Preview

Sec572 Research Paper

Good Essays
Open Document
Open Document
587 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sec572 Research Paper
Michael Amic
SEC572
You Decide #2

Computer networks are bunches of computers connected to each other. That is, either physical wires run between computers-wires in an office (LAN), dedicated phone lines (DSL), dial-up connections, fiber optic, or there is an electromagnetic connection-radio links or microwaves. Simply, when one computer wants to talk to another, it creates a message called a packet. The packet has the destination computer’s name on it and sends it to the computer over this network. Computers don’t use circuits to talk to each other. They don’t have conversations like people do. They send short data packets back and forth. These packets are broken-up pieces of anything: e-mails, gifs, streaming video or audio, or Internet phone calls. Computers divide
…show more content…
These packets are sent through the network by routers. There are lots of protocols-Ethernet, TCP, or whatever, but they all work basically the same way. Routers look at the address on the packets, and then send them toward their destination. They may not know where the destination is, but they know something about where it should go. It’s not hard to see that any network built on this model is terribly insecure. Consider the Internet. As those packets pass from router to router, their data is open to anyone who wants to read it. The routers are only supposed to look at the destination address in the packet header. Packets have source and destination information, but an attacker can modify them at will. An attacker can create packets that seem to come from one site, but don’t really. There are routing attacks where an attacker tells two points on the Internet that the shortest route between them goes through the attacker’s computers (243), according to Schmauder (2000). The solutions to these

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SEC 402 Week 4 Assignment 1 – Developing the Corporate Strategy for Information Security – Strayer Latest…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | Network computers act as the middleman in the communication between the pc and a company’s mainframe. This group of pc’s connection to the mainframe server called a “land area network” acts as a landline for the network of computers located in the same building.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For two years, advocates for the disabled met to the Government convincing them not to change anything to Section 504. If none these meeting ever happening, things would be the way there are today for people with disabilities. Hundreds of letters were sent to the White House by people with disabilities and parents whose children had disabilities, protesting any change to Section 504. In 1973, government officials decided not to make any changes to Section 504. However, they still want to make sure that discrimination to people with people was totally different from racial and sexual discrimination. The Department of Health, Education was given job of declaring regulations to enforce Section 504. This would help place guidelines for all other…

    • 291 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    SEC paper

    • 453 Words
    • 2 Pages

    Explain what Edgar is. Look at the 10-Q and 10-K and explain what they are and what information are included in the report.…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Would California be more progressive with the legalization of Proposition 64? The problem that society is and has been facing is all about proposition 64. People still debate whether it should be passed for good reasons but still others oppose for bad reasons. Along the way there have been some initiatives that have been proposed but didn’t go as planned. Proposition 64 has to do with legalizing recreational marijuana for use of adults 21 and older under the state law. This means that they are able to establish certain sales and cultivation taxes. Smoking would then be allowed in private homes. Although you are able to smoke and grow pot in your private home, it is still illegal to smoke weed while driving and in public places. The limit to have marijuana on a person is only up to 28.5 grams of marijuana and 8 grams of concentrated…

    • 1658 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Routers are specialized devices that links and routes everyone 's information over networks and the Internet through thousands of pathways. The main processes of the router include locating a pathway to create a link to and transmitting packets through this path. This process is done by routing data from a computer to a LAN through any number of routers to reach its destination. The router has proven itself to be one of the main components in the success of the Internet. Routers make networking possible by connecting large groups of people in a unified environment. (McGraw)The router is the one device that oversees all the data delivered over a network. The router uses a tool called the configuration table to determine the path to send the packet. A configuration table contains information on which connections lead to particular groups of addresses, priorities for connections to be used, and rules for handling both routing and special cases of traffic. Configuration tables will vary in the number of lines depending on how big the capability of the router is. (McGraw)Data transmitted over the Internet, travels over the system of the packet-switching network. This system breaks down data and information files into packages of about 1500 bytes. The data package carries the sender 's IP address, the receivers IP address, information on how many packets the data is broken down to, and the information on rebuilding the package. Each packet also contains the data of the Transmission Control Protocol/Internet Protocol (TCP/IP) for using the Internet. The packet is then sent off through the network using routers to find the best available route. Since each packet is sent separately, all the packets may end up taking different routes to reach its destination. The main advantages of using this method compared to sending all the packets over one dedicated line is that the network can balance the load across various parts of the network and avoid congesting certain areas.…

