• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  • Level: GCSE
  • Subject: ICT
  • Word count: 2224

The Internet as a network – Security.

Extracts from this document...

Introduction

The Internet as a network - Security Bharat Halai - 9917398 Advanced Topics in Networks, first assignment, University of East London, Dagenham, Essex Abstract With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-billion pound organisation. This was certainly not expected. Keywords: Internet Introduction With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-trillion pound organisation. ...read more.

Middle

For example an application can be programmed to disregard software that it is not concerned with. An example would be Telnet which works on port 23, this package will only accept packets that arrive from the computer and only accept port 23. There are several advantages to these firewalls: * There may be many sub programs within a program that may need to access external resources, having a gateway built in prevents hackers from knowing the structure of the program that is being used. On the outside the program would appear as one but may have several running inside it. * Traffic can be pre-authenticated whereby control packets before reaching internal hosts therefore preventing breaches within the application itself. * Cost effective has third party software would be need to audit or authenticate packets. * Filters are less complex as they only apply to the application is question therefore avoiding problems whereby delaying traffic. [4] Viruses Another major problem on the Internet is the threat of viruses. Viruses are usually associated with trojan houses and worms whereby a program is written to take advantage of security loopholes that may not have been tested for when the operating system or software was created. ...read more.

Conclusion

Conclusion Internet is and will remain a huge realm of unexplored space (hence the name world wide web). Due to the scale of the Internet it is not easy to control what happens and who connects. The information super highway, as it is commonly known is not easy to maintain. If we think about an every motorway we have, it is practically impossible for it to be policed and to avoid who travels on it or indeed who travel in the vehicles on the motorway. It is possible that rogue packets can travel on the Internet, they may appear to be normal good-doing packets but could potentially cause great damage to a company's network and indeed reputation. This document has covered potential ways of preventing such occurrences; firewalls, virus checkers, IPSec but unfortunately there is no way that network security will be 100% covered, there will always be a way around security. A hacker who knows what they are doing will always know how to get around a feature, all they have to do is read about how the feature works and then work around the security. It has never been easy controlling the Internet, with the introduction of IPv6 we should hopefully one day see that the work of a hacker is somewhat impossible to do. IPv6 has many in built features that will help in the fight to save companies network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    WAP is independent from wireless network standards it is open for everyone to participate, while protocol specifications will be proposed to standardization bodies. Layers in WAP protocol stack: ? Physical Layer - this layer in a communication system is responsible for the conversion of a stream of bits into signals that can be transmitted over transmission medium.

  2. ICT Systems in Everyday Life: Your Local Community

    withdrawals that are large amounts rather than a number of small withdrawals. The banks also usually charge a higher currency exchange than we could get elsewhere. If we withdraw small amounts it is not uncommon to pay as much as 5-10% in fees.

  1. Information Security.

    Written messages are less prone to error, and since the courier need not know the message, but can destroy it in an emergency, there could be better security. Yet written messages can be concrete evidence of conspiracy or 'spying whereas a carrier of a spoken message might escape unsuspected.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    Online Privacy in Hong Kong In 1998 only 32% of Hong Kong web sites collecting personal data had personal information collection statements, and only 6% had on-line privacy policy statements. A follow-up survey in 1999 showed 56% of organisations had taken compliance action.

  1. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    have a strong online presence but it is considering to sell groceries via the Internet in order to compete with it's major rivals Sainsbury's and Tesco. This technology will be useful to their Internet customers. (Computer Weekly Journal by Thomas, 29th August 2002, pp.6)

  2. Unit 23: Investigating Communications and Networks

    How different nodes in a network are connected to each other and how they communicate is determined by the network's topology. Topologies are either physical or logical. Below are diagrams of the five most common network topologies. 3. An explanation of the advantages and disadvantages of networking the computers.

  1. Defining computer viruses

    A common misconception is that write-protecting your floppy discs by opening a small hole in the corner of the disc prevent virus infection. Although a virus cannot jump onto your disk when it is write-protected, you must remove the write protection each time you save a file on the disk.

  2. Computer Networks and Distributed Systems - Wireless network of devices: General packet radio services ...

    * ~ is NOT related to GPS (the Global Positioning System) Key features Details Speed * Theoretical maximum speeds of up to 171.2 kilobits per second (kbps) are achievable with GPRS using all eight timeslots at the same time. This is about three times as fast as the data transmission

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work