• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks.

Extracts from this document...

Introduction

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks. A network can be defined as "A group of two or more computer systems linked together". The main reason for doing this is to enable any 2 or more computers to share each other's resources and thus this is a feature of all networks. Security in this context can be defined as "the act of protecting information (data files) from being access by unauthorised individuals or groups". There are three common types of network set up which are defined by there topology. Figure 1 illustrates the difference between Star, Bus and Ring networks which are used in network types as LAN, WAN, WLAN etc. A network runs on protocols, which define a common set of rules and signals that computers on the network use to communicate. A network can be isolated and independent such as a small home-area network (HAN) but once a network is connected to another network it can be defined as an Internet. Networks are frequently thought of as two different systems due to the fact that they can be access internally as well externally. Both methods give rise to different security issues and should be tackled differently by the network administration. Internal users in most cases are over looked as threats to security as they can cause malicious and unintentional damage to a network. Internal users have physical access to the network and there actions must be monitored closely. Physical security is vital and internal users should only be given access to parts of the network relevant to him / her. Rooms with important servers should be kept locked and only people with permission should be allowed to enter them. This measure may help to protect against sabotage by preventing physical harm to important components of the network such as servers and routers. ...read more.

Middle

Proxy servers differ from firewalls because they can control how internal users access the outside world also they can block all outside connections and only allows internal users to access the Internet. Proxy services run at the application level of the network as figure 3 illustrates. Proxy servers run on protocols such as HTTP, FTP, Telnet etc and thus must be updated when new protocol comes into existence. One key aspect of firewalls is that the software used to run them must always be updated as new holes in security are found by hackers and thus must be sealed. If a firewall is to be effective, monitoring and maintenance must be carried out on a regular basis. A denial of service (DoS) attack is an incident in which a user or organisation is deprived of the services or a resource they would normally expect to have. The network / server is flooded with a continuous stream of bogus requests such as a HTTP server constantly being asked for web pages. Usually a denial of service attack can sometimes happen accidentally such as to many users trying to view a popular website. Such an attack is a type of security breach to a computer system that does not normally result in the theft of information or other security loss however data can be lost. Attacks of this nature can cost the company a great deal of time and money as the service could be brought down for several hours. In terms of prevention there are only a few measures which can be taken to protect a network from a DoS. Checking to see if unauthorised / unknown changes have been made to the file system, registry, user account database, etc. This will ensure that if some area of the system has been changed firstly you know someone is interfering and secondly you can take the necessary steps to prevent access to the network in the future. ...read more.

Conclusion

In conclusion it is clear to see that there are many issues associated with network security and in order to fully protect a network nothing can be left to chance. If the topology of a network is studied it will reveal how the network is made up of many separate components, which work together to form the network. Every aspect of the network should be looked as part of a whole system. Whether this is actually achieved depends on a businesses network security policy. Every organisation, which has a network, must ensure that its network security policy is adequate to deal with the majority of risks posed by a network. When determining a network security policy an organisation must ask its self four key questions. Firstly all resources that need to be protected must be identified. Secondly identify which people need to protect the networks resources from. Thirdly how likely are these threats going to occur which can help determine what prevention methods should be put in it place. Lastly what measures would best protect the network while taking into account cost and time management. It is of up most importance for an organisation to have well defined network policy, which can help ensure that the safety of the network is not compromised. In summary networks are forever subject to internal and external change and with those changes come new dangerous to security. The best tool available to protect a network is extensive knowledge of ones own network and of the eternal environment in which the network operates. Figure 1: Different types of network topology The above diagram helps to show that there are many ways to set up a network therefore many ways in which networks can be protected. There is no one set way to protect any network. Figure 2: A firewall connected to a DMZ LAN Figure 3: Proxy / Firewall Figure 4: Distributed Denial of Service Attack. Please note the term computer is used loosely as it could be a server / network etc. Represent the flow of data (such as data packets) Figure 5: Start 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    Cyber terrorism can even be causing a person to be fearful of being harmed. Al Qaeda which is an international terrorist organisation which began in the late 1980?s has been on the internet from the late 1990?s. These Al Qaeda sites may only be on the web for a matter

  2. Organisation Security Issues

    If, however, you were caught selling songs or movies you could face a jail sentence as it is breaking the copyright legislation. Spanners 'R' us will be keen that it's marketing of its brand (including images, format and style of company documents) are kept in their own keeping and control.

  1. Illegal music downloads. This Essay will treat and analyze main points of advantages ...

    In other words, as it is well known, musicians get per cents from the sold music albums with their records, so in case of decreasing demand on their music albums, their profit also reduces. But since the music industry is treated like other businesses, as Geoff Taylor, the Chief Executive

  2. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    Two neighboring nodes that are in different peer groups are called border nodes. The Hello protocol is the first protocol to run once a link between two neighboring nodes is active. The Hello protocol operates on a per link basis.

  1. The Use of Big IP in Gamer.TV.

    This allows the System Administrators to go to the NOC where the servers and Cisco machines are and connect to their workstation under their desk and get vital information on particular parts of the NOC/servers without having to leave the NOC.

  2. Crime and crime prevention

    http://www.identity-theft.org.uk/ Phishing "Phishing" is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords. A fake website is created that is similar to that of a legitimate organisation, typically a financial institution such as a bank or insurance company.

  1. Free essay

    Reduce Damage to organisations

    disable right clicks on their website so no one can steal information and images from the website. Another way is to put copyright marks on the website as well as implementing the Hypertext Transfer Protocol Secure (HTTPS) A company can also implement a CCTV in the server from where all the crucial information is stored.

  2. Building Local Area Networks

    -Drawing 2 - Wireless signal patterns - Description of proposed hardware and cabling: Research into the optimum Wireless Access Point to allow this WLAN to operate efficiently brought a number of different products to my attention. Through careful consideration and a comparison of the main characteristics of each product, the most appropriate WAP to install is the NETGEAR WG602.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work