Nobody downloaded yet

Security in Computer Networks - Research Paper Example

Comments (0) Cite this document
Millions of computer users across the globe today are exposed to the Internet that has raised safety concerns with respect to personal data and information. The use of computers for online banking and monetary transactions as well as communicating with friends and associates online has left the users vulnerable to hackers and spywares…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Security in Computer Networks
Read TextPreview

Extract of sample
"Security in Computer Networks"

Download file to see previous pages The paper provides a broad discussion on threats to security in computer networks and techniques used as control mechanism. The discussion provides a comparative analysis of these control mechanism and their relative effectiveness in implementing computer network security.
Computer security is the "protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)" (NIST, 2008). Some of the threats facing the computer networks include spywares, viruses, and hacking codes or programs that expose the users to potential dangers of data loss and fraud activities. Most of the computer users are unaware of the dangers or potential abuse related to these applications and can cause extensive damage or increase the chances of fraud or identity theft or damage to the computer systems and files. It is a challenging task to prevent cyber crime owing to the unlimited expanse and use of Internet that provides extensive scope to fraudsters. Programs like spyware, adwares, viruses or hacking software can be prevented from being downloaded into the computer system through the use of firewalls, adjusting browser settings and installing anti-spyware protection applications.
There are many techniques and protocols devised and are in use to protect or secure the computer networks and the data traveling through the network. Depending on the security policy of the computer network one can choose and deploy the security protocols at different layers of the network. The extent to which a computer network is secured depends on the encryption technology and the algorithm used to do the authentication.
Comparison of different protocols and architecture
Transmission Control Protocol over Internet Protocol (TCP/IP) and Open System Interconnection (OSI) are two protocol models widely used in the network architecture.

Firewalls are the techniques that are employed within the network to protect it from the external security threats. The firewall can be deployed through a hardware device with preloaded firmware connected within the network as well as it can be a deployed through software system working purely based on the set of algorithms or it can be a combination of both.

Secured Socket Layer (SSL) is used to secure the transfer of data / authentication information over the network. This technique uses the good combination of private key and public key cryptography for securing the data over the network. This works over and above the TCP.

