StudentShare solutions
Triangle menu

Network Security Ph.D. - Essay Example

Extract of sample
Network Security Ph.D.

The weekly assignment, which covered various security-related topics, necessitated that we, as students, research the assigned topics, engaged with the material and, importantly, explore the multi-dimensional nature of network security. Added to that, weekly feedback on assignments offered us a clear indication of the topics which we could handle well and those which we could not.
Following a review of the weekly assignments and the identification of the topics which I could write a good extended research on, I decided that threat identification and confrontation was an interesting topic. It was, however, too general and accordingly, I sought the advice of our Chief information Security Officer who directed me towards state of the art threat identification and mitigation technologies as a possible topic.
The primary aim of this research is the examination of the technologies currently employed for the detection of a worm attack and its subsequent negation. Through this examination, the research will illustrate that by taking existing honeypot technologies and using them to populate unused IP space on a network, a honeywall could use these honeypots as sensors to detect and respond to unauthorized traffic.
In order to respond to the research question, an in-depth investigative exploration of the network attacks and the technologies for dealing with them was conducted. The research was limited to secondary data and all sources were checked for credibility.

Part II: Background
2.0 Introduction
An understanding of the nature and types of attacks seen on the network is established first. Following the classification of attacks, a profile of an attacker is presented to provide a more substantial example of network intrusions. A discussion of firewalls, intrusion detection, and honeypots is provided to complete the background information.
2.1 Network Activity
Lyle (1997) posits that most attacks fall within one of three main categories: attacks on integrity, attacks on confidentiality or attacks on availability. The act of maintaining the integrity of a network is the act of preventing authorized users of the system from making changes beyond their authority, and to prevent unauthorized persons from making changes at all. If the integrity of a ...Show more


One of the most important issues confronting network administrators and, indeed, any individual or entity connected to a network is security. While not wanting to exaggerate the dimensions of the security problem, the fact is that every second of connectivity could mean vulnerability to attack or unauthorized access…
Author : qcummerata
Network Security Ph.D. Essay essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Network Security Ph.D. Essay"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Network security
However, there are many challenges that organizations have to overcome for securing the information on the network as well as in the servers. Certified skilled professionals, certified vulnerability assessment tools, incident response management teams and other relevant staff plays a significant role for protecting and detecting potential threats and vulnerabilities that may or have compromise the network to gain access to business critical information of the organization.
8 pages (2000 words) Essay
Network Security
In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security.
24 pages (6000 words) Essay
Network Security
Generally, smartphones have a wide range of applications the most common of which is business and enterprise purposes. The blackberry, a smartphone designed and distributed by Research in Motion (RIM) limited is no doubt among the leaders when it comes to smartphones.
7 pages (1750 words) Essay
Network Security Essay
The fact is, however, that routers are vulnerable to unauthorised infiltration and can, under these circumstances, be compromise. If routers are compromised by an attacker, the attacker/hacker is subsequently in a position to disrupt network operations, compromise data and inflict substantial financial loss on the entity/network in question.
32 pages (8000 words) Essay
Network Security College Essay
The nature of the vulnerabilities that a location is exposed to is remarkable. The usage of the internet has multiplied manifold. This by itself leads to a number of ways by which the world might find ways of cheating or robbing an honest person. While vulnerabilities are exploited mostly by people who want to make money there are also others, who do it for the entertainment.
2 pages (500 words) Essay
Network security
This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation
6 pages (1500 words) Essay
Network Security
With this opening to the RSA system, the attackers extracted the information until they obtained access to their targeted system where the data files were stolen. According to the details of the
4 pages (1000 words) Essay
Network security
This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. Technical security controls are used to provide control mechanisms within systems to as to mitigate potential security
2 pages (500 words) Essay
Network Security
This work is intended to compare the two internet security packages such as Kaspersky and Norton internet securities. According to the survey conducted by Kaspersky Lab, 91% cyber attacks have been
8 pages (2000 words) Essay
Network security
The components include large flat panel televisions and surround sound systems of varying scale and complexity and huge range of peripheral devices that are with the system. As of now, the VAC has internal chain of supply, which is networked using
3 pages (750 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us