Network Security. - Essay Example

Only on StudentShare

Extract of sample
Network Security.

But with this ease of information access comes the issue of security. With the increase of information flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process. For example, if a customer buys a product of a particular organization through their web-site and a hacker presents himself as the organization and receives the money from the customer, valuable information such as the ID of the customer, his credit card numbers, his passwords are all stolen by the hacker. Therefore such information has to be transferred securely over the Internet. Encryption is the most common way of securing valuable information while transmitting over the Internet (Rahman, 2003). Networks are secured in a different manner. They are secured using tools called "Firewalls". Whenever transactions or information between a customer and an organization are being carried out, a particular pattern is followed. ...
Download paper

Summary

Network Security is one of the most highly debated topics in the present day world. Network Security has many dimensions. Securing any network is like securing a country's access points with several defense mechanisms. Network Security has become a very essential part of each and every network present on this planet- be it the Internet which we use or the LANs (Local Area Networks) and MANs (Metro Area Networks)…
Author : leuschkegarrett

Related Essays

Network Security Opening to the World
Internet based conferencing eliminates the need of a physical meeting place. One can meet people, exchange information and data, and can share files and notes using electronic means. It also saves cost and increase efficiency of the system as a whole. Cisco recently saved more than $1 million on ISO-compliance training by using video-on-demand instead of in-person sessions (Jackson 2004).
...
3 pages (753 words) Essay
Workplace's Network Security
A case study approach will be used because the focus will be on the Healthcare organization in which the researcher is employer.
...
5 pages (1255 words) Case Study
Network Security Essay
In other words, by compromising routers, attackers can inflict substantial, wide-ranging harms upon an organisation. It is, thus, that routers functions as attractive targets, upon which hackers routinely wreak their subversive efforts.
...
32 pages (8032 words) Essay
Network Security College Essay
The internal vulnerabilities are to be countered so that possession of one is not used by the other.
...
2 pages (502 words) Essay
Network Security
Numerous hackers search for and exploit vulnerabilities of a system or a network on a day-to-day basis. Moreover, the tools that help in penetrating and exploiting networks and systems are becoming increasingly accessible and they are so simple to use that they require very little technical knowledge. The threats become even more real when the network connects to other networks, however, threats usually originate from the internal network more often. Research indicates that the 70% of threats usually originate from inside the corporate environment. Hence, any person in charge of networks needs...
10 pages (2510 words) Research Paper
Network Security
In order to prevent such attacks in the future the following measures should be thoroughly applied.
...
4 pages (1004 words) Essay
Network Security
Likewise, the disadvantages associated with DMZ are not significant, but one issue can be highlighted, as the segregation may create a hassle for the network administration because DMZ requires frequent updates and maintenance. Moreover, the hardware cost is high and requires dedicated hardware in order to implement DMZ within the network. Deployment includes a switch, separate firewall and IDS etc.
...
4 pages (1004 words) Coursework
Got a tricky question? Receive an answer from students like you! Try us!