• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  • Level: GCSE
  • Subject: ICT
  • Word count: 2224

The Internet as a network – Security.

Extracts from this document...

Introduction

The Internet as a network - Security Bharat Halai - 9917398 Advanced Topics in Networks, first assignment, University of East London, Dagenham, Essex Abstract With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-billion pound organisation. This was certainly not expected. Keywords: Internet Introduction With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-trillion pound organisation. ...read more.

Middle

For example an application can be programmed to disregard software that it is not concerned with. An example would be Telnet which works on port 23, this package will only accept packets that arrive from the computer and only accept port 23. There are several advantages to these firewalls: * There may be many sub programs within a program that may need to access external resources, having a gateway built in prevents hackers from knowing the structure of the program that is being used. On the outside the program would appear as one but may have several running inside it. * Traffic can be pre-authenticated whereby control packets before reaching internal hosts therefore preventing breaches within the application itself. * Cost effective has third party software would be need to audit or authenticate packets. * Filters are less complex as they only apply to the application is question therefore avoiding problems whereby delaying traffic. [4] Viruses Another major problem on the Internet is the threat of viruses. Viruses are usually associated with trojan houses and worms whereby a program is written to take advantage of security loopholes that may not have been tested for when the operating system or software was created. ...read more.

Conclusion

Conclusion Internet is and will remain a huge realm of unexplored space (hence the name world wide web). Due to the scale of the Internet it is not easy to control what happens and who connects. The information super highway, as it is commonly known is not easy to maintain. If we think about an every motorway we have, it is practically impossible for it to be policed and to avoid who travels on it or indeed who travel in the vehicles on the motorway. It is possible that rogue packets can travel on the Internet, they may appear to be normal good-doing packets but could potentially cause great damage to a company's network and indeed reputation. This document has covered potential ways of preventing such occurrences; firewalls, virus checkers, IPSec but unfortunately there is no way that network security will be 100% covered, there will always be a way around security. A hacker who knows what they are doing will always know how to get around a feature, all they have to do is read about how the feature works and then work around the security. It has never been easy controlling the Internet, with the introduction of IPv6 we should hopefully one day see that the work of a hacker is somewhat impossible to do. IPv6 has many in built features that will help in the fight to save companies network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    Digital Security Within the Workplace

    3 star(s)

    letters and numbers in passwords * Easy to remember password Don't: * Don't use first or last name in the password * Don't use silly thing e.g. your partner's name * Don't write your password down on paper * Don't use the same password for all your password needs etc.

  2. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    WAP is independent from wireless network standards it is open for everyone to participate, while protocol specifications will be proposed to standardization bodies. Layers in WAP protocol stack: ? Physical Layer - this layer in a communication system is responsible for the conversion of a stream of bits into signals that can be transmitted over transmission medium.

  1. OCR GCSE Business & Communication Task 7 Report

    By using Microsoft Word for my report towards Amanda Barfoot, I was able to define an informative presentation, whilst being supported by many tools from the programme. This individual programme equipped with tools such as justification, readability check, fonts, importing pictures, which all combine to help ensure my report is to a highly attractive, informative and well presented format.

  2. ICT Systems in Everyday Life: Your Local Community

    withdrawals that are large amounts rather than a number of small withdrawals. The banks also usually charge a higher currency exchange than we could get elsewhere. If we withdraw small amounts it is not uncommon to pay as much as 5-10% in fees.

  1. Comparing documents

    Wessex Waters closure is "Yours sincerely" whereas Coffee Control has used "Cheers" which I think in not professional because we use "cheers" for when we are writing to a friend or someone we know. Wessex Water has placed bullet points on their list, although Coffee Control has not used bullet points.

  2. special needs

    Ultimately, the technology avoids her from failing to be a part of important financial meetings because of the reason that her disability was the cause for the downfall of not attending the meeting. Without a device such a web cam that enables users and Maria to video conference, people that

  1. ICT Final Project (Complete)

    I also used validation on this worksheet. I added the amount of tickets sold by using the formula =SUM(E:H) and the total number of disabled tickets sold by using the formula =SUM(H:H). I then used validation to make sure the amount of tickets sold doesn't go over 400 and the amount of disabled tickets sold does not go over 60.

  2. ICT Final Project (complete)

    The system must be protected from the end user accidentally damaging the system. The system must stop the user from entering an incorrect data type in a form. The 'Send to Database' button works correctly. The 'Go to Database' button works correctly.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work