IntroductionNetworks have changed the ways people work , and screennet and wideband entanglements are lines used by every whizz even remotely interested in taking or giving selective instruction . This technology nonetheless has brought threats in terms with the large flake of security breaches . Hence , security features form an important reference of the existing software applications which cater to various industries especially those in banking and e-commerceNetwork Security is considered in the present day scenario as one of the most important part of Information technology . The term varies from the context it is used , and hence has a very gigantic scope . In the most basic sense however , the term net profit security can be delineate as the protection of data that is stored on or that travels all over a network against both accidental and intentional unofficial disclosure and modification (Harrington , 2005 ,.2 . It is basically a process apply which a network is secured against internecine and external threats of various forms in today s world can be almost synonymously used with information security , be she-bop to almost all the places whither the information is being stored has its forms connected on either an intra or an inter network . In addition to protecting the existing clay against attacks , network security also makes it easier for a user to evidence out newer technologies without most(prenominal) riskThis takes network security as a basic premise and then goes on to explain the network security threats and measures that can be used to counter these threats . It lastly cast offs some of the latest trends that are being followed for securing the networksGoals of Network SecurityHarrington (2005 ) and Malik (2003 ) give three main goals of network security as belowConfidentiality - think Data privacy should be maintainedIntegrity - Data stored in the system should be accurate i .e .
should be safe from both unauthorized modification or destructionAvailability - Data should be reachable throughout the organization as and when required regardless any unforeseen events like system crashes or power failuresFung (2005 ) calls these as functional elements of network security and names them as : Confidentiality , certification , Authorization , Message Integrity and Non-RepudiationSources of threats to network SecurityBlazic , Schneider and Klobucar (2001 ) give some of the possible network breachesEavesdropping - The attacker listening to an ongoing snobby conversationWiretapping - Intercepting the communication to access transmitted informationModification , data diddling - The information here is altered by the attackerImpersonation , Spoofing - Here the attacker impersonates a trustworthy entity . For instance in address the attacker uses a veritable network addressIntrusion - Unauthorized access or penetration of a computer systemCracking - Unauthorized breaking into a system or application or networkThe system can be be by external sources of threats like hackers , crackers , cyber-terrorists etc or with internal sources of threats like the employees of the organization . The internal threats especially due to employees cause the majority of security breachesBlazic , Schneider and Klobucar (2001 ) give a set of requirements for the network security as follows : Authentication - to validate a...If you want to get a full essay, order it on our website: Orderessay
If you want to get a full essay, wisit our page: write my essay .
No comments:
Post a Comment