• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41

Network security issues dicussed the with assumption that the reader has mastered the fundamental issues of telecommunication system and computer networking.

Extracts from this document...


1 Preface This report is written as a requirement of course 52281- Telecommunication systems - structure and applications at Department of Telecommunication, in the period of fall semester 1999, under supervision by J�rgen Nygaard. The report is written by: _______________________________ 1. Adi Basuki Tedjasaputra c991908 Chapter 1- 11, 17-18; Editor _______________________________ 2. Aamir Bashir c991896 Chapter 12-16 2 Synopsis The purpose of this synopsis is to explain and clarify the structure of this report. The report consists of two parts, which are written separately and independently by the writers. The writers approach network security from different perspective to include a broader spectrum of network security issues. The first writer tries to approach network security issues with assumption that the reader has mastered the fundamental issues of telecommunication system and computer networking. The issues discussed are: * Problem formulation and delimitation of network security * Definition of network security * Security system approaches * Introduction to Firewall * Secure protocol * Network topology and security * OSI network security * Windows NT security Some references used by the first writer are: [3], [4], [5], [6], [7], [8], and [9] The second writer focuses on more practical things. Some discussed issues are: * Network security needs * Security plan * LAN and security * Security and Windows NT * Secure electronic commerce Some references used by the first writer are: [1], [2], [10], and [11] 3 Table of Contents 1 PREFACE 1 2 SYNOPSIS 2 3 TABLE OF CONTENTS 3 4 PROBLEM - FORMULATION AND DELIMITATION 5 5 INTRODUCTION 6 5.1 PASSWORD 7 5.2 IMPORTANT FACTORS 8 5.3 EVERY USER SHOULD BE UNIQUE 9 5.4 COST OF NETWORK SECURITY 9 5.4.1 Degrade performance of network 9 5.4.2 Unfriendly 10 5.4.3 Financial cost 10 5.4.4 Time 10 5.4.5 Special management 10 6 SECURITY SYSTEM APPROACHES 11 6.1 SERIES OF CONCENTRIC CIRCLES (SCC) [3] 11 6.2 SERIES OF LAYERS (SL) ...read more.


The advantage and disadvantage of the method are respectively: * It can reduce authentication time so that the network performance is increased. * An unauthorized user can breach the security of any trusted domain. 11.1 NTFS file security Windows NT using NTFS file security to secure information stored. This is considered a secure solution for data. The access to data can be conditioned so that one needs authentication before using the data. The disadvantage of this solution is that NTFS File Security slows down performance of computer networking by checking request to access file. 11.2 E-mail Popular E-mail protocols used today is Post Office Protocol (POP) and Internet Message Access Protocol (IMAP). POP is designed for "off-line" mail processing where the user does not change computer often and use the same computer and email client to do email processing. It can be used with multiple different computers with consequence that the messages will be sprinkled throughout the computers. IMAP, on the other hand, is designed to be used by multiple computers. The technology allows the message to be centralized, so that messages are not sprinkled when using several different computers and same account. E-mail security is an important issue since the nature of e-mail can be private or personal. Unfortunately, POP and IMAP does not have any security facilities with it. It depends on the network security to secure the information. In practice, it is important to have security for e-mail protocol. Many organizations begin to implement paperless office, where one of the facilities used is e-mail. The information in an email can be confidential for a specific department, for example. This information should be protected from security threats, but there is no protection if the threat comes from inside the organization. 12 Network Security Needs The most important security needs are describe as * Confidentiality * Reliability * Integrity A network should not allow any one to see confidential information without authorization. ...read more.


and it is verified that message has not been altered since it was sent .A digital signature goes beyond techniques such as integrity check-value mechanism because it supports non repudiation. In other word it may be used to resolve dispute between the parties involved in transaction. 16.2 Electronic commerce application security Here is a brief overview of higher-level security measure needed for electronic data interchange (EDI) and Internet bankcard payment system * EDI System EDI is the application-to-application exchange of business data in industry standard formats. It can provide instantaneous data transmission. It is based upon open standards and Internet has potential to low cost dramatically. Currently it is possible to apply standard Internet message security protocol to EDI interchange message. For example EDI MIME (Multipurpose Internet Mail Extensions) contents are fully compatible with MIME security protocol. * SET Protocol Secure electronic Transaction is a complete protocol and infrastructure specification for supporting bankcard payment over the Internet. It was developed by the visa Master card and other organization. How it work is illustrated by an example Suppose when a cardholder agrees to make purchase from the merchant, the car holder sends online payment instruction to the merchant. The merchant then communicates with the appropriate financial institution via payment gateway forwarding the payment instruction, to authorize and capture the transaction. The acquiring bank does the capturing. 17 Conclusion We cannot trust a software vendor completely for security matters. One of the recent examples is that a network computer security company found a security hole in Windows NT and subsequently Microsoft released a patch for it. The best solution for computer network security depends on many factors and considerations. The best solution for a system might not be the best solution for another system. Network security design, implementation, and maintenance are needed during the use of the system. It should not be done temporarily, but it should be done continuously. It does not have to be static since internal and external threats and challenges change rapidly. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Management Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Management Studies essays

  1. Aldi. A critical evaluation and audit of its Structure, strategy, culture and management/leadership

    as "the collection of relatively uniform and enduring values, beliefs, customs, traditions and practices that are shared by an organization's members learned by new recruits, and transmitted from one generation of employees to the next." The traditions followed by the entire workforce definitely unify a bonding between the employees and

  2. Balfour Beatty. The purpose of this report is to identify and select a UK ...

    Alternatively, creditor collection period is how long it takes Balfour to pay up its debts. Balfour Beatty's figure: 49 Days. This figure shows that Balfour is taking, on average, 49 days to pay up its debts. It is healthy that Balfour keeps this figure up, as it allows Balfour to keep its cash, and use it for other purpose.

  1. Rivalry of Existing Australia Telecommunication Services

    Assets specificity is the extent to which the telecommunication service company's assets can be utilized to produce a different product. High capital is required to enter into the telecommunication services industry which needs large investments on technology, distribution, service outlets and plants.

  2. Strategic Audit of Starbucks

    Top Management CEO Howard Schultz wanted to strengthen Starbucks' top management team by hiring people with extensive experience in managing and expanding retail chains. Orin Smith, who had an MBA from Harvard and 13 years' experience at Deloitte and Touche, was brought in as chief financial officer in 1990

  1. Legrand Company Analysis. Legrand is the global specialist in electrical and digital building infrastructures.

    It also means defining made-to-measure career paths to make the most of the diversity that is such a precious asset. But of course we cannot do without common processes and shared resources to ensure the needed convergence towards a group identity defined in terms of our values.

  2. Donner Company is a Service oriented Manufacturing Company that makes printed circuit boards as ...

    So, net-net August Inventory works out to 307 boards/day * 21 = 6441 boards. With this opening stock known and the incoming rate in September (assume uniform inflow) we can calculate the Average Inventory of September using the Daily Shipment Values.

  1. PEST analysis of uk mobile network industry

    users require information and hope to receive it in very minimal time without much delay23. This is reflected in the innovation and use of the 3G services now offered to users by their network operators. Orange supplied figures which showed that mobile data downloads has increased by 108% in the

  2. E-Business Evaluation of Tesco.com

    8 Appropriate size for average screen size Unique Selling Point(USP) or Value Proposition 8 Good use of USP concept Ability to take action (Key action Point ? KAP) 9 Highly interactive Feeling of wanting more ? depth of site 8 Good enough Contact Details 10 Available with excellent detail Credential

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work