Preview

Introduction to Data Communications

Powerful Essays
Open Document
Open Document
1334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Introduction to Data Communications
Table of Contents

An introduction to network security management.
Network security management is equivalent to managing a computerised network against security threads, unauthorised access, misuse and modifications. In today’s interconnected society the protection of confidential data, business continuity, availability and integrity became of great importance to any organisation. This document aims to provide you with a better understanding of network security in terms of history, network security policies, prevention systems and detection systems available on the market that may help secure your computer network.

The history of network security management.
After a lot of research and designs, in 1969 the first interconnected network was a fact also known under the name ARPANET1. The ARPANET is the predecessor of the currently known Internet. Even before the Internet was introduced, the first computer virus was detected on the ARPANET in 19712 and was known as ‘The Creeper’, which was not much later removed by the removal tool known as ‘The Reaper’.
We can conclude the introduction to network security started here, in 1971. In the years after, the technology of internetworking been through an evolution and is still changing every day. Today’s security threads to a network are not limited to viruses.

Today’s security threats.
Today’s security threats are much more sophisticated and harder to detect than ever before. Especially with the upcoming collaboration platforms such as cloud computing, social networking, mobile payments we are more sensible and exposed to new security threats. Ever since we started using these technologies, social engineering became a clear definition. “Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust”. .
An example of social engineering may be a person who calls your company and pretends to be a travel insurance company that provides travel

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Social engineering is being used to by tricking people into giving out information that is not normally publicly available.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According to, “Social Engineering for Security Attacks”, social engineering is a kind of advanced persistent threat that gains private and sensitive information through social networks or other types of communication (Nelson, 2016). The goal of social engineering is to stay inside of a social media account while undetected for a long period to steal private data (Nelson, 2016). Some targets of social engineering are government agencies, corporations, schools or high- profile users (Nelson, 2016). This type of threat has become increansingly popular in recent years as well as other threats to cybersecurity. Attackers are becoming more sophisticated and persistent, and are focusing on small attacks and high profile organizations.…

    • 109 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Chapter 8 Computer

    • 2419 Words
    • 10 Pages

    Once the hacker gains access to the network, four types of threat may arise. List and explain each of these four threats.…

    • 2419 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Internet

    • 775 Words
    • 4 Pages

    The Internet originated in the late 1960s when the United States Defense Department developed ARPAnet (Advanced Research Projects Agency network), an experimental network of computers designed to withstand partial outages such as a bomb attack. The agency sought to create a web of computers that could continue to communicate with each other, even if some of the computers were disabled. In the mid-1980s, when desktop computer workstations became increasingly popular, organizations wanted to connect their local area networks (LANs) to ARPAnet. If computers could link together and share resources, everyone would benefit.…

    • 775 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The History of Internet

    • 408 Words
    • 2 Pages

    The history of the Internet began with the development of electronic computers in the 1950s. The public was first introduced to the concepts that would lead to the Internet when a message was sent over the ARPANet from computer science Professor Leonard Kleinrock's laboratory at University of California, Los Angeles (UCLA), after the second piece of network equipment was installed atStanford Research Institute (SRI). Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, in which multiple separate networks could be joined together into a network of networks.…

    • 408 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Net neutrality is also known as, Internet neutrality or network neutrality. Net neutrality is principle, which Internet service suppliers ought to enable entrance to every application and content in spite of the source with no blocking or favoring particular websites or products. Network neutrality also referred as a concept or a variety of design practice, which calls for every Internet travel to be existent, treated in the same way. In addition, network neutrality prevents Internet service suppliers from discerning flanked by Internet clients with concern to the velocity with which clients can interrelate with website.…

    • 1339 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The Internet has made large amounts of information available to the average computer user at home, in business and in education. For many people, having access to this information is no longer just an advantage, it is essential. Yet connecting a private network to the Internet can expose critical or confidential data to malicious attack from anywhere in the world. Users who connect their computers to the Internet must be aware of these dangers, their implications and how to protect their data and their critical systems. Firewalls can protect both individual computers and corporate networks from hostile intrusion from the Internet, but must be understood to be used correctly.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques (Godchild. 2011)”. Social engineering involves the use of manipulation to trick others into revealing and or providing the needed information that can be used to steal data and or gain access to secured systems. Most victims of social engineering attacks never see their attackers and they seldom realize that they have been hacked or manipulated.…

    • 1438 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Network

    • 5587 Words
    • 23 Pages

    Computer networks have grown in both size and importance in a very short time. If the security of the network is compromised, there could be serious consequences, such as loss of privacy, theft of information, and even legal liability. To make the situation even more challenging, the types of potential threats to network security are always evolving.…

    • 5587 Words
    • 23 Pages
    Better Essays
  • Good Essays

    Social Engineering

    • 3841 Words
    • 16 Pages

    Social engineering is also called social hacking or social cracking. Social engineering is stealing important security information such as ID or passwords, not by technically but by socially. Popular example is picking through trash of a company or an organization and finding discs that contain secret documents or important data. Even you may use a paper shredder, it can be reconnected. Also, it is other way calls and asks information by lying about his/her identity. In a company, perpetrators may pass himself off as a boss, call to system management center, and say “I forgot passwords, so please tell me again”. There are a lot of other ways. Companies have to set up exacting rules of important data to prevent social engineering.…

    • 3841 Words
    • 16 Pages
    Good Essays
  • Better Essays

    In today’s time, every organization is made up of information security systems. Information security systems are what keep an organization running smoothly and efficiently while holding all their important information in their computers and networks. All information security systems consist of password protections, firewalls; many different security features can prevent hackers from attacking, physical protection of the network and computer systems as well as confidentiality requirements.…

    • 1131 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    However, that same connectivity opens cyberspace to the greatest risks. As networks increase in size, reach, and function, their growth equally empowers law-abiding citizens and hostile actors. An adversary need only attack the weakest link in a network to gain a foothold and an advantage against the whole. Seemingly localized disruptions can cascade and magnify rapidly, threaten other entities and create systemic risk. However, Vulnerabilities in cyberspace are real, significant and growing rapidly. Critical national infrastructure; intelligence; communications, command and control; commerce and financial transactions: logistics; consequence management; and emergency preparedness are wholly dependent on networked IT systems. Cyber security breaches. Data and intellectual property theft know no limits. They affect everything from personal information to national secrets. This paper looks at the risks in the open cyber world and mind sets of the cyber criminals. Also it presents in ongoing researches in the leading IT nations. Goal of this presentation is to show how basic techniques are useful in securing our local servers. Working of newly made algorithms for private data and securities.…

    • 5897 Words
    • 24 Pages
    Powerful Essays
  • Better Essays

    As Internet plays more important role in our daily life comparing to its initiation, some keen groups are ringing our bell, hackers, and theft of data, crackers. These people are all associated with a term ¡§security¡¨. It is not difficult for general publics to point out two of the security issues, security of online transaction and security of message transmission respectively. In fact, system hacking is more fatal.…

    • 1475 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    History of Firewall

    • 18732 Words
    • 75 Pages

    Firewalls are network devices which enforce an organization’s security policy. Since their development, various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application, transport, and network, and data-link levels. In addition, researchers have developed some newer methods, such as protocol normalization and distributed firewalls, which have not yet been widely adopted. Firewalls involve more than the technology to implement them. Specifying a set of filtering rules, known as a policy, is typically complicated and error-prone. High-level languages have been developed to simplify the task of correctly defining a firewall’s policy. Once a policy has been specified, the firewall needs to be tested to determine if it actually implements the policy correctly. Little work exists in the area of firewall theory; however, this article summarizes what exists. Because some data must be able to pass in and out of a firewall, in order for the protected network to be useful, not all attacks can be stopped by firewalls. Some emerging technologies, such as Virtual Private Networks (VPN) and peer-to-peer networking pose new challenges for firewalls. Categories and Subject Descriptors: C.2.0 [COMPUTER-COMMUNICATION NETWORKS]: General General Terms: security Additional Key Words and Phrases: Firewalls, Network Security…

    • 18732 Words
    • 75 Pages
    Powerful Essays
  • Good Essays

    Evolution of the Internet

    • 777 Words
    • 4 Pages

    The Internet began as the Advanced Research Projects Agency Network (ARPANET) during the cold war in 1969. It was developed by the US Department of Defense's (DOD) research people in conjunction with a number of military contractors and universities to explore the possibility of a communication network that could survive a nuclear attack. It continued simply because the DOD, DOD's contractors, and the universities found that it provided a very convenient way to communicate. The ARPANET was a success from the very beginning. Although originally designed to allow scientists to share data and access remote computers, e-mail quickly becomes the most popular application. The ARPANET became a high-speed digital post-office as people used it to collaborate on research projects and discuss topics of various interests. By 1971 the ARPANET grew to 23 hosts connecting universities and government research centers around the country. In 1973 the first international connections were made with England and Norway. Growth continued at a steady pace, by 1987 there were over 10,000 hosts, then by 1989 it had exploded to 100,000. Bob Kahn and Vint Cerf are key members of a team which created Transmission Control Protocol / Internet Protocol (TCP/IP), the common language of all Internet…

    • 777 Words
    • 4 Pages
    Good Essays