This website uses cookies to ensure you have the best experience. Learn more

Networking And Security Issues Essay

5170 words - 21 pages

IT for Decision Makers


Handout 1 Overview


Many organizations have invested vast amount of money in computer networks, only to find out that although it is providing means of improving the efficiency and productivity of the organization but it also exposes the Organization to possible attacks and threats. Such attacks have been the most challenging issue for most network administrators and a worrying topic for administrators.

Organizations need to share services resources and information but they still need to protect these from people who should not have access to them, while at the same time making those resources available to ...view middle of the document...

A similar network on a larger scale is sometimes referred to as a WAN (Wide Area Network), or in some cases more specifically, a MAN (Metropolitan Area Network) if it is confined to a single metropolitan area.

The term LAN is most often used to refer to networks created out of a certain class of networking equipment which is tailored to communication over a short distance. This is in contrast to networks, which happen to span short distances, yet are constructed using "WAN" equipment (i.e., equipment capable of transmitting long distances). LAN-style networking equipment typically transmits data at a higher rate than WAN-style equipment: the equipment's design takes advantage of the short distance to supply a high transmission-rate at a relatively low cost.

If you are familiar with network access using a modem and ordinary telephone line, note that both LAN and WAN equipment typically offers faster data transfer than even the fastest ordinary modem/phone-line access, LAN transfers being on the order of a million times faster. This means graphics that are loaded through the network can be displayed significantly faster, and that there are things that it is practical to do on a LAN that you would never do with a modem: for example, you might set up your computer to load your word processing application through the LAN rather than from hard disk; the time you have to wait while it loads would be similar (a few seconds) in either case. In contrast, loading such an application through a modem would require minutes or hours.

A typical use of a LAN is to tie together personal computers in an office in such a way that they can all use a single printer and a file server (briefly, a file server is a computer set up so that other computers can access its hard disk as if it were their own). LANs are also used to transmit e-mail between personal computers in an office, or to attach all the personal computers in the office to a WAN or to the Internet.

There is some variation in the way the term LAN is used:
It is used to refer to a file server and printer, and often the personal computers that are tied to them. People refer to saving their files on the LAN, or on the PC LAN.
It is used more specifically to refer to the data communications wiring and equipment that ties the personal computers to the file server and the printer.

One of the terms associated with most Networks is Ethernet, the most common type in use today. Ethernet is an example of what is called a LAN technology, or in the more specific sense of the word LAN, one of several types of LANs. Some other types of LANs are Token Ring, FDDI, and Fast Ethernet.

What is the Internet?

The Internet is the world's largest network of networks . When you want to access the resources offered by the Internet, you don't really connect to the Internet; you connect to a network that is eventually connected to the Internet backbone, a network of extremely fast (and incredibly...

Other Papers Like Networking and Security Issues

Video Conferencing And Security Issues Essay

1385 words - 6 pages . Unfortunately every kind of messaging technology is or will be subject to security exploits by those who wish to gain access to private information. Even though it is costlier to have face to face meetings when those meeting must fly across the country it is often safer because conferences can take place behind closed doors and the participants can be fairly certain of who is receiving the information. "Security professionals know that contrary

Social Media Essay

921 words - 4 pages per month and Twitter has 190 million tweets per day. These facts show just how much society is communicating through social networking sites. News spreads faster through these sites but can also give false information just as fast. There are problems that have become a social issue such as cyberbullying and security attacks. “49.5% of students reported being the victims of bullying online and 33.7% reported committing bullying behavior online

Two Sides of Social Networking

1532 words - 7 pages . It allows students who have not taken the exams or the homework to see the posted question from online websites and knowing the answers beforehand (2). Many problems such as identity theft are also vulnerable by social networking websites. Computer hackers and Identity thieves take information like Birth dates, School names, Pets name and much more private information to make a fake account and answer the basic security question which leads to

Information Technology

1298 words - 6 pages is a period, is a decent speculation for your business to make introduction and impact. In spite of the fact that there are a few issues in the realm of online networking in the first run through, however its points of interest are gigantic. Online networking can put more consideration on your business, in order to give you an increment in the vicinity of the system, build the stream of the webpage. More than that online networking no

