2008). Some of the threats facing the computer networks include spywares, viruses, and hacking codes or programs that expose the users to potential dangers of data loss and fraud activities. Most of the computer users are unaware of the dangers or potential abuse related to these applications and can cause extensive damage or increase the chances of fraud or identity theft or damage to the computer systems and files. It is a challenging task to prevent cyber crime owing to the unlimited expanse and use of Internet that provides extensive scope to fraudsters. Programs like spyware, adwares, viruses or hacking software can be prevented from being downloaded into the computer system through the use of firewalls, adjusting browser settings and installing anti-spyware protection applications. There are many techniques and protocols devised and are in use to protect or secure the computer networks and the data traveling through the network. Depending on the security policy of the computer network one can choose and deploy the security protocols at different layers of the network. The extent to which a computer network is secured depends on the encryption technology and the algorithm used to do the authentication. Comparison of different protocols and architecture Transmission Control Protocol over Internet Protocol (TCP/IP) and Open System Interconnection (OSI) are two protocol models widely used in the network architecture. Firewalls are the techniques that are employed within the network to protect it from the external security threats. The firewall can be deployed through a hardware device with preloaded firmware connected within the network as well as it can be a deployed through software system working purely based on the set of algorithms or it can be a combination of both. Secured Socket Layer (SSL) is used to secure the transfer of data / authentication information over the network. This technique uses the good combination of private key and public key cryptography for securing the data over the network. This works over and above the TCP. Virtual Private Network (VPN): Establishing a protected network between two secured network services or nodes located in two separate protected networks but is separate by unprotected channel or network. For the purpose of explaining the security mechanism in computer networks the paper focuses on TCP/IP and OSI models followed by a comparative analysis with other techniques. Implementation details In TCP/IP model the media transmission happens through five layers. Application layers, network layers and transport layers are the part of software layer in the network. Data link layers and physical layers are the part of physical layer in the network. Physical layers are mainly data-link cables and signals. The chart below depicts the sequence of media signals in the TCP/IP protocol. (Source: Wang J. 2009) In OSI model bottom layer is the physical layer followed by the data link layer and then the network layer. All these three layers are in the lower level of the network. After the network layer there is the transport layer followed by the presentation layer and on top is the application layer. All these four layers are in the upper level of the network. The OSI framework for deploying protocols in a network environment is based on open source architecture but it is not made as a standardized framework. So in today's architecture of all the network OSI model is used as a reference. In most of the networks one or combination of many OSI models are used. Analysis and results When network engineers deploy the security at the application layer it gives an end to end protection and there is no need for data decryption and verification of signature. But it is vulnerable to hackers because they can change the header information. To overcome the above said vulnerability, security is deployed through encryption at the transport layer. This gives security to the Transmission Control Protocol (TCP) at the packet level and there is no need to do any change the in the application software. But still the attackers can do damages by analyzing traffic by recognizing the IP address. This type of security lapse can be overcome by encrypting the data at the network layer. It provides link-to-link security in the network. It can be deployed in transport mode as well as in tunnel mode. For tunnel mode deployment a gateway is required and this too does not require any changes in the application program. Comparison with other techniques The hardware firewall is the more secured option for protecting all areas of the network that are based on TCP/IP protocol. The firewalls are the fast security that can be deployed in the network to securely allow the users to enter and be in the network as well as allow the data transfers based on the pre-defined hierarchy and policies set by the organization without any abnormal delays. It allows only the authenticated users to enter into the network. It also uses various filter techniques to apply the security and data sharing policies of the organization. The firewall disallows the unauthorized user to enter in the network, it disallows the unauthorized transfer of data and it maintains the users' behaviors by logging in the entire activities of all the users within the network. Various software programs are used to protect the network, computers and the data from the attacks of Viruses, Trojans, Malware, Spyware and suspecting programs. This is also called the anti virus scanners and detectors. These are antidotes developed developed by software companies who keep upgrading the programs based on new threats or viruses generated. The anti virus software programs are installed in the network through the server as well as in the client-PCs. The system administrator monitors the anti virus program and updates the system on a regular basis. The system administrator also makes sure that each node-pc in the network has the update of the anti virus program in it. Presently there are intelligent anti virus program that does the system administrator's job automatically on its own based on the pre-defined schedule and schema. The SSL uses the shared session keys. Through the use of shared session keys the data is encrypted and decrypted at the client side and the server side. It is a single layer security. In SSL the identity authentication at both side (i.e. client and the server) happens through the use of digital signature. The client side sends randomly generated data string, SSL version number and encryption algorithms to the server and the server verifies it and send the same details to the client along with the digital signature, the client side decrypts the digital signature and there is a common key maintained. After the entire verification process happens and in case all details matches then only the transaction takes place. The VPN provides secured encrypted sessions between the nodes that are connecting themselves outside its own secured network. It means when using a VPN it creates a private channel between the nodes. This method is very cost effective for achieving the benefits of a private network in a non-private network environment. But there are many disadvantages in securing a network through VPN. It increases the cost of encryption, decryption and storage overheads over the period of time. The VPN if not designed properly it may increase the packet processing thus reducing the network performance. Conclusion There is no single technique or technology that can serve all needs of the network security. There has to be mix of various techniques and technologies at various level and places of the network to protect it from external as well as external security threats and vulnerabilities. Different network behaves differently hence the policy and framework for security needs to be designed exclusively and the security devices and security programs should be made as part of the network system itself. References: 1. NIST. (2008) An Introduction to Computer Security: The NIST Handbook. National Institute of Standards and Technology - US Department of Commerce. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf 2. Banerjee, Rahul. (2006) Of More Cryptographic Algorithms & Network Security Systems. Lecture-4. Retrieved from http://discovery.bits-pilani.ac.in/rahul/NetSec/Network%20Security-Lecture-4-2005-2006-secure.pdf 3. Wang, J. (2009) Chapter 5- Network Security Protocols in Practice. Part I. Retrieved from http://www.cs.uml.edu/'wang/NetSec/Chapter_5_part1.ppt 4. CISCO Systems. (2001) A Beginner's Guide to Network Security. Retrieved from http://www.cisco.com/warp/public/cc/so/neso/sqso/beggu_pl.pdf 5. PC Mag. (2009). Definition of TCP/IP. Retrieved from http://www.pcmag.com/encyclopedia_term/0,2542,t=TCPIP&i=52614,00.asp 6. PC Mag. (2009) Definition of OSI. Retrieved from http://www.pcmag.com/encyclopedia_term/0,2542,t=OSI&i=48641,00.asp 7. Misra, Christopher. (2007) Security Architectures. University of Massachusetts. Retrieved from http://security.internet2.edu/docs/cmisra-architectures.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/technology/1510044-security-in-computer-networks
(Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 Words)
Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/technology/1510044-security-in-computer-networks.
“Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/technology/1510044-security-in-computer-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security in Computer Networks

