FinalPaper - NETWORK SECURITY 1 Network Security Justin...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
NETWORK SECURITY 1 Network Security Justin Washington Nova Southeastern University
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
NETWORK SECURITY 2 Network Security Abstract Computer networks these days carry voluminous amounts of both personal and business data that are very vital to the society. However, this means that the data has become a target for hackers; therefore, security is a very significant aspect of computer networks. This project delves into ways in which network can be secured. However, it is important to note that networks cannot be totally secure because new threats and viruses are discerned every day. Nonetheless, the changing technology means that new ways of securing a network can be developed as well. Network security ranges from the most basic to the most sophisticated (EC-Council, 2010). The most basic example of network security is offering physical security to the necessary components. This is about protecting hardware such as hard drives from physical intrusion or theft. Other sophisticated means include the installation of the latest anti-spyware software to detect and remove malicious activities from the network. Companies have to invest a lot into their network security because they carry very sensitive personal data that can be detrimental to their business or country security if breached. Keywords Vulnerabilities, attacks, troubleshooting, network hardware, TCP/IP addressing General Introduction to the Problem Area There is a need to have the most basic understanding of how computer networks work so as to manage network security well. When computers are connected to the Internet, the benefits are enormous given the communal nature of the Internet. However, there are malicious Internet users who target information gathered by companies for their own selfish gains (Meghanathan,
Image of page 2
NETWORK SECURITY 3 Boumerdassi, Chaki, & Nagamalai, 2010). Therefore, it is the responsibility of Internet users to ensure that they are as secure as the networks that they use. Network security is very paramount because of the following reasons. First, it is significant to secure a company’s computers because hackers can take control of it and launch spyware or denial of service to third parties, who are often innocent. Also, security hacks bring about trust issues. If personal records are attacked, the trust between companies and the clients are breached and this will lead to loss of business. A Concise Problem Statement There are many sources of security issues in computer networks. The most common is within the organization, which includes human failures from the employees themselves. Employees are bound to make mistakes either due to lack of training or due to inexperience. The consequence of employee errors can be catastrophic to the organization. Errors mean that the employees were not malicious in their activities. Nonetheless, there may be other cases where the employees deliberately leak important information because of their own personal motives. Some
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '14
  • Dr.WeiLi
  • Computer network, Intrusion prevention system, Network intrusion detection system, network systems, Intrusion detection system, Computer network security

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern