• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  • Level: GCSE
  • Subject: ICT
  • Word count: 2224

The Internet as a network – Security.

Extracts from this document...

Introduction

The Internet as a network - Security Bharat Halai - 9917398 Advanced Topics in Networks, first assignment, University of East London, Dagenham, Essex Abstract With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-billion pound organisation. This was certainly not expected. Keywords: Internet Introduction With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-trillion pound organisation. ...read more.

Middle

For example an application can be programmed to disregard software that it is not concerned with. An example would be Telnet which works on port 23, this package will only accept packets that arrive from the computer and only accept port 23. There are several advantages to these firewalls: * There may be many sub programs within a program that may need to access external resources, having a gateway built in prevents hackers from knowing the structure of the program that is being used. On the outside the program would appear as one but may have several running inside it. * Traffic can be pre-authenticated whereby control packets before reaching internal hosts therefore preventing breaches within the application itself. * Cost effective has third party software would be need to audit or authenticate packets. * Filters are less complex as they only apply to the application is question therefore avoiding problems whereby delaying traffic. [4] Viruses Another major problem on the Internet is the threat of viruses. Viruses are usually associated with trojan houses and worms whereby a program is written to take advantage of security loopholes that may not have been tested for when the operating system or software was created. ...read more.

Conclusion

Conclusion Internet is and will remain a huge realm of unexplored space (hence the name world wide web). Due to the scale of the Internet it is not easy to control what happens and who connects. The information super highway, as it is commonly known is not easy to maintain. If we think about an every motorway we have, it is practically impossible for it to be policed and to avoid who travels on it or indeed who travel in the vehicles on the motorway. It is possible that rogue packets can travel on the Internet, they may appear to be normal good-doing packets but could potentially cause great damage to a company's network and indeed reputation. This document has covered potential ways of preventing such occurrences; firewalls, virus checkers, IPSec but unfortunately there is no way that network security will be 100% covered, there will always be a way around security. A hacker who knows what they are doing will always know how to get around a feature, all they have to do is read about how the feature works and then work around the security. It has never been easy controlling the Internet, with the introduction of IPv6 we should hopefully one day see that the work of a hacker is somewhat impossible to do. IPv6 has many in built features that will help in the fight to save companies network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    Digital Security Within the Workplace

    3 star(s)

    something with strong characters which no one is aware off and click on "Ok" Now your document will be password protected and no one will be able to access it. When choosing a password the things you should be aware of are: Do: * Change your password often * Use

  2. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    WAP is independent from wireless network standards it is open for everyone to participate, while protocol specifications will be proposed to standardization bodies. Layers in WAP protocol stack: ? Physical Layer - this layer in a communication system is responsible for the conversion of a stream of bits into signals that can be transmitted over transmission medium.

  1. ICT Systems in Everyday Life: Your Local Community

    An ATM on their premises could transform their business. Automated teller machines are now a way of life. They are often the only way to conduct some banking activities for many, due to branch closures and the increases in face-to-face transaction fees.

  2. OCR GCSE Business & Communication Task 7 Report

    Ethical Issues: To ensure my report remains ethically pleasing I must ensure I am able to provide up-to-date statistics which reflect the company's sufficiency and consistent knowledge of clients and related issues. If my data remains false or inaccurate I can cause distress upon my clients, which overall will reflect the company's standards, negatively.

  1. Information Security.

    The need to hide the content of a written message must therefore have been realized very soon, and there is evidence that codes and ciphers appeared almost with the beginning of writing. Such varied data security problems a from the more resent advances in information technology - large stores and microprocessors which give us processing wherever we need it.

  2. "E-signature" Sign Your Name on Internet.

    The technology of E-signature is based on Public Key Infrastructure (or PKI). A PKI tool enables users of a basically insecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair.

  1. special needs

    An electronic wheelchair is assuring that she can work and progress in life. The wheelchair itself is meeting Maria's personal, social and professional needs. It is firstly meeting her personal needs because at home she can move from her bedroom to her kitchen and cook food or additionally she can

  2. Strategic Management of Innovation.

    Aside from the typical consumer, these services also target business customers with a need for financial transaction processing, public safety, alarms and telemetry, as well as field service and dispatch. Carriers currently offering this type of wireless Internet access service include but are not limited to Nextel Communications, Verizon Wireless, Sprint PCS, and VoiceStream Wireless.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work