Vulnerabilities of Networks and Internet

Masters
Essay
Technology
Pages 6 (1506 words)
Download 0
The paper presents a clear view of the issues involving computer network and its security. It tackles the basic networking structure and principle and the vulnerabilities behind it. The good practice of info- security in the preservation of data and its role in effective network management.

Introduction

The various networking security strategies are discussed along with alternatives.
Computers unquestionably make a large part of human movement faster, safer, and more appealing. They generate new modes of work and play. They continually spawn new ideas and offer many social benefits, yet at the same time they present increased opportunities for social harm. Public say that the information revolution can be compared to the industrial revolution, it is equally valuable as the coming of print media and perhaps even more significant.
The dependence of the businesses, industries and economies in networking and the internet grew in quality decision making and implementation. The age information technology like any other development in our society brings good and evil. While our economy and businesses prosper through IT and other automation, high-tech crimes are also growing in numbers and sophistication. Prevention plays an important role in network security
Information security or info-security main goal is to keep information on a network safe and secured. The other elements of info-security are divided into three important parts that serve as the foundation for all information security effort. These are confidentiality, integrity, and availability1 (CIA).
The first goal is confidentiality; this is where data are being protected from unauthorized eyes or individuals. ...
Download paper
Not exactly what you need?

Related papers

Heteregeneous Networks
Since its introduction in 1999, SFU plays a key position that supports heterogeneous networks like Windows and UNIX systems to functionally integrate. SFU has kept up with the changing times, it has extended and substantially improved the tools and bi-directional integration of the solution and improved functional performance.…
Security in Computer Networks
The paper provides a broad discussion on threats to security in computer networks and techniques used as control mechanism. The discussion provides a comparative analysis of these control mechanism and their relative effectiveness in implementing computer network security.…
Peer to Peer Networks
The latest applications such as Napster, Gnutella, iMesh, Audiogalaxy Satellite, and KaZaA has led to the reemergence of the P2P networks and since then P2P networks have been the centerpieces of intellectual property lawsuits, especially those involving illegally downloaded music. But P2P is about much more than violating the copyright of record labels. Many in the industry consider the…
Global Internet Security
All these threats are linked to global internet security.…
Wireless Networks-WLAN's
The concept of wireless networking is a relatively new domain and has not been utilized to the fullest even today. …
Internet security
Internet security has become one of the most discussed issues in this era of information technology. The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business.The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be…
Vulnerabilities of Networks and Internet
The various networking security strategies are discussed along with alternatives.…