Itt 255 Lab 6

3922 words - 16 pages ITT Technical Institute NT2580 Introduction to Information Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1330 Client-Server Networking II or equivalent, NT1430 Linux Networking or equivalent Course Description: This course provides an overview of security challenges and strategies of counter measures in the

Operating Systems and Network Administration Course

1790 words - 8 pages , ... installation and configuration of multiuser operating systems." IS '97.6 Networks and Telecommunication: "in-depth knowledge of data communications and networking requirements... Students learn to evaluate, select, and implement different communication options within an organization... architectures, topologies and protocols; installation and operation of [network devices], ... network performance analysis; privacy, security

Network Consultation for Designit

530 words - 3 pages . ◾Describe security policy, practices, encryption techniques, and design considerations in support of business operations in a networked environment. ◾Explain the role of integrity and availability in a networked environment. ◾Use technology and information resources to research issues in computing networks. ◾Write clearly and concisely about introductory networking topics using proper writing mechanics and technical style conventions

Wireless Technology and Convergence

3742 words - 15 pages Wireless Technology and Convergence NETW-471/Advanced Topics in Networking Ronald Webb Online Fall 2008 Session B Jason Strickland February 8, 2009 Table of Contents Introduction to Wireless 2 Overview of the IEEE 802.11 Standard 3 Wireless Technologies 3 IEEE 802.11 3 HiperLAN 4 HomeRF SWAP 5 Bluetooth 6 Advantages and Disadvantages of Wireless 7 Security 10 The Hacking Threat 10 WLAN Security 11

A Hierarchical Frameworkmodel of Mobile Security

3701 words - 15 pages as a hierarchical model in which mobile security research is partitioned into three different layers, including Property Theory, Limited Targets, and Classified Applications. Key research topics in each layer are discussed respectively in detail. In the Property Theory layer, some basic topics related to security are provided. Then, security issues in networks, computing, and multimedia processing are fused together in the Limited Targets

Unix Vs. Windows Server

2110 words - 9 pages Microsoft, its compatibility for Windows based networking makes TCP/IP the industry standard and number one choice for computing environments. Unix has a strong TCP/IP backbone but, connecting a Unix computer to the internet is a task that can be quite cumbersome. There are some issues with security because the manner in which Unix handles TCP/IP opens some holes when connected to the internet. One of the primary issues in dealing with security

Dns Server

1474 words - 6 pages of the branch offices have encountered issues with malware recently. Richman hosts an intranet for employees to access information about the company and to enroll in company benefits programs. Richman also hosts an extranet for its business partners. Due to many recent technology and process improvements within Richman, the corporate security policy is out of date, and each branch office policy differs. Tasks You are a networking

Related Essays

Challenges And Security Issues Essay

1245 words - 5 pages Unit 5 IP – Challenges and Security Issues American InterContinental University Abstract In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. After the review of each case study, a set of questions will be answered to provide details on each study as to what was

Handling Security And Ethical Issues Essay

1677 words - 7 pages Handling Security and Ethical Issues at TBWI Course: IT560-01 Handling Security and Ethical Issues at TBWI A growing concern, especially with the recent information leak at Target, is the issue of security. Outlined are security concerns for TBWI and how best to handle them. In addition to handling security issues, there may be complicated ethical issues that may occur. To best handle these situations, those

Security, Confidentiality And International Issues In Real Estate

2733 words - 11 pages database. When dealing with real estate there are also legal and regulatory issues to deal with when dealing with the public in person and over the internet. This paper is going to look at security, confidentiality and international issues with real estate in the e-business atmosphere.LegalAny real estate company is aware of the seriousness of this industry, since it deals with many laws that effect people greatly in their personal lives. Law

Security Issues And Solutions In E Commerce Applications

2185 words - 9 pages Security Issues and Solutions in Ecommerce Applications The rise in popularity of conducting business online via ecommerce sites has not gone unnoticed by hackers and other cyber-criminals. A rise in the number of transactions and an increase in businesses that have an online presence have provided hackers with increased opportunities to exploit security vulnerabilities in ecommerce applications for personal profit, at the expense of