Network Security Analysis

Topics: OSI model, Transmission Control Protocol, Internet Protocol Suite Pages: 17 (5047 words) Published: June 24, 2013
Analysis and Countermeasures of Network Security

LiuBingyao

Abstract
This article is concerned about network security. It mentions about the present situation of network security and an analysis of the reason that lead to unsafe network environment. Then the article introduces two frequently used protocols in network security: HTTP (Hypertext Transport Protocol) and HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), then compare them and give a brief conclusion. On the other side, the article introduces how firewall protects network security in hardware aspects.

Keywords: Network; Security; Analysis; Countermeasures
1. Introduction
As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed.

1.1 Situation of Computer Network Security

With the rapid development of the Internet and the widespread application, the number of computer viruses, Trojan horses is explosive growth. According to Jinshan drug gangsters "cloud security" center monitoring statistics show that in 2008, Jinshan drug gangsters were intercepted more and more new viruses, Trojans, which grew up 40% compared with 2007. The center statistics also show that 90% of the virus infected users, this attachment web pages that humans are enjoying the network information with the great wealth and convenient at the same time, also be the severe beset by problems of network information security.

The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the trumpets; Internet fraud and extortion; Through the network business platform money laundering profit, etc. Attackers need technical level gradually decrease, means more flexible, joint attacks increase rapidly. Trojan viruses, Trojan virus writers, professional hack personnel, sales channels, professional players have been formed complete gray industrial chain.

1.2 Threats to Computer Network Security

The threat to computer network security includes attacks by hackers and computer virus. It mostly presents in the following aspects.

Firstly, send fake E-mails to users. It is a common way to cheat the account and password by posing as legitimate websites. Secondly, damage caused by viruses is also a common phenomenon. For e.g. when virus gets into computer, it will cover our hard disk with useless data. Thirdly, it’s about unauthorized accessing. This mainly refers to the normal use or oversteps their authority to use the network equipment and information resources. Fourthly, damage the integrity of the database. Fifthly, interfere with the normal running of the systems. Finally, communication lines are tapped and people are not familiar about safety of network security. The first situation doesn’t occur in common. However, awareness of maintain computer network security is really important.

In the article, it mainly analyzes several common situations and introduces what the threat is and how it works.

1.3 Countermeasures of Network Security

As network security has a lot of loopholes, people create a lot of methods to protect network. On the side of hardware, people begin to use firewall to protect network. On the side of software, a lot of tools and technologies have been used in this area, such as router filtering. The article introduces how firewall works and two similar protocols: HTTP and HTTPS. By comparing these two protocols, we will find the development of technology.

1.4 Importance of the Study of Network Security

It’s important for...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security Domain and Strategies Essay
  • Essay about Security Technologies
  • Data Security Essay
  • Internal Network Security Essay
  • Computer Network Security and Firewall Essay
  • Jwc Network Research Paper
  • Preliminary Security Assessment Essay
  • Industrial Control Systems (ICS) Security Market 2018- Market Dynamics & Drivers Essay

Become a StudyMode Member

Sign Up - It's Free