This website uses cookies to ensure you have the best experience. Learn more

Network Security Essay

1846 words - 8 pages

A 5 page paper on network security with 5 references
Let us go back, twelve years. Where's Internet? Concentrated in the cables that connect the offices and cubicles of the American ministry of defense. Things were simple, and despite the sensitive nature of the data transferred no body talked about net work security, no body knew what was to follow. Some how a revolution was triggered, the information net burst out of its official mould, a chain reaction started and took the whole world over.
Today we live in parallel worlds. We might walk into a multimillion dollar corporate office, observe the firm in all its physical stature, meet those who represent it and when we will ...view middle of the document...

But as I said with electronic connections information seems to be floating in air. And the more information goes online, the more this information hangs in air, the more it becomes prone to theft.
So where are the guards and the protectors, here they are, and they are called Network security. As hacking has progressed and has been glamorized, so has Network security developed. First we must define what we are talking about. A lot of companies are now a days connected through internal information webs that are called Networks. These exist in different dimensions from the internet that we usually browse, since for most users there is no software access available to these webs, that means your browser can connect you to the Microsoft website but it will not connect you to the inter office Network which is used to transfer information from desk to desk electronically. And really there seems no reason why some one would like to drop in on that private electronic information sharing. However some of that information being transferred is very important and of such secretive nature that even only few of the employees are aware of it. Such expensive material becomes a major attraction for thieves and they develop ways to enter and retrieve this information. For instance Wal-Mart transfers the detail of daily sales to their head office electronically, if some hacker finds way to interrupt this, that would be the key to Kbytes upon Kbytes of credit card information, lottery! To avoid against this Wal-Mart needs to be protective about its internal network, this is called Network security.
But Network crime is not just theft or credit card hacking. Their are a number of motives ranging from, greed to professional jealousy. A lot of times the competition wants to know your trade secrets to put you out of business. Thomas Noonan, the president and CEO of Internet Security Systems (ISS) in Atlanta, Ga. Describes three fallacious myths that help to employ unsecured Network security protocols. First myth is that most of the security breachers are geeks who do it for the sake of some publicity or for the lust of power and its emphasis. In fact the biggest threat that Network security might face is from the inside. Sometimes the employees decide to make some quick money by selling information to anyone who is ready to pay for it, that might be the market competition and the theft takes place. At times greed does not play any part and Networks are interfered only for a demonstration of power or for vengeance. As he writes "The only way to ensure that a networked business is secure is to assume that it can be attacked anywhere, at any time, from any direction." [Noonan, Thomas, 1999]
The second myth according to him is that firewalls, data encryption, user Ids and passwords are protection enough. These things do serve as a "solid first line of defense", especially against immature intruders, but these are static protections which can't even verify their own validity...

Other Papers Like Network Security

Network Security Assessment Essay

3062 words - 13 pages  Network Security Assessment Prepared for: University of Maryland University College Prepared by: David Yurchak I. Vulnerability Assessments In the same way as other associations in the monetary administrations and different segments, agent merchants (firms) are the objective of digital assaults. The recurrence and complexity of these assaults are expanding, and individual intermediary merchants and the business, in

Network Security Administration Essay

823 words - 4 pages Unit 2. Assignment 1. Disk Redundancy Research 1. What does RAID stand for? RAID (originally redundant array of inexpensive disks, now commonly redundant array of independent disks) (unknown, 2015) 2. When would we use RAID? You would use RAID when you have a lot of important data that you are constantly changing and need to back up often. 3. Define the following types of RAID. a. RAID 0 RAID 0 consists of striping, without mirroring or Lab Cnaa

608 words - 3 pages Lab – Researching Network Security Threats Objectives Part 1: Explore the SANS Website Navigate to the SANS website and identify resources. Part 2: Identify Recent Network Security Threats Identify several recent network security threats using the SANS site. Identify sites beyond SANS that provide network security threat information. Part 3: Detail a Specific Network Security Threat Select and detail a specific recent network threat


269 words - 2 pages Ruben Quinones IT245 - Introduction to Network Management Colorado Technical University Online Professor: Dr. Shawn P. Murray Phase 1 Individual Project Due January 13, 2013 Table of Contents Section 1: Target Organization - Identifying the Network 3 Section 2: Diagramming the Network - Network Architecture 4 Section 3: Network Models 5 Section 4: Network Protocols and Agents 6 Section 5: Network Security 7 Section 6: Network


874 words - 4 pages Essay Designing a Security Strategy Geo-Probe Inc. (GPI) 20 years in business, a company with constant growth and success. GPI provides construction management, engineering design, programming and environmental planning, and other A-E projects in support of a, industry, different government and commercial clients. GPI has 300 employees and ten branch office locations. GPI has many computers and network device attach to their network like any

Computer Security In Education

330 words - 2 pages Maintaining internet security is of the utmost importance to higher education systems. The majority of universities’ administrative, financial, and clinical systems are available through a campus-wide network (Rasmussen, 2011). This means that highly confidential documents, such as student’s personal information, medical records, and much more are housed on campus servers. This information is vulnerable to security threats and puts the

Week 7 Project Paper

3453 words - 14 pages American Military University All about Network Security: Network Security Means Never Giving an Adversary a Chance. Anthony Portz 4199864 ISSC340 I001 SPR 14 Professor Alidad Jalinous June 16th, 2014 11:55 PM Introduction In this paper I will discuss network security and I will give a detailed description of the area while discussing different technologies that are involved. There are many ways to provide network security and a

Conduct a Network Traffic Analysis & Baseline Definition

606 words - 3 pages tools and protocol analyzers as an information systems security professional? Protocol capture tools and protocol analyzers are important tools for an information systems security professional. These utilities can be used to troubleshoot issues on the network. They can verify adherence to corporate policies, such as whether or not clear text privacy data is being sent on the network. They can be used to test security countermeasures and firewall

Ethical Hacking

1144 words - 5 pages reports findings, does not solve problems  Security test  More than an attempt to break in; also includes analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the network Hands-On Ethical Hacking and Network Defense 3  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data

Face Detetction

1038 words - 5 pages scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of security as * There is a lack of security * The links in the network are not reliable * The system is not centralized, making the network administration difficult. * Network security has to be applied to individual computers on the network * Lack of centralized server to

Network Design

863 words - 4 pages location information for the devices. Provide a comprehensive list of devices including the quantity of each device needed. Justification Justify your determination that the selected network devices will meet the business needs. D. Network Security Devices Business Needs Assess the business needs. Proposed Network Security Devices Select network security devices to use to secure the network. Include setup and location information for

Related Essays

Network Security Essay

966 words - 4 pages Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. • Explain the difference between historical and statistical logging. Logging is a simple way of keeping a

Network Security Essay

586 words - 3 pages Nasario Birrueta IT 200: Milestone Three Network Security Network security is one of the most important aspects of implementing a fully functional working network, downtime caused by poor network security can cause major economic loses. The two matters that need to be addressed is the User and Physical equipment. Network security begins with the user. As such would implement a Network Use policy that the employee must sign and

Network Security Essay

1817 words - 8 pages data between networks, and serving as a router when routing data to individual systems. Brouter functions as a filter that allows some data into the local network and redirects unknown data to the other network. 2) Enhance security using NAC/NAP methodologies Network access control (NAC) products entered the market a few years ago to fill this gap. A typical NAC solution provides an endpoint assessment of the computer and then enables access

Network Security And Management Essay

3952 words - 16 pages Network Security and Management Brandi Schoch CTU Online Introduction to Network Management IT245-1403A-09 Jennifer Gaddy August 11, 2014 Table of Contents Table of Contents 2 Identifying the Network 3 The Organization 3 Network Servers 3 Network Personnel 3 Diagramming the Network 5 Network Architecture 5 Speed and Distance 6 Access Method 6 Network Models 8 OSI Model 8 FCAPS Model 11 The Diagrams 13