• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  • Level: GCSE
  • Subject: ICT
  • Word count: 2224

The Internet as a network – Security.

Extracts from this document...

Introduction

The Internet as a network - Security Bharat Halai - 9917398 Advanced Topics in Networks, first assignment, University of East London, Dagenham, Essex Abstract With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-billion pound organisation. This was certainly not expected. Keywords: Internet Introduction With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-trillion pound organisation. ...read more.

Middle

For example an application can be programmed to disregard software that it is not concerned with. An example would be Telnet which works on port 23, this package will only accept packets that arrive from the computer and only accept port 23. There are several advantages to these firewalls: * There may be many sub programs within a program that may need to access external resources, having a gateway built in prevents hackers from knowing the structure of the program that is being used. On the outside the program would appear as one but may have several running inside it. * Traffic can be pre-authenticated whereby control packets before reaching internal hosts therefore preventing breaches within the application itself. * Cost effective has third party software would be need to audit or authenticate packets. * Filters are less complex as they only apply to the application is question therefore avoiding problems whereby delaying traffic. [4] Viruses Another major problem on the Internet is the threat of viruses. Viruses are usually associated with trojan houses and worms whereby a program is written to take advantage of security loopholes that may not have been tested for when the operating system or software was created. ...read more.

Conclusion

Conclusion Internet is and will remain a huge realm of unexplored space (hence the name world wide web). Due to the scale of the Internet it is not easy to control what happens and who connects. The information super highway, as it is commonly known is not easy to maintain. If we think about an every motorway we have, it is practically impossible for it to be policed and to avoid who travels on it or indeed who travel in the vehicles on the motorway. It is possible that rogue packets can travel on the Internet, they may appear to be normal good-doing packets but could potentially cause great damage to a company's network and indeed reputation. This document has covered potential ways of preventing such occurrences; firewalls, virus checkers, IPSec but unfortunately there is no way that network security will be 100% covered, there will always be a way around security. A hacker who knows what they are doing will always know how to get around a feature, all they have to do is read about how the feature works and then work around the security. It has never been easy controlling the Internet, with the introduction of IPv6 we should hopefully one day see that the work of a hacker is somewhat impossible to do. IPv6 has many in built features that will help in the fight to save companies network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    Digital Security Within the Workplace

    3 star(s)

    something with strong characters which no one is aware off and click on "Ok" Now your document will be password protected and no one will be able to access it. When choosing a password the things you should be aware of are: Do: * Change your password often * Use

  2. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    WAP is independent from wireless network standards it is open for everyone to participate, while protocol specifications will be proposed to standardization bodies. Layers in WAP protocol stack: ? Physical Layer - this layer in a communication system is responsible for the conversion of a stream of bits into signals that can be transmitted over transmission medium.

  1. ICT Systems in Everyday Life: Your Local Community

    Automated Teller Machine (ATM) is a data terminal used for money transactions. ATMs are similar to a KIOSK computer having a keypad and a screen to provide the user with an easy interface for money transaction. These sorts of computers are purpose specific and programmed accordingly.

  2. OCR GCSE Business & Communication Task 7 Report

    By using Microsoft Word for my report towards Amanda Barfoot, I was able to define an informative presentation, whilst being supported by many tools from the programme. This individual programme equipped with tools such as justification, readability check, fonts, importing pictures, which all combine to help ensure my report is to a highly attractive, informative and well presented format.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    $12,500 Half.com Inc. $12,000 GiftCertificates.com $9,750 SelfCare If you were selling someone else's product and making $20 per sale. No inventory, no credit card processing or customer service, simply marketing and making $20, free and clear. Here's the income you could be looking at : Orders Each Day Weekly Income (US$)

  2. Information Security.

    The need to hide the content of a written message must therefore have been realized very soon, and there is evidence that codes and ciphers appeared almost with the beginning of writing. Such varied data security problems a from the more resent advances in information technology - large stores and microprocessors which give us processing wherever we need it.

  1. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    with better quality information and to make the shopping experience more enjoyable. * To provide customers with information through its use of latest technologies, and through using technology provide customers with solutions that are tailored to their needs. Safeway could use the following technologies to achieve the above: 4.1 The

  2. special needs

    Therefore, the technology enables her to stay at home and communicate with family members. Maria Korelli's- Social use of video conferencing Similarly to personnel uses, Maria additionally uses video conferencing to socialize. Using video conferencing via computer enables Maria to commence with conversing and visualising her friends.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work