Nobody downloaded yet

Computer Network Security Methods - Essay Example

Comments (0) Cite this document
The paper presents a detailed overview of network security issues with critical examination of mechanisms and tools that have been developed to provide protection to networks. The paper brings out the network vulnerabilities, describing the types of probable attacks followed by the counter measures that can be adopted to safeguard against these attacks…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Computer Network Security Methods
Read TextPreview

Extract of sample
"Computer Network Security Methods"

Download file to see previous pages The boom in information technology has revolutionized communications world wide. The exponential growth of the most popular public network, Internet, has made inter-communication fast and effective. The amount of data flow through e-mails, e-commerce etc has gained new peaks and is still growing. Business transactions on corporate networks, corporate data access facilities for mobile employees, e-banking and many other data access and electronic facilities have become the order of the day. Almost any function of sale, purchase, transfer or sharing of data, conduct of on line university examinations etc can be achieved at a click of a button.
The picture is not as rosy as it might appear. Though, networks have made life easier in a number of ways, but there are many underlying threats that can negate all the merits offered by the networking infrastructure. These security threats may cause damages to businesses, loss or destruction of sensitive data or network disability. Thus, there exists a need to provide adequate and sound protection to the networks, in order to safeguard information (data), services, users, applications and devices against disability, theft, modification or alteration or damage, thereby, ensuring the three fundamental tenets of security - integrity, confidentiality and availability of network and its associated applications and data. Even the legislation has realised the importance of network security and have implemented international laws against cyber crimes, more so because of the huge inflow of revenue from the networks.
The range of attacks on the networks includes unauthorised access to resources, denying the same to authorised users, modifying or stealing or destroying resources. Security of resources cannot be defined in general as the goals of security vary for different networks. Thus, while planning security of networks, a clear understanding of network vulnerabilities and the objective of security, assumes utmost importance.
In the subsequent paragraphs, it would be my endeavour to introduce different network vulnerabilities followed by methods for securing networks, highlighting their merits and demerits. Further, a brief discussion on evolving a security policy will be presented before concluding the paper.

Network Vulnerabilities
Before planning for security of a network, it is mandatory to view its vulnerabilities or risks that it can be exposed to. One more important point to note here is the decision on the assets that are required to be protected along with the extent of protection warranted. Generally, the assets that need protection are workstations or PCs (user hardware), network devices (hubs, routers, switches etc), servers, software (operating system and client programs), services (applications like FTP or mailing and IP services), and data (please note that the list is not exhaustive) (McCabe, James D., 361).
There can be a number of ways in which an attacker can launch attacks on the network. Here, we consider only the technical attacks that relate to tools and methods adopted for compromising security by means of software or hardware, and not ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 words”, n.d.)
Retrieved from https://studentshare.org/technology/1518410-computer-network-security-methods
(Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 Words)
“Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 Words”, n.d. https://studentshare.org/technology/1518410-computer-network-security-methods.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Attacking Cryptography Computer Security
The challenge with the data protection methods is that when two or more application programs are being executed concurrently, they share common resources such as the processor and the internal memory (Nedjah & Mourelle, 2005). As information shares the channels of transfer, there is a possibility of one program gaining access to the information in another program whether they have been encrypted or not (Yoshiura, 2006).
6 Pages(1500 words)Essay
Computer Security
He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran Tromer, 2008).
8 Pages(2000 words)Essay
Network Security
This essay mainly focuses on five parts, that are describing the topic of network security, such as introduction and terminology used, business continuity planning (BCP) analysis, disaster recovery planning analysis, social engineering and an acceptable use policy (AUP), that is an important policy defined for a network.
5 Pages(1250 words)Essay
Computer Network Security
From this paper, it is clear that network security appliances are implemented for providing three fundamental functions i.e. prevention, detection, and correction. Some of the most commonly adopted security appliances are Firewalls and Intrusion Detection Systems. Reports and surveys recorded by many organizations indicate a substantial rise.
5 Pages(1250 words)Case Study
Computer system Network Security
Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network
5 Pages(1250 words)Essay
Attack metholodgies ( network security )
mputer systems attackers and hackers were doing it for the fun of enjoying their prowess in managing to tamper and penetrate through established network security systems. However, the modern objective for computer systems and network security attacks has changed from that of fun
7 Pages(1750 words)Essay
Network security
The components include large flat panel televisions and surround sound systems of varying scale and complexity and huge range of peripheral devices that are with the system. As of now, the VAC has internal chain of supply, which is networked using
3 Pages(750 words)Essay
Network security
Additionally, interoperability with application performance monitoring solutions plays a major role. The security approach implemented
3 Pages(750 words)Essay
Network Security
In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security.
24 Pages(6000 words)Essay
Computer Security
As the severity of cyber threats become increasingly more sophisticated because of the alternating reasons behind hacking, so are the set strategies to aid in combating them. Current techniques to provide digital security are executed with a woefully inadequate strategy, considering a frighteningly short time horizon.
30 Pages(7500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Computer Network Security Methods for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us