Access over 20 million homework & study documents

Network Security

Content type
User Generated
Subject
Computer Science
School
King Fahd University of Petroleum and Minerals
Type
Homework
Rating
Showing Page:
1/5
1
First-name Surname
1*
, Second-name Surname
2,
and Third-name Surname
3
1
Affiliation 1, Email address, University, City, Country
2
Affiliation 1, Email address, University, City, Country
3
Affiliation 1, Email address, University, City, Country
*Corresponding Author
Abstract
Security is an essential component in computing technology, especially when it comes to networking. Security is a critical
component that always comes first whenever a company is thinking of network design, planning, and operating network
infrastructure. Computer users are also looking for ways to improve security on a personal level. With the advancement in
technology and the spread of internet coverage across the world, security has become a significant concern. Network security has
become a critical component as more people and organizations get connected via the internet. Over the years, different kinds of
attacks have been developed by cybercriminals to steal company data, personal and financial information. For this reason,
enterprises are securing themselves using firewalls and encryption tools to keep away the threat. This essay examines the
different kinds of security measures that can be applied in a network to ensure the safety of information and computer users.
Keywords: Network Security; Internet; Information Security
1. Introduction
When it comes to network security management, every
business may have its own unique needs that may be different
from another. However, one thing is for sure; there is a dire
need for network security, a situation that has been made
necessary due to the growing use of the internet. The size of a
company plays a crucial role, especially on the cost that will
be incurred to put up network security measures. A small
office may only require a basic network security system,
whereas a large organization will require high software,
hardware, and maintenance investment [1].
With the advent of technology, new threats are on the rise,
and therefore, new strategies are required to improve security
in network setups, to close any gap that could exist for would-
be attackers. Network security has continuously been
changing over the years, as companies continue to adopt new
systems such as cloud computing and social networking,
thereby introducing new challenges [2].
2. Network Security
When an organization is implementing network security, it
must primarily major with securing the entire network and not
just the computers or devices in the system. Network security
shouldn’t entail the safety of computers at each end of the
network only. It should also consider that attacks can also
occur during the transmission of sensitive data across the
channel. A cybercriminal can target a network channel where
they can collect data, decrypt it, install malware, and return it
to the channel to penetrate other host computers [3]. It is,
therefore, crucial to secure the entire network and encrypt any
sensitive data that may be crucial to the company.
2.1. Factors to consider when developing a secure network
1. Accessibility Only authorized users should be
allowed to communicate through the network.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
2
2. Authentication Proper authentication measures
such as passwords, fingerprint readers should be
installed to ensure only authorized users are allowed
into the network
3. Confidentiality - Information being transmitted
through the system should remain private
4. Integrity Network should be designed in a way that
ensures no message gets modified in transit.
5. Monitoring The system should monitor user’s
access to data and clock-in and out times.
3. Types of attacks
In this section, we shall highlight some of the basic types
of attacks that can cause the system to be slow in
performance, invoke uncontrolled traffic, or even led to the
spread of viruses. Attacks into a network system can be
categorized into various types of attacks as highlighted below.
3.1. Active Attack
This is an attack that involves the intruder to initiate
commands to the malware or virus, so as to instill commands
that will disrupt the network’s operations. They include;
Wormhole attack, Sinkhole, Sybil attack, and Denial of
Service.
3.2. Passive Attack
In this type of attack, the cybercriminal or hacker infiltrates
the network and intercepts data traveling through the system.
Some examples of traffic analysis, Eavesdropping, and
Monitoring:
3.3. Insider Attack
This is an attack that is perpetrated by an individual with
authorized system access. According to a survey by Cyber
Security Watch, 21 percent of security breaches are a result of
insider attacks [4].
3.4. Distributed Attack
In this attack, the cybercriminal is required to introduce a
Trojan horse through a trusted software, which will later
multiply and attack the entire network.
4. Technologies for Securing Network
With technology becoming a necessary item in the current
world, internet threats will continue to haunt us, as long
information is being stored or transmitted over the internet.
There are various defenses to help protect individuals and
organizations from such attacks.
a) Cryptographic Systems involves the use of security
engineering to code and cipher information into
unintelligible data, when being transmitted through the
network [4].
b) Firewall This acts as a perimeter defense mechanism,
which blocks traffic from outside.
c) Antimalware Software and Scanners Antimalware
tools can run in the background to detect and remove
any malware software.
d) Intrusion Detection System This is a system that aids
in the detection of intrusion in the network. IDS can be
used to monitor and alert the admin of an intrusion, and
others can be programmed to block the intruder from
gaining access [5].
e) Secure Socket Layer (SSL) SSL involves protocols
that are standard and ensure reliable connections are
established between the web browser and a remote
website.
5. Symptoms of an attacked network
A computer network that has been attacked by a malware
or virus may start being slow in responding when conducting
processes such as file transfer. Programs may also fail to
execute correctly or load slowly.
Another symptom may include distorted graphics and
texts in the network. When network users start to notice
distorted texts and graphics, they should report it to the

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
First-name Surname1*, Second-name Surname2, and Third-name Surname3 1 Affiliation 1, Email address, University, City, Country 2 Affiliation 1, Email address, University, City, Country 3 Affiliation 1, Email address, University, City, Country *Corresponding Author Abstract Security is an essential component in computing technology, especially when it comes to networking. Security is a critical component that always comes first whenever a company is thinking of network design, planning, and operating network infrastructure. Computer users are also looking for ways to improve security on a personal level. With the advancement in technology and the spread of internet coverage across the world, security has become a significant concern. Network security has become a critical component as more people and organizations get connected via the internet. Over the years, different kinds of attacks have been developed by cybercriminals to steal company data, personal and financial information. For this reason, enterprises are securing themselves using firewalls and encryption tools to keep away the threat. This essay examines the different kinds of security measures that can be applied in a network to ensure the safety of information and computer users. Keywords: Network Security; Internet; Information Security 1. Introduction 2. Network Security When it comes to network security management, every business may have its own unique needs that may be different When an organization ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents