• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  • Level: GCSE
  • Subject: ICT
  • Word count: 2224

The Internet as a network – Security.

Extracts from this document...

Introduction

The Internet as a network - Security Bharat Halai - 9917398 Advanced Topics in Networks, first assignment, University of East London, Dagenham, Essex Abstract With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-billion pound organisation. This was certainly not expected. Keywords: Internet Introduction With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-trillion pound organisation. ...read more.

Middle

For example an application can be programmed to disregard software that it is not concerned with. An example would be Telnet which works on port 23, this package will only accept packets that arrive from the computer and only accept port 23. There are several advantages to these firewalls: * There may be many sub programs within a program that may need to access external resources, having a gateway built in prevents hackers from knowing the structure of the program that is being used. On the outside the program would appear as one but may have several running inside it. * Traffic can be pre-authenticated whereby control packets before reaching internal hosts therefore preventing breaches within the application itself. * Cost effective has third party software would be need to audit or authenticate packets. * Filters are less complex as they only apply to the application is question therefore avoiding problems whereby delaying traffic. [4] Viruses Another major problem on the Internet is the threat of viruses. Viruses are usually associated with trojan houses and worms whereby a program is written to take advantage of security loopholes that may not have been tested for when the operating system or software was created. ...read more.

Conclusion

Conclusion Internet is and will remain a huge realm of unexplored space (hence the name world wide web). Due to the scale of the Internet it is not easy to control what happens and who connects. The information super highway, as it is commonly known is not easy to maintain. If we think about an every motorway we have, it is practically impossible for it to be policed and to avoid who travels on it or indeed who travel in the vehicles on the motorway. It is possible that rogue packets can travel on the Internet, they may appear to be normal good-doing packets but could potentially cause great damage to a company's network and indeed reputation. This document has covered potential ways of preventing such occurrences; firewalls, virus checkers, IPSec but unfortunately there is no way that network security will be 100% covered, there will always be a way around security. A hacker who knows what they are doing will always know how to get around a feature, all they have to do is read about how the feature works and then work around the security. It has never been easy controlling the Internet, with the introduction of IPv6 we should hopefully one day see that the work of a hacker is somewhat impossible to do. IPv6 has many in built features that will help in the fight to save companies network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    WAP is independent from wireless network standards it is open for everyone to participate, while protocol specifications will be proposed to standardization bodies. Layers in WAP protocol stack: ? Physical Layer - this layer in a communication system is responsible for the conversion of a stream of bits into signals that can be transmitted over transmission medium.

  2. ICT Systems in Everyday Life: Your Local Community

    After providing the correct pin code the machine verifies, it from its central database connected to with a telephone line. After successful authentication, the customer can withdraw the desire amount (within the prescribed limit) from the ATM machine or can transfer amount to other account.

  1. Information Security.

    The microprocessor and the floppy disc create a new and urgent problem of safeguarding software. The requirements summed up by the phrase 'data security' do not stay the same; they change as the technology changes. In order to avoid repeating the same phrases we will use conventional names for the actors in the security drama.

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    the entire online shopping experience, enhance personalisation and this will turn one time visitors their site into regular users. (Lynch 2002) 5 Customer care programme for Safeway and discussion of technology driven CRM. In a very competitive retail industry in which Safeway operates, customer satisfaction rarely guarantees loyalty.

  1. My research concerned how the Internet could be used to help people who were ...

    Negative images of women related to pornography have been associated with the Web, Balka points out that society has not been receptive to women's training, making women less likely to want to access the Internet.

  2. Unit 23: Investigating Communications and Networks

    & Cat 6 (250 MHz) * Suitable for installing in strong RFI & EMI environment * Individual pair shielding enable better NEXT isolation allowing different application to run in the same cable * Lower cost than using a fibre LAN * Moving from existing copper based LAN without having to change the existing electronics.

  1. Defining computer viruses

    Viruses can slip into your computer from a variety of sources. The most common sources of file viruses, boot sector viruses, and Trojan horses are floppy disks, homemade compact discs, and Web sites that contain games and other supposedly fun stuff.

  2. OCR GCSE Business & Communication Task 7 Report

    I was also able to use drawing stencils within the programme to structure the linear borders within my work. Comment: I think I managed to achieve a high standard registration form, which is appealing, professional and involves tidy borders and texts.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work