Network Threats

Only available on StudyMode
  • Download(s) : 339
  • Published : February 25, 2013
Open Document
Text Preview
Objective:
The main objective of the research paper is to illustrate most common network threats and provide solution to protect users from threats, hackers and ensures that the data travelling across the networks is safe. Introduction:

Computer and network security is a new and fast moving Technology and as such, is still being defined and most probably will always be “still defined”. Security incidents are rising at an alarming rate every year [Figure - 1]. As the complexity of the threats increases, so do the security measures required to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security in order to safely deploy and manage networks today. Securing the modern business network and IT infrastructure demands an end-to-end approach and a firm grasp of vulnerabilities and associated protective measures. While such knowledge cannot thwart all attempts at network incursion or system attack, it can empower network engineers to eliminate certain general problems, greatly reduce potential damages, and quickly detect breaches. With the ever-increasing number and complexity of attacks, vigilant approaches to security in both large and small enterprises are a must Network security originally focused on algorithmic aspects such as encryption and hashing techniques. While these concepts rarely change, these skills alone are insufficient to protect computer networks. As crackers hacked away at networks and systems, security courses arose that emphasized the latest attacks. There is always fault management, fault software, abuse of resources connecting to computer networks. These are the main reasons which cause security problems for a Network. Today, security problem becomes one of the main problems for computer network and internet developing. However, there is no simple way to establish a secure computer network. In fact, we cannot find a network in the world, which does not have...
tracking img