A 5 page paper on network security with 5 references
Let us go back, twelve years. Where's Internet? Concentrated in the cables that connect the offices and cubicles of the American ministry of defense. Things were simple, and despite the sensitive nature of the data transferred no body talked about net work security, no body knew what was to follow. Some how a revolution was triggered, the information net burst out of its official mould, a chain reaction started and took the whole world over.
Today we live in parallel worlds. We might walk into a multimillion dollar corporate office, observe the firm in all its physical stature, meet those who represent it and when we will ...view middle of the document...
But as I said with electronic connections information seems to be floating in air. And the more information goes online, the more this information hangs in air, the more it becomes prone to theft.
So where are the guards and the protectors, here they are, and they are called Network security. As hacking has progressed and has been glamorized, so has Network security developed. First we must define what we are talking about. A lot of companies are now a days connected through internal information webs that are called Networks. These exist in different dimensions from the internet that we usually browse, since for most users there is no software access available to these webs, that means your browser can connect you to the Microsoft website but it will not connect you to the inter office Network which is used to transfer information from desk to desk electronically. And really there seems no reason why some one would like to drop in on that private electronic information sharing. However some of that information being transferred is very important and of such secretive nature that even only few of the employees are aware of it. Such expensive material becomes a major attraction for thieves and they develop ways to enter and retrieve this information. For instance Wal-Mart transfers the detail of daily sales to their head office electronically, if some hacker finds way to interrupt this, that would be the key to Kbytes upon Kbytes of credit card information, lottery! To avoid against this Wal-Mart needs to be protective about its internal network, this is called Network security.
But Network crime is not just theft or credit card hacking. Their are a number of motives ranging from, greed to professional jealousy. A lot of times the competition wants to know your trade secrets to put you out of business. Thomas Noonan, the president and CEO of Internet Security Systems (ISS) in Atlanta, Ga. Describes three fallacious myths that help to employ unsecured Network security protocols. First myth is that most of the security breachers are geeks who do it for the sake of some publicity or for the lust of power and its emphasis. In fact the biggest threat that Network security might face is from the inside. Sometimes the employees decide to make some quick money by selling information to anyone who is ready to pay for it, that might be the market competition and the theft takes place. At times greed does not play any part and Networks are interfered only for a demonstration of power or for vengeance. As he writes "The only way to ensure that a networked business is secure is to assume that it can be attacked anywhere, at any time, from any direction." [Noonan, Thomas, 1999]
The second myth according to him is that firewalls, data encryption, user Ids and passwords are protection enough. These things do serve as a "solid first line of defense", especially against immature intruders, but these are static protections which can't even verify their own validity...