Monday, September 2, 2019

Network Security Essay examples -- essays research papers

Network Security In today’s world, with so many ways to gain unauthorized access to someone’s computer system, network security is very important. Almost every company has been a victim of a virus attack, hackers, or some other form of unauthorized access to their network. In this paper, I will discuss various methods that those who want this access use and ways they can be prevented. Many people feel that because they use passwords their files are secure and can’t be hacked. They unknowingly leave their networks open to attack without protection thinking everything is fine. Hackers can easily get into password protected files once they have access to a computer system. One way to prevent this is to use a firewall. A firewall prevents unauthorized users from gaining access to a system by restricting access to the entire system, not just the files on the system. Firewalls prevent access to data by using symmetric or asymmetric encryption. Symmetric encryption uses the same password to decrypt the data that it does to encrypt the data. This method allows users to be able to share the same password to gain access to the data and make any needed changes. Asymmetric encryption is different in that there are different passwords used to encrypt the data and decrypt the data. Asymmetric is considered a little more secure as passwords don’t have to be shared in order to allow someone access to the data. Each individual has his or her own password to access it. Asymmetric encryption uses public/private keys to encrypt/decrypt data. Public keys use the same encryption data to access the data that the data was encrypted with. Private, or secret, keys allow the originator of the data to encrypt it and not have to share his password with anyone. They can use their own private key to unlock the data. Digital certificates are certificates that are guaranteed to be authentic by a Certificate Authority. The certificate authority digitally ‘signs’ the data stating that it is authentic. An alternative to this is Public Key Infrastructure, or PKI. PKI uses private keys to certify the data is correct and authentic. PKI is a fast growing, although time consuming, method of securely transmitting data. Network security became necessary when hackers and other neer-do-wells discovered flaws, or holes, in the various layers of the OSI model that would allow... ...  Ã‚  Ã‚  Site located in-theater  Ã‚  Ã‚  Ã‚  Ã‚  Off-site system replication OPSEC and low profile to prevent hostile targeting  Ã‚  Ã‚  Ã‚  Ã‚  Network monitoring systems  Ã‚  Ã‚  Ã‚  Ã‚  Hardened sites Based on just the information contained in the CACI table, it’s obvious that Network Security is mandatory requirement for all networks. As information accessibility grows, so will the need to protect it. By protecting your network from the onset, you can help prevent the problems caused by those who want unauthorized access to your network. References http://www.certmag.com/articles/templates/cmag_feature.asp?articleid=580&zoneid=9 http://www.caci.com/business/ia/threats.html http://www.medword.com/MedwordStore/CSoft/encryption_white_paper.html http://www.iam.unibe.ch/~mseeberg/key/theory.html http://www.windowsitpro.com/Article/ArticleID/46871/46871.html?Ad=1 http://www.windowsitpro.com/Article/ArticleID/46871/46871.html?Ad=1 http://www.windowsitpro.com/Article/ArticleID/8843/8843.html http://www.windowsecurity.com/pages/article_p.asp?id=1142 http://www.windowsitpro.com/Article/ArticleID/15314/15314.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.