Virtual Private Network (VPN): Establishing a protected network between two secured network services or nodes located in two separate protected networks but is separate by unprotected channel or network.
For the purpose of explaining the security mechanism in computer networks the paper focuses on TCP/IP and OSI models followed by a comparative analysis with other techniques.
Implementation details
In TCP/IP model the media transmission happens through five layers. Application layers, network layers and transport layers are the part of software layer in the network. Data link layers and physical layers are the part of physical layer in the network. Physical layers are mainly data-link cables and signals. The ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from
(Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 Words)
Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 Words.
“Security in Computer Networks Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Computer Communications & Networks
...? Computer Communications & Networks Table OF Contents Introduction ………………………………………... Page 3 X-Stream Server ………………………………………… Page 4 Routing ………………………………………… Page 7 Conclusion …………………………………………… Page 8 References ……………………………………………. Page 10 Introduction Today, the Internet provides numerous opportunities for humans to communicate and exchange information. Apart from various advancements such as web2.0, the semantic web and virtual and augmented reality, fundamental concepts and protocols that are used to transfer and deliver a data packet is the same. However, in order to examine the processes, methods and techniques, we must first understand the TCP/IP protocol suite itself. Considering Internet Protocol...
8 Pages(2000 words)Essay
Computer Communications & Networks
...layer. TCP/IP model is illustrated in Exhibit 1.1 below. Exhibit 1.1 TCP/IP Model Image retrieved from (Network Communication Architecture and Protocols: TCP/IP Four Layers Architecture Model. 2007. Javvin Technologies, Inc, pp. 4-4.) The application layer incorporates protocols including FTP, SMTP, Telnet etc. These application layer protocols send data to the next layer i.e. transport layer. The transport layer than constructs the header and data to send it via Transmission control Protocol (TCP) or User Data gram Protocol (UDP). Likewise, the network layer assigns the IP address and delivers the packet to the required Ethernet present at the network access layer. An example of data...
10 Pages(2500 words)Lab Report
Computer Communications & Networks
...Network and Protocol Processes In accessing X-Stream’s website from the home computers, instructions must be given to the home computer on what to do; these instructions must be understandable to the sender to be able to send them. The computer must convert these instructions that we will refer to as data into a language it understands. The machine language instructions are relayed via a medium from where the data is guided to access the X-Stream website. Various complex and simple processes take place during this data transmission and involves many devices (Shuler). The devices are called end devices or more correctly hosts; which are either the destinations or sources...
8 Pages(2000 words)Lab Report
Computer networks
...infrastructure is located at a remote site. Site to site ‘VPN’ will synchronize the network resources within sites, at the same time providing security in terms of data encryption. Remote access ‘VPN’ provide emulation of a workstation to a remote user. It can extend every application related to data, video or voice communication. Remote access ‘VPN’ can provide highly customizable and secure remote access to students anywhere anytime with any compatible device. They can access the network resources and data access with any compatible device. The remote access ‘VPN’ portrays a realistic user experience as the user access his own system. The access is more flexible and...
14 Pages(3500 words)Essay
Computer networks
...Interconnection (OSI) model. Likewise, network layer incorporates addressing information and control information that enables data packets to be routed within the computer network ("Internet Protocol Version 6." 255-255). Moreover, IP version 6 is also considered or called as the next generation IP, as specified by the IEFT: RFC 2460 ("Internet Protocol Version 6." 255-255). However, the primary reason for upgrading the IP version 4 to IP version 6 is address space limitations. Moreover, other issues such as performance, security and auto configuration are considered secondary (Loshin 305). Likewise, address space limitations are linked with the IP address space crisis...
14 Pages(3500 words)Essay
Computer Communications & Networks
...? [Computer Communication & Networks] Communication of home computer with the X stream In this report, we will discuss the communication of networks in each layer of the TCP/IP model. Likewise, we will also address the Open System Interconnection (OSI) model where relevant. Each layer will demonstrate the methods, processes and technologies that are associated with accessing the X stream server from a home computer. Moreover, in this scenario, we have assumed that the home computer is connected with an ADSL connection from an ISP with a Client premises equipment (CPE) named as ADSL router. What is a TCP/IP Model? Before discussing the...
7 Pages(1750 words)Lab Report
Computer Networks
...Computer Networks Introduction In order to have a network of computers working and serving the required purpose of data storage and retrieval, several computers need to be connected to each other in a specific format so as to have a network of computer. Specifically designed norms have be laid down in the form of layered architecture with the description of the devices used for connectivity at each and every layer in order for the system to work efficiently and without any difficulty. 1. CASE STUDY Local area networks are very essential to let the work going for any kind of organization, then may it be a...
9 Pages(2250 words)Essay
Computer networks
...that was received. This is the same situation that happens in a basic acknowledgement. In this mode, the acknowledgement specifies the SACK blocks and they are then conveyed through starting and ending sequence numbers. Question 2 In trying to locate a certain server on the internet, a computer communicates to a series of DNS servers around the internet. The process involves the domain resolver determining the most appropriate domain name through queries that start with the top level label of the domain. The process entails some steps as follows; - On sending the message after the composition, the email client connects to the domains SMTP server The senders email communicates SMTP with email address of the...
4 Pages(1000 words)Essay
Hardening Computer Networks
...HARDENING COMPUTER NETWORKS Hardening Computer Networks Affiliation Introduction At the present, the majority of organizations carry out their business activities using computers and when the number of computers increases they need to form a computer network. A computer network allows a number of employees to access and process data simultaneously. In view of the fact that a computer network is an essential part of almost every organization that processes data on a regular basis hence it becomes essential for them to...
5 Pages(1250 words)Essay
Computer Networks
Q4. This size of network design is because the network is suitable for a medium organization. This makes the size economical as a single router is capable of supporting several hosts (Tanenbaum, Andrew, 93). Communication in this size of a network is faster as the failure of one device does not affect the system. The system also makes it possible to use other connected devices such as printers. Q5. The TPC is the personification of a transmission channel that is very reliable. It is used in the end to end transmission purpose in the general internet architect. All the functionality of a network is required to take a sample of IP datagram release and major upon this control mode which helps in implementing flow control, reliability...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Research Paper on topic Security in Computer Networks for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us