CIS647-NETWORK SYSTEMS
COMPUTER NETWORK SECURITY
Prof : Philip Fitzpatrick
By:
Suresh Palleboina
(21063613)
COMPUTER NETWORK SECURITY
Introduction:
Computer network Security is the most essential and complex topic in IT field. It is important that all user must have an awareness about computer network security. Internet is a biggest network in the world which connects all computer devices in the world. In our daily life millions of people communication each other by using internet. So it is very difficult task to protect data which is transfer through internet. So many pioneers are try to hack the information of well reputed organizations for their personal benefits.
What is Network security?
Network is an interconnection of many computer devices which is useful for flexible data transmissions and reception. Network security is the process of take care bout information resources in a universal networking (Internet) environment.
Why we need Network security?
Information security is very important to every organization. If organizations fails to maintain proper networking security measures it got losses in all aspects like software damages, Financial problems and etc.
Network Security Goals:
There are three main goals for maintaining secure networking.
1. Confidentiality
2. Integrity
3. Availability
Confidentiality is a phenomenon of operating functions in a computer is done by authorized persons only. Maintaining secrecy in the data transformation and
Baseball is known as America’s favorite pastime. Any fan of baseball has heard the name Barry Bonds. Barry Bonds is one of the best baseball players of all time statistically. He leads the MLB in home runs in a single season (73), most career home runs (762), MVP awards (7), walks in a single season (232), and another 13 more records. Barry Bonds career was shrouded with a shadow. He was abusing steroids in the late 1990s and early 2000s. After winning 4 straight MVPs, and setting the single season record for homeruns, the MLB established the steroid and performance enhancing drugs bans. Barry Bonds was one of the athletes under investigation. Barry Bonds’ Steroid Scandal was a huge shock to the sport of baseball and the world of sports.
Networking is part of our everyday lives now. Weather is us using our phones, computer, using GPS for directions, watching 3D movies and TV’s or in our work environments. Network Security has become search a big issue since our day to day live started to be more involve with us. These problems involve in all type of shapes and forms where some of these issues are cyber attacks, physical attacks, or abuse of policies. People are really exposed due to the amount of internet activities we have going on in most of our networks. There are two fundamentally different when it comes to networking, the data networks and the synchronous network comprised of switches. With that being said there are also
The world is becoming more interconnected with the advent of the Internet and new networking technology. There is a large amount of personal, commercial, military, and government information on networking infrastructures worldwide. Network security is becoming of great importance because of intellectual property that can be easily acquired through the internet. When considering network security, it must be emphasized that the whole network is secure. Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack.
One of the most important aspects of network security is a strong network security model. The network security model consists of seven layers that work together to provide the strongest possible security for the network. The seven layers are the physical layer, the vlan layer, the software layer, the user layer, the administrative layer, and the IT department layer. A network security model that is well thought out and designed allows the network security team to analyze and maintain the network and determine if there has been a breach and the location of the breach.
Threats to your network is becoming more complex and it is requiring lots of money, time and sacrifices to keep up with the growing amount of potential attacks. Companies cannot protect themselves with just a firewall anymore. Now it's requiring a full security department that
There have been recent innovations in protecting the most important resources of the network. More advanced security technologies are employed on the network in order to take advance precautionary measures to avoid various security threats. According to various situations companies adopt the required security measure in order to address different types of unethical activities on the network.
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network
The increase in the usage of the computer networks leads to the huge rise in the threat and attacks. These attackers change, steal and destroy the valuable information and finally cause complete damage to the computer system of the victim. They affect the performance of the computer system through the misconfiguration activities and generation of software bugs from internal and external networks. Irrespective of the existence of various security mechanism, attackers often attempt to harm the computer system of the intended legitimate users. Hence, security is a main factor for the efficient operation of the network in various applications such as healthcare monitoring, military surveillance, etc. The most common security mechanisms are firewalls, antivirus programs and Intrusion Detection System (IDS).
Network security has become more important to personal computers users and many big businesses. Network security is made up of policies provided by the network administrator to prevent unauthorized access, misuse, modification, or denial of a computer network and network accessible resources. It starts with authenticating, this is commonly with a username and a password. Because just one detail is
Now-a-days security is one of the major concerns for system administrators and internet users. Appropriate level of high security is always required to protect confidential data, to lock a system from unauthorized usage. Threat of internet security breach is
The development of technology has brought Internet to become the mass communication media between people or companies. Through Internet, people can communicate with other people in various places. Companies can get many advantages by using Internet network to support their business. Therefore, companies are trying as hard as they can, and give high effort in protecting their network from attack and make sure that they have the best network security.
It is important for ABC Corporation to bring the network up to current security standards. Attempts to breach networks are becoming more sophisticated and difficult to defend against, as more powerful hardware is introduced and new security defenses become available leaving older measures unreliable. Aging networks that are improperly secured are more at risk than ever. It is not only important to ensure you have the proper defense at the perimeter but also internally on wired and wireless infrastructure. When considering network security controls, acceptable risk is often considered but needs to be minimized to provide the smallest attack surface for an attacker to exploit.
The fastest growing element of the computer world is the internet, due to this development the internet has now become the main communication method within the current generation whether that is between people or companies. The internet has a lot of benefits, people and companies can communicate and connect with others in various locations, therefore companies can take advantage of using the internet network to support their business, however there are some disadvantages to this method, using the internet heavily to communicate can leave companies and people vulnerable to cyber-crime such as network attacks, this results in companies taking extreme actions to have the best network security possible and maximise efforts to protect their network.
I could now confidently say that the addition of this course Business Computing Environment and Networks to the curriculum has tremendously helped me gain more knowledge about the basics of the Networks, how it is being managed, its security, and also how to be more aware of the problems that are being caused nowadays due to the lack of Internet security. As a part of the learning and to my best understanding from this course, I would like to delve more into the most common internet security problems and how do we solve the business problems through the Internet Security.
Many believe that the only reason that we need information security is in order to ensure no one can hack our computers and to ensure that our important information is never lost. Information security is not only that, but on the other hand there are many reasons why we need information security.