• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18

Network Security

Extracts from this document...

Introduction

TABLE OF CONTENTS INTRODUCTION 1 WHAT IS NETWORK? 2 CLASSIFICATION OF NETWORKS 3 TYPES OF NETWORKS USED IN BUSINESS ORGANIZATIONS 3 Peer-to-Peer Networks 3 Client/Server Networks 3 Thin-Client Computing 4 NEED OF SECURITY OVER BUSINESS NETWORKS 4 BUSINESS NETWORK THREATS AND THEIR EFFECTS 4 Disruptions 4 Unauthorised Access 5 Trojan Horse Programs 5 Denial-of-Service (DoS) 6 Email spoofing 6 Packet sniffing 6 Measures Against unauthorised access 7 Formulating a Network Security Policy 7 Components of a Network Security Policy 7 Developing User Profiles 9 Using biometrics 9 Updating the operating system 10 Taking care of the network access points 10 Security Measures when connected to the Internet 10 Firewall 11 Physical security of the network 12 Secure Network Devices 15 Secure Call-Back Modems 15 Crypto-Capable Routers 15 Virtual Private Networks 15 CONCLUSIONS 16 REFERENCES 17 Network Security Introduction Since the last two decades there has been an overwhelming increase in the number of organizations that rely on data communication networks for their daily business communications, resource sharing, database information retrieval so on and so forth. Previously most computers were centralized and managed in data centres. Computers were kept in locked rooms and links outside a site were unusual. Computer security threats were rare, and were basically concerned with insiders. These threats were well understood and standard techniques were used to deal them. The scenario has changed and now systems are connected to the Internet. The Internet is a network of networks and has no boundaries whatsoever. The Internet provides these organizations with a world of business opportunities. Information on the Internet can be accessed from anywhere in the world, unfortunately it has also allowed for the "proliferation of malicious information". It does not take long for an expert programmer to break into a system. The value of the data stored on most organizations' networks and the value provided by the application systems in use far exceeds the cost of the networks themselves. ...read more.

Middle

A good way to deal with this problem is to have a device that has to be used along with the password to access a system, for instance magnetic cards. A good example is the EFTPOS, the customer has to swipe the magnetic card and then punch in the password to pay for his/her shopping. Another good use of the user profile is that user's access to the system can be controlled. For examples, the number of days and geographic locations he can log on from. The network manger can take additional steps to ensure security like limiting the number of login attempts. It is extremely essential that the network manager is aware of any user(s) who leave the organization so that their access privileges cease to exist. There have been instances when the employee(s) were fired and they still had an access to organization's system. This can prove to be very fatal if the ex-employees decide to join hands with organization's close competitors, leaking vital information or enabling them to have an access to the system. Using biometrics Biometric authentication analyses some part of the user body to ensure that the person is who he says he is. Finger print analysers are inexpensive and effective. On the other hand iris analysers can also be used although they are more reliable, but relatively expensive. Biometrics is one of the most sophisticated methods of authentication, currently in use in some of the affluent organization like FBI. Updating the operating system Almost all the operating systems that are being used are not fully secure from intruders. For example the Unix systems are known for their vulnerability to the hackers. The weak areas or "holes" that make the operating systems susceptible to attack from intrudes are often documented and can be gotten rid of by using techniques that are available in the market. The network manager needs to monitor these potential threats very closely. ...read more.

Conclusion

The VPN can be made more secure by making use of an authentication process to ensure that the connecting user has the rights to enter the destination network Cost-effective, secure and reliable alternatives to private line networks are the key to ISP success. VPNs also provide networked-based features and management capabilities not usually found in private networks. VPNs clearly provide a cornerstone of corporate requirements and those customers will increasingly seek VPN solutions from ISPs. http://www.networkmagazine.com/article/NMG20000727S0029 http://researchcenter.zdnet.com/data/detail?id=1001517853_55&type=RES&x=435551408 Conclusions In every age human always tried to take tighter security steps but every time, somewhat, some people do bad things by breaking the security. Banks had locks but burglars invented tools to break locks. Nowadays infrared technologies are used but still they can bypass that as well. In a similar way, on networks whatever security you do there are some hackers who are keen to break into the system. It is the human nature, whatever he is not allowed to do, he always does the same. A good way of implementing and carrying out the security procedure is to take the employees into confidence. The support of the employees who are going to live with what is implemented is vital. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved It is imperative that the business organization maintains state of the art technical tools to combat security threats. It should be ensured that the organization does not compromise by weaknesses in the systems of its collaborative business partners. The security rules and procedures are kept simple enough so that the organization's employees adhere to the rules. The network manager should be in touch with the top management, communicating what is being done and why so that he has all the support he needs. The results of all actions that have been taken with regards to the security should be regularly audited and tested for weaknesses. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Within each filing cabinet, the records are arranged according to an index system on the basis of some variable (such as alphabetical order or date) depending on what file it is. I will now give examples of the layout of these forms used to hold the data, with a brief annotation.

  2. Marked by a teacher

    Information Age

    3 star(s)

    physically handicapped student * Helps students with developing and changing instructional and learning environment * Students can shed of their shyness of being slow at learning * Increase educational experience * Have confident of the past papers and test. * Less time consuming * * * The website not being

  1. Feasibility Report

    Also the Perfect Pie Company will be able to send details from the Online Order Form to the recipients email address, this will allow the Perfect Pie Company to use the receipt as an invoice, in order to speed up the payment for the order.

  2. transmission of care values

    The type of language used by different generations may cause misunderstanding and confusion. If the service user speaks a different language than the carer, they are not going to be able to communicate effectively if they do not understand what each person is saying.

  1. System Analysis and Design Assignment

    This allows us to contact the student should the books become overdue and they are not returned. Once this has been completed then the student returns it to us, and is provided with two library cards. When books are borrowed and returned without any becoming overdue then they can request further cards."

  2. Free essay

    This research report will present a brief history of the Internet, focusing on some ...

    The new program CPYNET was capable of copying files over the network. Using this, Tomlinson was able to send the first ever email to his colleagues announcing the existence of network email and giving instructions on how to use the new program.

  1. ict as level coursework

    As show previously each product has been defined. Defined as conditioner Defined as Serum and so forth. To do this I need to click each combo box and go to the properties and go to the row source and type in command.

  2. Applied ICT in business scenario answers

    He can interview workers of the school who use the actual system in order to get information about it. He can create a questionnaire to give to this workers (3) (b) Describe four different items that the systems analyst will need to include at the design stage.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work