Nobody downloaded yet

Computer Network Security Methods - Essay Example

Comments (0) Cite this document
The paper presents a detailed overview of network security issues with critical examination of mechanisms and tools that have been developed to provide protection to networks. The paper brings out the network vulnerabilities, describing the types of probable attacks followed by the counter measures that can be adopted to safeguard against these attacks…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Computer Network Security Methods
Read TextPreview

Extract of sample "Computer Network Security Methods"

Download file to see previous pages The boom in information technology has revolutionized communications world wide. The exponential growth of the most popular public network, Internet, has made inter-communication fast and effective. The amount of data flow through e-mails, e-commerce etc has gained new peaks and is still growing. Business transactions on corporate networks, corporate data access facilities for mobile employees, e-banking and many other data access and electronic facilities have become the order of the day. Almost any function of sale, purchase, transfer or sharing of data, conduct of on line university examinations etc can be achieved at a click of a button.
The picture is not as rosy as it might appear. Though, networks have made life easier in a number of ways, but there are many underlying threats that can negate all the merits offered by the networking infrastructure. These security threats may cause damages to businesses, loss or destruction of sensitive data or network disability. Thus, there exists a need to provide adequate and sound protection to the networks, in order to safeguard information (data), services, users, applications and devices against disability, theft, modification or alteration or damage, thereby, ensuring the three fundamental tenets of security - integrity, confidentiality and availability of network and its associated applications and data. Even the legislation has realised the importance of network security and have implemented international laws against cyber crimes, more so because of the huge inflow of revenue from the networks.
The range of attacks on the networks includes unauthorised access to resources, denying the same to authorised users, modifying or stealing or destroying resources. Security of resources cannot be defined in general as the goals of security vary for different networks. Thus, while planning security of networks, a clear understanding of network vulnerabilities and the objective of security, assumes utmost importance.
In the subsequent paragraphs, it would be my endeavour to introduce different network vulnerabilities followed by methods for securing networks, highlighting their merits and demerits. Further, a brief discussion on evolving a security policy will be presented before concluding the paper.

Network Vulnerabilities
Before planning for security of a network, it is mandatory to view its vulnerabilities or risks that it can be exposed to. One more important point to note here is the decision on the assets that are required to be protected along with the extent of protection warranted. Generally, the assets that need protection are workstations or PCs (user hardware), network devices (hubs, routers, switches etc), servers, software (operating system and client programs), services (applications like FTP or mailing and IP services), and data (please note that the list is not exhaustive) (McCabe, James D., 361).
There can be a number of ways in which an attacker can launch attacks on the network. Here, we consider only the technical attacks that relate to tools and methods adopted for compromising security by means of software or hardware, and not ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 words”, n.d.)
Retrieved from
(Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 Words)
“Computer Network Security Methods Essay Example | Topics and Well Written Essays - 6000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Network Security Methods

Network Security

..., the development of software, tools and methods to assist law enforcement for combating with cyber security and cyber-attacks. Giving the opportunities to peek in complex systems and sharing amazing scientific discoveries via scientific experience and crafty visualisations. Provides opportunities to scientist and engineers utilizing previous computational techniques and tools. NCSA researchers are using FLAIM in their research. They have anonymised network data to share it with the researchers who are part of AT&T research. FLAIM provides prospects for researchers to test collaboratively, intrusion detection systems. Furthermore, FLAIM provides opportunities for other...
24 Pages(6000 words)Essay

Computer Network Security

...Computer Network Security 1 Introduction & Overview Network security is continuously evolving and becoming a challenging aspect for organizations maintaining highly sensitive and customer data. New technologies derive benefits as well as new risks that are not limited to logical threats, physical and human threats. Reports and surveys recorded by many organizations indicate a substantial rise in terms of security breaches year by year. Moreover, there are several reported cases in the year 2012 that are associated with information security breaches. Resultantly, organizations suffer massive revenue, reputation and...
5 Pages(1250 words)Case Study

