• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18

Network Security

Extracts from this document...

Introduction

TABLE OF CONTENTS INTRODUCTION 1 WHAT IS NETWORK? 2 CLASSIFICATION OF NETWORKS 3 TYPES OF NETWORKS USED IN BUSINESS ORGANIZATIONS 3 Peer-to-Peer Networks 3 Client/Server Networks 3 Thin-Client Computing 4 NEED OF SECURITY OVER BUSINESS NETWORKS 4 BUSINESS NETWORK THREATS AND THEIR EFFECTS 4 Disruptions 4 Unauthorised Access 5 Trojan Horse Programs 5 Denial-of-Service (DoS) 6 Email spoofing 6 Packet sniffing 6 Measures Against unauthorised access 7 Formulating a Network Security Policy 7 Components of a Network Security Policy 7 Developing User Profiles 9 Using biometrics 9 Updating the operating system 10 Taking care of the network access points 10 Security Measures when connected to the Internet 10 Firewall 11 Physical security of the network 12 Secure Network Devices 15 Secure Call-Back Modems 15 Crypto-Capable Routers 15 Virtual Private Networks 15 CONCLUSIONS 16 REFERENCES 17 Network Security Introduction Since the last two decades there has been an overwhelming increase in the number of organizations that rely on data communication networks for their daily business communications, resource sharing, database information retrieval so on and so forth. Previously most computers were centralized and managed in data centres. Computers were kept in locked rooms and links outside a site were unusual. Computer security threats were rare, and were basically concerned with insiders. These threats were well understood and standard techniques were used to deal them. The scenario has changed and now systems are connected to the Internet. The Internet is a network of networks and has no boundaries whatsoever. The Internet provides these organizations with a world of business opportunities. Information on the Internet can be accessed from anywhere in the world, unfortunately it has also allowed for the "proliferation of malicious information". It does not take long for an expert programmer to break into a system. The value of the data stored on most organizations' networks and the value provided by the application systems in use far exceeds the cost of the networks themselves. ...read more.

Middle

A good way to deal with this problem is to have a device that has to be used along with the password to access a system, for instance magnetic cards. A good example is the EFTPOS, the customer has to swipe the magnetic card and then punch in the password to pay for his/her shopping. Another good use of the user profile is that user's access to the system can be controlled. For examples, the number of days and geographic locations he can log on from. The network manger can take additional steps to ensure security like limiting the number of login attempts. It is extremely essential that the network manager is aware of any user(s) who leave the organization so that their access privileges cease to exist. There have been instances when the employee(s) were fired and they still had an access to organization's system. This can prove to be very fatal if the ex-employees decide to join hands with organization's close competitors, leaking vital information or enabling them to have an access to the system. Using biometrics Biometric authentication analyses some part of the user body to ensure that the person is who he says he is. Finger print analysers are inexpensive and effective. On the other hand iris analysers can also be used although they are more reliable, but relatively expensive. Biometrics is one of the most sophisticated methods of authentication, currently in use in some of the affluent organization like FBI. Updating the operating system Almost all the operating systems that are being used are not fully secure from intruders. For example the Unix systems are known for their vulnerability to the hackers. The weak areas or "holes" that make the operating systems susceptible to attack from intrudes are often documented and can be gotten rid of by using techniques that are available in the market. The network manager needs to monitor these potential threats very closely. ...read more.

Conclusion

The VPN can be made more secure by making use of an authentication process to ensure that the connecting user has the rights to enter the destination network Cost-effective, secure and reliable alternatives to private line networks are the key to ISP success. VPNs also provide networked-based features and management capabilities not usually found in private networks. VPNs clearly provide a cornerstone of corporate requirements and those customers will increasingly seek VPN solutions from ISPs. http://www.networkmagazine.com/article/NMG20000727S0029 http://researchcenter.zdnet.com/data/detail?id=1001517853_55&type=RES&x=435551408 Conclusions In every age human always tried to take tighter security steps but every time, somewhat, some people do bad things by breaking the security. Banks had locks but burglars invented tools to break locks. Nowadays infrared technologies are used but still they can bypass that as well. In a similar way, on networks whatever security you do there are some hackers who are keen to break into the system. It is the human nature, whatever he is not allowed to do, he always does the same. A good way of implementing and carrying out the security procedure is to take the employees into confidence. The support of the employees who are going to live with what is implemented is vital. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved It is imperative that the business organization maintains state of the art technical tools to combat security threats. It should be ensured that the organization does not compromise by weaknesses in the systems of its collaborative business partners. The security rules and procedures are kept simple enough so that the organization's employees adhere to the rules. The network manager should be in touch with the top management, communicating what is being done and why so that he has all the support he needs. The results of all actions that have been taken with regards to the security should be regularly audited and tested for weaknesses. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Staff details come from the members of staff, a form is used to record this information upon their recruitment and it is the manger of the business that collects this information. The vehicle details come from the vehicle suppliers, and it is collected using a Vehicle form when a new

  2. Marked by a teacher

    Information Age

    3 star(s)

    It can be used to give the user homework. The second one is Sam learning secondary that instructs test practise and revision for key stage 3, GCSE and A levels. SAM Learning Secondary is the winner with all English status secondary schools as subscribers. And the third one is SAMlearning plus which provides user schools with extra assessments services and help Sam learning secondary inside the school Development.

  1. Feasibility Report

    I feel that introducing a WAN will improve the overall level of communication between the office staff and the kitchen staff. I feel that if the Perfect Pie Company was to introduce a WAN Web which would control the communication between both the main office and kitchen sites, there should

  2. transmission of care values

    The type of language used by different generations may cause misunderstanding and confusion. If the service user speaks a different language than the carer, they are not going to be able to communicate effectively if they do not understand what each person is saying.

  1. System Analysis and Design Assignment

    How does a new book get added to the Learning Centre and how is it stored? "New books are either ordered or donated to the library. We create two cards for each book, one which is sorted by book title and one by subject matter called the accession ID number ('aggie' ID).

  2. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    Generally, weak passwords are 1 - 6, your dog's name, your wife's names, or any similar name, important dates like your birthday. These are considered weak passwords as they can easily be guessed. Strong passwords are usually an alphanumeric combination of upper and lower case letters, for instance, GIRfufr57fjy, keep systems and data secure.

  1. ict as level coursework

    more quickly and it is easier to manage than a paper based system errors were part of the norm. This was due to poor hand writing or calculation problems that caused the downfall of the business as customers did not receive the services they expected.

  2. Applied ICT in business scenario answers

    Show errors in order to correct them. (2) (b) Describe the two types of technical documentation including details of the contents of each one. System documentation: Summary of the whole system. It has the test of data to see if it works correctly.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work