• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18

Network Security

Extracts from this document...

Introduction

TABLE OF CONTENTS INTRODUCTION 1 WHAT IS NETWORK? 2 CLASSIFICATION OF NETWORKS 3 TYPES OF NETWORKS USED IN BUSINESS ORGANIZATIONS 3 Peer-to-Peer Networks 3 Client/Server Networks 3 Thin-Client Computing 4 NEED OF SECURITY OVER BUSINESS NETWORKS 4 BUSINESS NETWORK THREATS AND THEIR EFFECTS 4 Disruptions 4 Unauthorised Access 5 Trojan Horse Programs 5 Denial-of-Service (DoS) 6 Email spoofing 6 Packet sniffing 6 Measures Against unauthorised access 7 Formulating a Network Security Policy 7 Components of a Network Security Policy 7 Developing User Profiles 9 Using biometrics 9 Updating the operating system 10 Taking care of the network access points 10 Security Measures when connected to the Internet 10 Firewall 11 Physical security of the network 12 Secure Network Devices 15 Secure Call-Back Modems 15 Crypto-Capable Routers 15 Virtual Private Networks 15 CONCLUSIONS 16 REFERENCES 17 Network Security Introduction Since the last two decades there has been an overwhelming increase in the number of organizations that rely on data communication networks for their daily business communications, resource sharing, database information retrieval so on and so forth. Previously most computers were centralized and managed in data centres. Computers were kept in locked rooms and links outside a site were unusual. Computer security threats were rare, and were basically concerned with insiders. These threats were well understood and standard techniques were used to deal them. The scenario has changed and now systems are connected to the Internet. The Internet is a network of networks and has no boundaries whatsoever. The Internet provides these organizations with a world of business opportunities. Information on the Internet can be accessed from anywhere in the world, unfortunately it has also allowed for the "proliferation of malicious information". It does not take long for an expert programmer to break into a system. The value of the data stored on most organizations' networks and the value provided by the application systems in use far exceeds the cost of the networks themselves. ...read more.

Middle

A good way to deal with this problem is to have a device that has to be used along with the password to access a system, for instance magnetic cards. A good example is the EFTPOS, the customer has to swipe the magnetic card and then punch in the password to pay for his/her shopping. Another good use of the user profile is that user's access to the system can be controlled. For examples, the number of days and geographic locations he can log on from. The network manger can take additional steps to ensure security like limiting the number of login attempts. It is extremely essential that the network manager is aware of any user(s) who leave the organization so that their access privileges cease to exist. There have been instances when the employee(s) were fired and they still had an access to organization's system. This can prove to be very fatal if the ex-employees decide to join hands with organization's close competitors, leaking vital information or enabling them to have an access to the system. Using biometrics Biometric authentication analyses some part of the user body to ensure that the person is who he says he is. Finger print analysers are inexpensive and effective. On the other hand iris analysers can also be used although they are more reliable, but relatively expensive. Biometrics is one of the most sophisticated methods of authentication, currently in use in some of the affluent organization like FBI. Updating the operating system Almost all the operating systems that are being used are not fully secure from intruders. For example the Unix systems are known for their vulnerability to the hackers. The weak areas or "holes" that make the operating systems susceptible to attack from intrudes are often documented and can be gotten rid of by using techniques that are available in the market. The network manager needs to monitor these potential threats very closely. ...read more.

Conclusion

The VPN can be made more secure by making use of an authentication process to ensure that the connecting user has the rights to enter the destination network Cost-effective, secure and reliable alternatives to private line networks are the key to ISP success. VPNs also provide networked-based features and management capabilities not usually found in private networks. VPNs clearly provide a cornerstone of corporate requirements and those customers will increasingly seek VPN solutions from ISPs. http://www.networkmagazine.com/article/NMG20000727S0029 http://researchcenter.zdnet.com/data/detail?id=1001517853_55&type=RES&x=435551408 Conclusions In every age human always tried to take tighter security steps but every time, somewhat, some people do bad things by breaking the security. Banks had locks but burglars invented tools to break locks. Nowadays infrared technologies are used but still they can bypass that as well. In a similar way, on networks whatever security you do there are some hackers who are keen to break into the system. It is the human nature, whatever he is not allowed to do, he always does the same. A good way of implementing and carrying out the security procedure is to take the employees into confidence. The support of the employees who are going to live with what is implemented is vital. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved It is imperative that the business organization maintains state of the art technical tools to combat security threats. It should be ensured that the organization does not compromise by weaknesses in the systems of its collaborative business partners. The security rules and procedures are kept simple enough so that the organization's employees adhere to the rules. The network manager should be in touch with the top management, communicating what is being done and why so that he has all the support he needs. The results of all actions that have been taken with regards to the security should be regularly audited and tested for weaknesses. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    The customer records are stored in a locked filing cabinet with the clear label attached on the front, "Customer Records". The records are arranged alphabetically within the index system of the filing cabinet. The staff records are stored in a locked filing cabinet labelled "Staff Records".

  2. Marked by a teacher

    Information Age

    3 star(s)

    GCSE and A levels and also other exams like SATS there fore this site should not be given much importance. Topic 3: Download Services Question 1: What features are available on this type of online service? Source Information * I tunes http://en.wikipedia.org/wiki/i-tunes * This page was last modified on 1 October 2008, at 19:51.

  1. Marked by a teacher

    Ecommerce Case Study

    Although e-commerce has been beneficial to a large number of people the biggest problem e-commerce has is that the buyer and seller do not know or see each other resulting in e-commerce potentially being dangerous. The most obvious thing about e-commerce is the scam side on the part of both the buyer and the seller.

  2. The Operating System and You - Operating System Design and the Need for Human-Computer ...

    A copy of the 1997 report detailing the use of computers from the US Census Bureau appears in the appendix because significance which the information presented has concerning the increased use of computers. Conclusion: The operating system is the most essential component to making a computer run.

  1. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    Internal: This means that the damage has come from within the organisation itself, usually from an unhappy employee. Unfortunately you cannot trust all the people using your network or systems. It may include breaking or vandalising your systems or it may be deleting, altering or making sensitive or embarrassing business data public.

  2. Discuss the Causes and Effects of the Digital Divide

    a huge disadvantage to less able people because people need to have basic IT skills in this modern day and age. Technology will be of little use to them because they live off agricultural means but if they find money to introduce IT this can help raise there income because they can widen the business they choose to sell to.

  1. Describe the future of the Internet.

    used as an entertainment system, games can be played using the internet and even with other users. Now anyone can connect to the internet pretty much 24/7 and most providers give unlimited data plans so you can use as much data as needed, but this is always dependant of your personal tariff.

  2. Applied ICT in business scenario answers

    salaries of each employee, total salaries of all employees, an end summary of the total earnings and deductions of each department. (5) (c) Compare and contrast the methods Jaypeg could use to implement the payroll system. The system could be partially implemented, while the other part of the system remains unchanged.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work