Network Security Fundamentals, Security Threats, and Issues

In fact, with the growing popularity of the Internet, the term “firewall” is a great deal more frequently employed in computer networks.... hellip; At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area networks (LANs) and Wide Area networks (WANs) to the Internet.... In view of the fact that the Internet is a huge network of networks, as well as for the reason that of its basic design is intrinsically insecure and unsafe....
4 Pages (1000 words) Case Study

Mr. Manos Llewellyn Computer Network and Security Controls

Manos Llewellyn computer Network and Security Controls" explores the scope for ISMS.... considering supported data rates and security Network Interfaces & Protocols Network Services Requirements Data and Network security Requirements Network Performance Requirements Compatibility Requirements 2 What is ISMS?... Moreover, personnel security and physical security related to theft are implemented.... Likewise, the implementation element also involves security related to network, applications, and computing devices....
11 Pages (2750 words) Assignment

Computer Network Security

The prime purpose of the paper "computer Network Security" is to discuss patch management issues that frequently update security patches on systems.... Secondly, configuration management also plays an essential role in ensuring security for mission-critical aviation applications.... All the identified attack interfaces must be addressed by taking the following factors into consideration (Mitigating security threats by minimizing software attack surfaces....
4 Pages (1000 words) Essay

Taha Computer Network Security Services

The present essay "Taha computer Network Security Services" provides a business plan for a computer network security company known as Taha.... hellip; Taha computer security services business is a new organization that will offer computer security services to its clients since the world is in the midst of a global technological revolution, which will bring change in all proportions of the world.... here are measures and plans in the future to offer other computer services to the clients....
3 Pages (750 words) Essay

The Security of the Computer Network and Computer System

The focus of this paper "The Security of the computer Network and computer System" is on the use of computers and the internet.... nbsp; The safety of one's a computer, network, or personal information needs to be protected by viruses, identity thieves, malware, and any other form of threat.... pon receiving a new computer for the home environment, it is necessary to ensure this system is as secure as possible.... Both the computer and the home network need to be protected from viruses, hackers, and malware....
10 Pages (2500 words) Assignment

Data Privacy and Security

In view of the fact that the use of computer networks has turned out to be persistent, the thought of computer security system extended to point out problems covered in the way of networked use of computers and data resources.... In view of the fact that the use of computer networks, particularly the Internet (the largest network of the networks), has turned out to be persistent, the thought of computer security system has extended to point out problems covered in the way of networked use of computers and their information and data resources (Kinkus, 2002)....
8 Pages (2000 words) Essay

Computer Networks and Security

This assignment "computer networks and Security" discusses the purpose of firewalls that is to act as an intermediary between the servers of the company and the outside community accessing the Internet.... While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers.... In addition, the concern is on the analysis of cost-benefits for application security alongside coming up with a rule set for the firewall ('IDS — the new firewall?...
11 Pages (2750 words) Assignment

Basic Operating System Security for Spark Computer

System securityThis segment focuses on how the implementation of group policy objectives has constantly been used in the Windows environment to achieve various security units in the world of computer networks in many industries.... … The paper “Security of a computer in a Network, Basic Operating System Security for Spark computer” is a comprehensive example of an essay on information technology.... The paper “Security of a computer in a Network, Basic Operating System Security for Spark computer” is a comprehensive example of an essay on information technology....
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us