We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Vulnerabilities of Networks and Internet - Essay Example

Comments (0)
Summary
The paper presents a clear view of the issues involving computer network and its security. It tackles the basic networking structure and principle and the vulnerabilities behind it. The good practice of info- security in the preservation of data and its role in effective network management.
Download full paper
GRAB THE BEST PAPER
Vulnerabilities of Networks and Internet
Read TextPreview

Extract of sample
Vulnerabilities of Networks and Internet

Download file to see previous pages... The various networking security strategies are discussed along with alternatives.
Computers unquestionably make a large part of human movement faster, safer, and more appealing. They generate new modes of work and play. They continually spawn new ideas and offer many social benefits, yet at the same time they present increased opportunities for social harm. Public say that the information revolution can be compared to the industrial revolution, it is equally valuable as the coming of print media and perhaps even more significant.
The dependence of the businesses, industries and economies in networking and the internet grew in quality decision making and implementation. The age information technology like any other development in our society brings good and evil. While our economy and businesses prosper through IT and other automation, high-tech crimes are also growing in numbers and sophistication. Prevention plays an important role in network security
Information security or info-security main goal is to keep information on a network safe and secured. The other elements of info-security are divided into three important parts that serve as the foundation for all information security effort. These are confidentiality, integrity, and availability1 (CIA).
The first goal is confidentiality; this is where data are being protected from unauthorized eyes or individuals. These data can be all information vital to the success of the company or may contribute to its downfall. Engineering plans for instance, financial information, business or marketing plans, and whatever secret data stored in a computer2.

Integrity

The second but equally important in the preservation of data is integrity.
Integrity helps to ensure that original information or data remains unchanged and properly synchronized transversely in the system. This means that even people who are authorized within the system cannot change anything without proper consent or approval. A bank teller for instance is authorized to make changes in an account but they are not authorized to debit another persons account


Availability

Availability ensures that information saved is available to authorized users and can get access to it whenever necessary. Valid and secured information is nothing if you cannot get to it. This means information is just being kept from the bad guys while its often available to the right people.


1. Howlett, Tony, 2005, "Open Source Security Tools",
Practical Applications for Security, pages 4-12. Prentice Hall, ISBN 0-321-19443-8

2. Kent Stephen, Millett Lynette, 2003 "Who Goes There: Authentication Through the Lens of Privacy ", National Academic Press, Washington D.C.

1. Business Risk - Information Security Standpoint

Computer Crimes

Computer related crimes affect every computer user in businesses and homes3. The FBI in the United States recorded over 90% of U.S. companies are victim ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Computer networks
For this reason, it was designed in a simplest and lightest form. However, after global adoption of IP version 4 throughout the world, it motivated researchers to review and redesign it. IP version 6 is a new or updated version of the previous version i.e.
14 Pages(3500 words)Essay
Cyber Security Vulnerabilities
NO matter how advanced the security controls are, still incidents and security breaches are on the rise. There are numerous cases where IT managers have failed to provide or define adequate security for enterprise wide infrastructure of an organization. Likewise, they emphasize more or external security threats rather than internal vulnerabilities.
14 Pages(3500 words)Essay
Anonymity and Networks Essay
Three types of Internet anonymity include full anonymity and pseudonymity. Many internet anonymity systems have some flaws which allow eavesdroppers to access personal information. Internet anonymity is offered through anonymous servers and anonymous internet users.
9 Pages(2250 words)Essay
Two Vulnerabilities That Have Been Discovered in the Past Two Years (BlackBerry, Cisco IOS Software)
The term ‘vulnerability’ can be referred as one of the rising issues in the computer security system. Vulnerability can be considered as a weakness which occurs due to the intersection of a system or threat through physically or by the network and it reduces the system’s capability of its information assurance.
6 Pages(1500 words)Essay
Vulnerabilities of Organizational Networks and Internets
The advancement in the field of computer programming, networks and internet have raised concerns about the risks associated with the IT security, vulnerability to viruses and misuse of its various functions and programs. Vulnerability can be described as the weakness or the inadequate IT security which results in an unauthorized access to the data causing harm to the information and the system per se.
4 Pages(1000 words)Coursework
Internet security
The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be embraced even from unlikely quarters with government adopting concepts such e-governance.
8 Pages(2000 words)Essay
The connection between Networks and the Internet
e brought the world nearer, making lengthy remoteness shorter, permitting us to move to distant places faster and almost putting the entire globe at the palm. (LaQuey 34). In a technology framework, a network can be described as interconnection of digital machines capable of
2 Pages(500 words)Essay
Password Management Protocol vulnerabilities
However, hackers can find them and steal using some software. There are many, even in the Internet, software which can help even amateurs in this business to steal passwords. We will through the usage of one application that can show and copy passwords saved in the browser.
2 Pages(500 words)Essay
Common Software Vulnerabilities', Database Security, and Attacks on Networks discussion
For this reason, it could easily spread to the entire internet. Most of the UNIX computers uses Bash as the main software controlling its command prompt which could lead the bug to
3 Pages(750 words)Essay
Vulnerabilities in Microsoft Windows Server, IAAS
Microsoft has developed wide array of servers over the years. Each of these servers has witnessed some form of vulnerability. The file sharing permission is a common form of vulnerability which Windows Server has been exposed to and it has resulted into multiple opportunities for hackers. Microsoft had restricted support to Windows Server 2003.
10 Pages(2500 words)Essay
Let us find you another Essay on topic Vulnerabilities of Networks and Internet for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us