    • 1172 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Network Algorithms

    • 386 Words
    • 2 Pages

    ❑ Grading: Grading will be based on a midterm exam [20%], a final exam [20%], homework [20%], midterm projects [20%], and final project [20%].…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Dawn of The net

    • 399 Words
    • 1 Page

    The dawn of the net is a more or less 20 minutes show that illustrates the process or the sequence involving the internet. As I watched the show, I was really amazed how the internet works, how the message was being send and what the computer usually do whenever there are unacceptable websites. The show usually more on what is inside the computer. Through this, I was able to know the warriors of the net and they are the TCP packet or known as Transfer Control Protocol, the ICMP or Internet Control Message Protocol, the UDP, Router, Ping of death, and Router Switch. The Transfer Control Protocol looks like the bus where the information is being packed. The Router is programmable memory. The router's switch on the other hand is more specific of the destination of the packet. The Ping of death in the computer refers to the police that captures the hacker and destroys the unacceptable sites. The process involving is a little bit long.Whenever the user types something in the website, the information is packed and it is already called as the TCP packet. the TCP packet is the labeled and the address is being placed and it will be send to the Router. The Router sends the TCP packet into the Router Switch which guides it to the network interface and it will be received by the proxy or sometimes referred to as the mailman. It is then that the TCP packet is being opened and its contents are checked. If the contents of the TCP packet consist of sites that are unacceptable just like pornographic sites it is destroyed. After this, the firewall will chose what TCP packets can come inside. There would be few that will be remained to enter the spider web. After the spider web, it will be received again by the firewall wherein the TCP packet is then categorized into 80 or 25. The packet would be destroyed if it does not fall into either 80 or 25. After this it will go to the proxy server where it would be open and unpacked. And lastly, the information is being send back to you. It…

    • 399 Words
    • 1 Page
    Good Essays
  • Good Essays

    from UDP. IP can also accept a packet from other protocols such as ICMP, IGMP, and…

    • 524 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    A computer network is a system of interconnected computers and peripheral devices. For example, it may connect computers, printers, scanners and cameras. Using hardware and software, these interconnected computing devices can communicate with each other through defined rules of data communications. In a network, computers can exchange and share information and resources. A computer network may operate on wired connections or wireless connections. When two or more networks are linked or connected and are able to communicate with one another using suitable hardware and software, it is called an…

    • 1239 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Warrior Net

    • 653 Words
    • 3 Pages

    And then because of the video clip titled the warriors of the net also known as the dawn of the net, give answer to my questions. Because the video were discussing clearly, systematically, and easily the cycle of information we are working within a computer network. The characters involved on that movie are the data circulating inside a network which are the TCP packet, ICMP ping packet, UDP packet, router, ping of death, router switch, network routes , firewall and of course the net and they are being animated so that the video clip turns the whole discussion more visible to me.…

    • 653 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Blue Eye Technology

    • 3467 Words
    • 14 Pages

    Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that can listen, talk, or even scream aloud. It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presents, and starts interacting with you .You asks the computer to dial to your friend at his office. It realizes the urgency of the situation through the mouse, dials your friend at his office, and establishes a connection.…

    • 3467 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    How Does Internet Works

    • 346 Words
    • 1 Page

    So, whenever you search something on the internet, it allows your computer to call another computer for the information that you searched for. The local process is accomplished by the Ethernet or LAN (Local area network). For instance, if you are sending an image file to another computer, the internet divides the image into packets so you can share with many other computers. A computer has an IP address which helps other computers to find your computer to call when someone searches on the internet. For a computer to be on the internet, it needs to connect with a router.…

    • 346 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Blue Eyes Technology

    • 502 Words
    • 3 Pages

    Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that pan listen, talk, or even scream aloud. It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presents, and starts interacting with you .You ask the computer to dial to your friend at his office. It realizes the urgency of the situation through the mouse, dials your friend at his office, and establishes a connection.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For Use Study

    • 1282 Words
    • 6 Pages

    The large system of many connected computers around the world which people use to communicate to each other is called as Internet or Net. If the connection of internet is spread through cables then it is known as cable net.…

    • 1282 Words
    • 6 Pages
    Good Essays