Computer Network Security

...Computer Network Security For minimize risks and vulnerabilities from the organization; certification for an information security standard is a key aspect that addresses design, deployment and operational processes. Certification process takes a lot of time and addresses systems that are considered as high availability systems. Likewise, it also addresses patch management issues that frequently updates security patches on systems. There is no way of completely securing a network, system and applications. However, periodic penetration testing and code reviews are conducted by security professionals and consultants for exploiting vulnerabilities and security flaws within an application and computer network. It is now considered... to provide...
4 Pages(1000 words)Essay


...organization apart from wireless network and data transmission, storage, modification, monitoring and protection. All the other departments of Organization will be facilitated by their respective support functions. 3.1.11. In case of non-compliance, information security management must consider business justifications and allow waivers accordingly. 3.2. Acceptable Use Requirements Any vulnerability detected in the Organization computer security must be reported to the adequate security staff. Vulnerabilities in computer systems are detected by unknown software or abnormal system behavior that may lead to accidental invasion of...
10 Pages(2500 words)Assignment

Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break... into...
5 Pages(1250 words)Essay

Taha Computer Network Security Services

...Taha Computer Network Security Services Executive Summary This is a business plan for a computer network security company known as Taha. The plan gives a description of the business, the services offered, the company’s competitive advantage, mission, business goals, management, marketing plan, and financial plan. Business Description Taha Computer security services business is a new organization that will offer computer security services to its clients since the world is in the midst of a global technological revolution, which will bring change in all proportions of the...
3 Pages(750 words)Essay

Computer Network

...infrastructure of WLA Company hinders the development of the company. This is due to the fact that the infrastructure is insufficient, the data stored is not secure i.e. can easily be compromised by unauthorized person and above all, the data backup plan is not efficient as the mode of backup is prone to disasters such as earth quakes and floods in the location of the company. Moreover, there is no documentation for the current IT infrastructure. There is no documentation explaining the network setup in the company. Also, the software and the hardware are outdated. Considering that the computers are still running windows XP, it implies that the OS may not support the current versions of...
5 Pages(1250 words)Essay

Computer Network

... A wireless protocol transmits over a channel 20 MHz wide over a noiseless channel. How many bits/sec can be sent if 64 level digital signals are used? Channel bandwidth = 20 MHz = 20 * 106 Using the Nyquist theorem; C = 2Blog2M C = 2 * 20 *106 * log 264 =240Mbps 2) If a binary signal is sent over a 20 3KHz MHz channel whose signal-to-noise ratio is 40 20 dB, what is the maximum achievable data rate? We know that 10log10S/N = 40dB It follows that S/N = 100 Now from the Shannon theorem; The maximum number of bits per second = H* log2 (1 + S/N) = 20KHz * log2(1+100) Log2(101)= 6,658 = 20 * 6658 =133160 Now from the Nyquist theorem; The maximum number of bits per second = 2 * H * log2V = 2 * 20 * log22 =40 The Nyquist theorem gives...
1 Pages(250 words)Essay

Computer Network

...and solutions. Vehicular Communications, 1(1), 13–21. Figueiredo, J. De. (2006). E-Rulemaking: Bringing Data to Theory at the Federal Communications Commission. Duke Law Journal, 55, 969–993. Retrieved from Lee, J., Yi, Y., Chong, S., & Jin, Y. (2014). Economics of WiFi offloading: Trading delay for cellular capacity. IEEE Transactions on Wireless Communications, 13(3), 1540–1554. Niyato, D., & Hossain, E. (2007). Wireless broadband access: WiMax and beyond - Integration of WiMAX and WiFi: Optimal pricing for bandwidth sharing. IEEE Communications Magazine, 45(5), 140–146....
3 Pages(750 words)Essay

Computer network

.... Computer networks that individuals experience in the era of 2015 came into existence during the period of 1940 when an individual named George Stibitz transferred information and data from a machine called Teletype machine to a calculator and then utilized the same method to send information from the calculator to the machine (Casey, 2011, p.608). This activity is the base of the computer networks that the society in the 21st century enjoys. During the period of 1950s the first and the foremost computer network was experienced in the shape of a radar system that was utilized by the armed forces and this radar system was...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Network Security Methods for FREE!

Contact Us