• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks.

Extracts from this document...


Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks. A network can be defined as "A group of two or more computer systems linked together". The main reason for doing this is to enable any 2 or more computers to share each other's resources and thus this is a feature of all networks. Security in this context can be defined as "the act of protecting information (data files) from being access by unauthorised individuals or groups". There are three common types of network set up which are defined by there topology. Figure 1 illustrates the difference between Star, Bus and Ring networks which are used in network types as LAN, WAN, WLAN etc. A network runs on protocols, which define a common set of rules and signals that computers on the network use to communicate. A network can be isolated and independent such as a small home-area network (HAN) but once a network is connected to another network it can be defined as an Internet. Networks are frequently thought of as two different systems due to the fact that they can be access internally as well externally. Both methods give rise to different security issues and should be tackled differently by the network administration. Internal users in most cases are over looked as threats to security as they can cause malicious and unintentional damage to a network. Internal users have physical access to the network and there actions must be monitored closely. Physical security is vital and internal users should only be given access to parts of the network relevant to him / her. Rooms with important servers should be kept locked and only people with permission should be allowed to enter them. This measure may help to protect against sabotage by preventing physical harm to important components of the network such as servers and routers. ...read more.


Proxy servers differ from firewalls because they can control how internal users access the outside world also they can block all outside connections and only allows internal users to access the Internet. Proxy services run at the application level of the network as figure 3 illustrates. Proxy servers run on protocols such as HTTP, FTP, Telnet etc and thus must be updated when new protocol comes into existence. One key aspect of firewalls is that the software used to run them must always be updated as new holes in security are found by hackers and thus must be sealed. If a firewall is to be effective, monitoring and maintenance must be carried out on a regular basis. A denial of service (DoS) attack is an incident in which a user or organisation is deprived of the services or a resource they would normally expect to have. The network / server is flooded with a continuous stream of bogus requests such as a HTTP server constantly being asked for web pages. Usually a denial of service attack can sometimes happen accidentally such as to many users trying to view a popular website. Such an attack is a type of security breach to a computer system that does not normally result in the theft of information or other security loss however data can be lost. Attacks of this nature can cost the company a great deal of time and money as the service could be brought down for several hours. In terms of prevention there are only a few measures which can be taken to protect a network from a DoS. Checking to see if unauthorised / unknown changes have been made to the file system, registry, user account database, etc. This will ensure that if some area of the system has been changed firstly you know someone is interfering and secondly you can take the necessary steps to prevent access to the network in the future. ...read more.


In conclusion it is clear to see that there are many issues associated with network security and in order to fully protect a network nothing can be left to chance. If the topology of a network is studied it will reveal how the network is made up of many separate components, which work together to form the network. Every aspect of the network should be looked as part of a whole system. Whether this is actually achieved depends on a businesses network security policy. Every organisation, which has a network, must ensure that its network security policy is adequate to deal with the majority of risks posed by a network. When determining a network security policy an organisation must ask its self four key questions. Firstly all resources that need to be protected must be identified. Secondly identify which people need to protect the networks resources from. Thirdly how likely are these threats going to occur which can help determine what prevention methods should be put in it place. Lastly what measures would best protect the network while taking into account cost and time management. It is of up most importance for an organisation to have well defined network policy, which can help ensure that the safety of the network is not compromised. In summary networks are forever subject to internal and external change and with those changes come new dangerous to security. The best tool available to protect a network is extensive knowledge of ones own network and of the eternal environment in which the network operates. Figure 1: Different types of network topology The above diagram helps to show that there are many ways to set up a network therefore many ways in which networks can be protected. There is no one set way to protect any network. Figure 2: A firewall connected to a DMZ LAN Figure 3: Proxy / Firewall Figure 4: Distributed Denial of Service Attack. Please note the term computer is used loosely as it could be a server / network etc. Represent the flow of data (such as data packets) Figure 5: Start 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    Cyber terrorism can even be causing a person to be fearful of being harmed. Al Qaeda which is an international terrorist organisation which began in the late 1980?s has been on the internet from the late 1990?s. These Al Qaeda sites may only be on the web for a matter

  2. Illegal music downloads. This Essay will treat and analyze main points of advantages ...

    In other words, as it is well known, musicians get per cents from the sold music albums with their records, so in case of decreasing demand on their music albums, their profit also reduces. But since the music industry is treated like other businesses, as Geoff Taylor, the Chief Executive

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Network failure Now for a large organisation such as Teign and Tow, a network failure could have catastrophic consequences. If this was to occur then the systems wouldn't allow workers to log on or to file share. Networks are such useful tools, in which you are allowed to use the internet, intranet and e-mail, video conferencing and accessing online reports.

  2. Crime and crime prevention

    http://www.identity-theft.org.uk/ Phishing "Phishing" is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords. A fake website is created that is similar to that of a legitimate organisation, typically a financial institution such as a bank or insurance company.

  1. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    He was jailed for 18 months when he admitted five charges of gaining unauthorized access to computers, five of making unauthorized modifications to them and one of inciting others to spread the viruses. [Lexis Nexis 2009] As we all know that computer crime is a global issue, any kind of

  2. Give an overview of computer networks, describing some of the different kinds of network

    has argued that the layout of the network cabling is called its topology. There are three main layouts which are Bus, Star and Ring, although it is possible to have a network which is a combination of any of the described topologies.

  1. T1, T3, and SONET Networks.

    A LATA can include part or all of one state. The transmission between LATAs is done by long-distance or interexchange carriers even if both LATAs are part of the same local exchange carrier�s serving area, so a T1 circuit may involve more than the local exchange carrier.

  2. Designing Switched LAN Internetworks.

    Each switch port provides a dedicated, 10MB Ethernet segment, or dedicated 4/16MB Token Ring segment. Segments are interconnected by internetworking devices that enable communication between LANs while blocking other types of traffic. Switches have the intelligence to monitor traffic and compile address tables, which then allows them to forward packets directly to specific ports in the LAN.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work