Top-Rated Free Essay
Preview

Network Security

Satisfactory Essays
495 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security
Network Security
Imandi kheerthi Pandranki Divya Revathi
III/IV B.E. CSE III/IV B.E. CSE
Department Of Computer Science Engineering, Department Of Computer Science Engineering,
Dr. L. Bullayya College of Engineering For Women, Dr. L. Bullayya College of Engineering For Women,
Visakhapatnam. Visakhapatnam.
Email Id: Isukheerthi900@gmail.com Email Id: divyarevathi7p@gmail.com

Abstract:-
This paper is going to present an impact on network security. In this present scenario, network security plays an important role. Network security is the process of preventing and detecting unauthorized use of your computer. This paper aims to clear the concept about network security and how to protect (or) secure our messages by using a firewall and the types of network securities are available in the present scenario and also we have tried to point out the problems to computer and networks we have also reveals how to tackle this problems using method like firewall and cryptography.
Introduction:-
Network Security:-
For the first few decades of their existence, computer networks where primarily used by university researchers. Network security involves the authorization of access to data . Users assigned an ID and password that allows them to access the information and programs with in their authority. Network security covers verity of computer networks both public and private that are used in everyday jobs conducting transactions and communications among business, government agencies and individuals.

How to protect:-
We can protect by using 3 types:-
Firewall - Makes it harder for somebody to get into the network

IDS - Makes it harder to mess about in the network when you are in

NAT - Makes it harder to map a network from the outside.

Here we are going to know in detail how the fire wall is used in network security:-
A firewall is a hardware device or software application that sits between your computer and the Internet and blocks all Internet traffic from reaching your computer that you have not specifically requested.
Firewalls for the home user can either be a piece of hardware or a piece of software.
Hardware:-
A Hardware Firewall is a device that sits between your Internet connection and the rest of the computers plugged into it. This
Protection is performed by all the protected machines using private IP address.

Software firewall:-
Specialized software running on an individual computer.
Advantages of computer network security:- * Protect personal data of client on the network. * Protect information been shared between computers on the network. * Protect the physical computers from harm based from possible attacks on the network from the outside ie, hacking attempts or virus/ spyware attacks from the internet.
Conclusion:-
I conclude that as hackers and many algorithms are there to break passwords and much valuable information, which leads to a great loss. Hence network security provides the remedy by many ways. Hence much more advanced security like firewall which will be best security to keep our details secure.
References:
* http://home.howstuffworks.com/search.php?terms=network+security * Wikipedia

References: * http://home.howstuffworks.com/search.php?terms=network+security * Wikipedia

You May Also Find These Documents Helpful

  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network Perimeter: Network perimeter is defined as the boundary between a privately-owned network, and the public network. The idea between network perimeters is that the assets of a network and the hardware and any other element of the network can be monitored and controlled from outside the organization. The concept of this trend was vital because it was quite necessary to defend the internal assets of the organization. There are numerous systems that organizations are trying to implement to help with this new trend. The belief of the organization is that there is a possibility of ensuring that the assets within the network are managed in such a way that it eliminates all the possible threats. The latest trend in setting up network perimeter is adopting of remote access.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    1. What is the typical relationship among the untrusted network, the firewall, and the trusted network?…

    • 2028 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    There are seven domains in a typical IT infrastructure and in each domain; there are multiple network security applications and countermeasures that are present.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Best Essays

    The report is being generated for the town council. The council has its main center and even operates sub smaller five neighborhood centers in various parts of town. The council solely relies on its network and data storage systems to interact with staff members and offices so that real time based data can be accessed regarding cases, clients etc. The data send over the network are very sensitive and vital for legal proceedings.…

    • 1608 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    Given a Local Area Network (LAN) and Wide Area Network (WAN), identify and analyze the inherent weaknesses and exposures, identify control techniques commonly used to provide security of data and control over access to the network, and demonstrate how a security plan functions to safeguard against unauthorized network access.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Insider Threats

    • 4039 Words
    • 17 Pages

    In recent years, countries around the world have been developing rules and regulations which are designed to support data confidentiality and security. Many organizations have spent decades on building stronger defenses against intrusion, including firewalls, anti-virus software, email security, identity access badges, security policies and procedures. These protections have made the business world more effective at blocking threats and attacks from the outside and made it increasingly difficult for hackers and viruses to penetrate into the system. However these protections provide only a first line of defense since it is designed to prevent unauthorized access.…

    • 4039 Words
    • 17 Pages
    Best Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Security

    • 549 Words
    • 3 Pages

    In discussing crime trends, it is important to understand the economic and political factors at the time that may have influenced the crime rate (example: economic recession; war; economic prosperity; etc). What variety of factors do you think influence the crime rate? Where do you think crime is most prevalent and why? In your postings be certain to discuss the issues of race, class, and gender.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It Security

    • 1949 Words
    • 8 Pages

    Computer security and Network Security is the means by which business and governments are protecting against computer intrusions and attack to prevent loss of data, information and provided services. Everything is now on computers, peoples whole lives are documented on computers. Big business and the government rely on technologies that use computers, whether it is used for storage, a medium between the customers and themselves or actual work. With all this information and data being stored, transferred and used it needs to be secured. A bank is open to the public; you would not have this bank unsecured would you? There would be security guards, cameras, and a vault. The same mentality to secure your data should be implied if you have a network that is connected to the Internet. You should have software, hardware, and/or personnel monitoring your networks operations and security. All computers and systems that connect to the internet or networks run off software of some type. People called hackers or crackers, manipulate programs, create worms, and viruses to make systems do thing there not supposed to, access places they aren’t allowed, and shutdown or hinder a system from working properly (Dasgupta). Then there are attacks, phishing attacks which come in the form of email that try to lead you to fraudulent sites, Denial-of-service attacks overload servers causing no one to get on or shuts them down. Then there are SQL injection attacks which are used in security vulnerable web apps, it’s a code that pulls information from the database and sends it back to the hacker, these are just a few of the many threats posed today by hackers ("Top Cyber Security Risks- Origin and Destination", 2009).…

    • 1949 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Firewalls prevent unauthorized users from accessing a private network when it is linked to the Internet. Intrusion detection systems monitor private networks from suspicious network traffic and attempts to access corporate systems. Passwords, tokens, smart cards, and biometric authentication are used to authenticate systems users. Antivirus software checks computer systems for infections by viruses and worms and often eliminates the malicious software, while antispyware software combats intrusive and harmful spyware programs. Encryption, the coding and scrambling of messages, is a widely used technology for securing electronic transmissions over unprotected networks. Digital certificates combined with public key encryption provide further protection of electronic transactions by authenticating a user’s identity. Companies can use fault-tolerant computer systems or create high-availability computing environments to make sure that their information systems are always available. Use of software metrics and rigorous software testing help improve software quality and reliability.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays