StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

A Critical Analysis of Computer Network Security Methods - Essay Example

Cite this document
Summary
The paper "A Critical Analysis of Computer Network Security Methods" tells us about information technology. The exponential growth of the most popular public network, the Internet, has made inter-communication fast and effective…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
A Critical Analysis of Computer Network Security Methods
Read Text Preview

Extract of sample "A Critical Analysis of Computer Network Security Methods"

Download file to see previous pages

Salient components of IPsec are AH (Authentication Header) and ESP (Encapsulating security payload). AH consists of next header information (8 bits), payload length information (8 bits), identification for security association (32 bits), sequence number (ordering sequence of datagrams, 32 bits), variable authentication data containing ICV ( Integrity check value) or MAC and reserved 16 bits for future expansion (Stallings, William, 494 and Forouzan, Behrouz A., 999). ESP contains SPI (Security parameters index) for security association, sequence number, variable payload data (segment or encrypted IP packet), padding for alignment and concealing actual payload length (0-255 bytes), pad length (8 bits), next header information (8 bits) and variable authentication data (integral of 32 bits) (Stallings, William, 498).

IPsec realizes its functions by operating in two different modes – Transport mode and Tunnel mode.In transport mode, protection is provided to the IP payload (TCP or UDP segment or an ICMP packet) between host to host connection that may be server-client or two workstations. ESP performs the function of encryption and authentication of IP payload (optional) (Stallings, William, 492). However, the IP header is not encrypted. AH authenticates the IP payload and the selected portions of the IP header.

Tunnel mode ensures the security of the complete IP packet. Once the AH and ESP fields are added to the IP packets, the whole packet is treated as a new payload of fresh header and packet (Stallings, William, 492). These packets are now encapsulated within another IP packet and addressed at the ends of the IPsec tunnel. At the end of the tunnel, the packets are unencapsulated and decrypted to get the original packet, which is then despatched to the destination (McCabe, James D., 368). The tunneling mode of IPsec is used in Virtual Private Networks (VPNs) for isolating and protecting information.

A secure socket layer (SSL) is a mechanism used as a security protocol on the net. The main functions of SSL include authentication of the party’s digital identity through RSA and encryption-decryption using RC-4 (McCabe, James D., 371). Encryption/decryption results in reduced network performance in terms of capacity and delay but provides security. TLS (Transport layer security) is the standard version of SSL and is compatible with SSL ver3.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 words”, n.d.)
Retrieved from https://studentshare.org/technology/1518410-computer-network-security-methods
(Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 Words)
https://studentshare.org/technology/1518410-computer-network-security-methods.
“Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 Words”, n.d. https://studentshare.org/technology/1518410-computer-network-security-methods.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Critical Analysis of Computer Network Security Methods

Cyber Security A Homeland Security Dilemma

This paper investigates how can the Department of Homeland security effectively secure cyberspace from cyber attack, viruses, worms and other forms of malware.... It will cause a serious disruption to the country's critical infrastructure including security of the nation and of the economy.... There goes the question whether the job of Homeland security Department is a dilemma or the department itself is a dilemma.... If the secretary of Homeland security says that the best way to be secured is to shun email instead of accepting that her department cannot provide security to cyberspace, then it is better to conclude that Homeland security is itself a dilemma....
9 Pages (2250 words) Research Paper

Sectors Targeted by Cyber Terrorism

In the United… Cyber terrorists have unlawfully invaded financial institution systems and caused losses to them. The security sector and the financial institutions The manufacturing sector has also been heavily targeted and attacked by cyber terrorists and criminals.... The sector has been at risk since it has not invested in cybercrime security procedures.... The transport sector and the critical infrastructure of the country are also top targets of cyber terrorists....
4 Pages (1000 words) Research Paper

Network Security

The value of security in a client/server network plays an inevitable role in protecting the data, as well as the ethical concerns of the parties involved thus, requiring the development of a comprehensive network security policy as reviewed in this context and with reference to ZXY Corporation.... In order to enhance secure access control over the network, the company can apply advanced authorization, as well as access control methodologies that would subsequently enhance network security....
8 Pages (2000 words) Essay

Methods Available for Maintaining Computer System Security

This separation can be achieved by involving three subproblems as a part of computer security i.... The paper "methods Available for Maintaining Computer System Security" states that the computer system has reached an invaluable stage.... Computer security can be achieved in different ways such as by using an anti-malware program, by using cryptography technique to encrypt the data, and also various other methods.... Therefore, computer security is a must in every field....
8 Pages (2000 words) Coursework

Virus Detection Software

A computer network, commonly known as a network, is a compilation of hardware apparatus and computers interconnected by channels of communication that have the same opinion to sharing of information and resources.... Virus detection software plays a critical role in enhancing the safety of computer systems.... etwork architecture denotes the design of the network, comprising of the software, hardware, communication protocols, connectivity and form of transmission, for example, wireless or wired....
12 Pages (3000 words) Research Paper

Network Security - Information Assurance

The paper "network security - Information Assurance" highlights that in general, the explosive growth of Information Technology and the amalgamation of IT with telecommunication have brought together the world much closer than any time before in history.... Information security could be defined as the protection of information and the associated systems against unauthorized access to or modification of information, whether in storage, processing, or transit and against the denial of service to authorized users, including those measures necessary to detect, document and counter such threats....
12 Pages (3000 words) Coursework

The Management of Information Systems with Regards to Securing Such Systems

From these unlawful access methods, the paper recommends information management strategies.... The security of data in information is becoming a more challenging issue to handle in organizations today.... This due to the changing face of computing that has led to advanced tools that can be used to breach such security.... Apart from this advancement in technology of breaching security, the internet also poses a considerable security threat and vulnerabilities....
9 Pages (2250 words) Coursework

Ways in Which Fault Tolerance Can Be Added to a Network and Reasons for Use, and Disadvantages of Improvements

nbsp;  A fault-tolerant computer network ensures the system is still utilizable after faults because it has the means to circumvent the manifestation and existence of faults.... A computer network fault is created by a hardware failure in either one of the components or a long range of components that make up the network.... A computer network is prone to a wide range of variables that can lead to its malfunctioning (Hanmer, 22-23).... All devices making up a computer network can fail at any point in the network's life making it necessary to create a tolerant mechanism to counteract such failures (Sorin, 15-25)....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us