Term Paper: Networking and TCP/IP and Internetworking

Pages: 25 (9364 words)  ·  Bibliography Sources: 1+  ·  Level: College Senior  ·  Topic: Education - Computers  ·  Buy This Paper

SAMPLE EXCERPT:

[. . .] But this also presents another problem wherein person C. could, after accessing the messages being sent between A and B. can alter, without the persons being aware of it, the content or the sequence of these messages. This makes Internet users realize that security should encompass the authenticity and the integrity of the messages sent by the users of the Internet. A proper authenticity service should provide such security to its users. (Conceptual Overview of Network Security)

All over the world individuals, businesses and governments seem to be communicating with each other with absolutely no hindrances, but the actual reality behind the whole system can be revealed only when noticed closely. A lot of issue that were not given importance earlier is now being looked at with a different perspective and one of these is Security. When a business is thinking of sending data across the globe on the net, they would expect that it reach the desired individual without any mishap. Similarly if an individual were sending private information through the net he would obviously expect complete security. Along with this the fact that by connecting a system to a network sort of compromises on the security. There is a high chance of data loss that could cause a lot of loss and damage to the business. Network security can be divided as secure data as it transits a network and methods that regulate what packets, or what may transit the network. Both these types of network security do affect the traffic in a site but their ultimate objectives are quite different. (Network Security, Filters and Firewalls)

When it comes to security we cannot access as to what would be the best form of security that can be provided, as security just is an inclusion of either absolute security or absolute access. To actually be able to be absolutely secure the best way would be to be off the network and switched off and probably not in use at all, but at the end of it this is of no use. But at the same time a computer with absolute access, is terrible too, as anybody can use it now as it does not have any password or authentication problem and it would not be before long when it is destroyed thanks to the many things possible through the Internet. Therefore it is important that every organization decides as to the level of security it would require for its access. On deciding this then a policy needs to be implemented that will enforce this procedure. After this everything that needs to be done in the name of security needs to be done to make sure that it is done keeping the policy in mind. (Introduction to Network Security)

We will now deal with the different types of threats which exist against networked computers. We shall also deal with the security measures to be adopted from the various threats. (Introduction to Network Security) There is a danger, whenever your computer is linked to the Internet, either by a dial-up (modem) connection or through a broadband (DSL or cable) service. At any hour during the day or at night, Network security attacks can come. Among the millions of computers connected to the Internet, your computer is also one among them. And just one moment is sufficient for the hacker to get in. Anyone with bad aim and basic computer skills can get your private documents and photos, credit card numbers and passwords. Hackers can even leave open a back door so they can turn your computer into a zombie and use it to begin network security attacks, often against prestigious computer systems such as government or financial systems and can also take what they want. They have the capacity to conceal their true location as they open their attacks by taking control of your computer. Virus safety alone is not sufficient. Many people think that, from Internet-borne intimidations, anti-virus software will protect them. (Home Internet security: Protection against network security attacks)

But the virus protection is only as good as the most recent virus definitions, i.e., they are formed in reply to the latest viruses, but many thousands of people must be contaminated before the makers of anti-virus software can make a protection. Anti-virus software does nothing to safeguard the computer against the direct network security attacks. It is more tough for a hacker, because if you use a dial-up Internet connection (not impossible, just difficult), your computer links to the Internet only when it has something to send, such as e-mail or a request to load a web page. The computer cuts off the call, if there is no more data to be sent, or after a certain amount of idle time. And the computer is allocated a different IP address on each call. Since the computer is always on the network, in the case of Broadband services, ready to send or receive data and its IP address changes less often (if at all), there are more of intention for network attacks. (Home Internet security: Protection against network security attacks)

There are a lot of attacks that are performed on the Internet and the DoS or the Denial of Service attacks can be counted to be the most destructive of the lot. These are considered the worst kind because they can be easily instigated and moreover these are also very difficult to track down and moreover when access is asked it is not easy to refuse it, as it would also require for us to refuse legitimate request for the service. The idea behind these attacks is that the hackers send more number of requests to a particular host then the host is prepared to handle. By doing so the hacker just actually makes a connection with the service post and then after faking the packet's header information they give a different start destination for these and then drop the connection. If the host server is able to answer only 20 request per second nearly 50 are sent, and this is very easy as there are lot of software's available which assist in this and when the host is not able to answer the remaining request of the attacker it will obviously not be able to answer the legitimate requests. These attacks were known to be common in the 1996's and 1997 period and have become fairly less. (Introduction to Network Security) few things that need to be kept in mind to be able to protect ourselves from these denial of service attacks is that firstly we need to not run our visible to the world servers at a level that is too close to the capacity. Secondly it is also important that we use packet filtering to stop the obviously forged packets from entering into the network address space. Most of the forged packets consists of those that actually come from our own hosts out of which most of them are reserved for private networks as stated in the RFC 1918 and the loop back network (127.0.0.0) and it is also important that we keep up-to-date to the security level patches for the host operating system. This is because there could be some information that could probably fall into the hands of a competitor or a rival who could take undue advantage of the information at hand. At times even compromise of a normal users account on machine can be reason enough to cause the initial damage. There are chances that people who actually break into the system network could just be doing it for the fun of it, but then there are others who would probably do it intentionally to get a one -up on the organization considered. (Introduction to Network Security)

It is absolutely undesirable to have a stranger work the server machine of an organization but even this infringement of privacy is of two standards, one where the normal user access is infringed upon or the public administrator access is broken into. When it comes to normal user access, the individual who ahs the access may be able to access the files and make use of them to his advantage. But there are those other kinds who would make changes to the configuration and probably change the IP settings of the system that would cause it to shut down every time it was started and this may destroy the system but his can be done only when the individual has access to the administrator settings. (Introduction to Network Security)

There are two more kinds of destructive break-ins, which can be counted among the destructive few. One of which is the data-diddler. In this the hacker normally changes the data that he ahs access to. The worst thing in such a hacking would be that the computer being hacked into may not even be realized till may be months. For example if the individual was adjusting the figures… [END OF PREVIEW]

Four Different Ordering Options:

?
Which Option Should I Choose?

1.  Buy the full, 25-page paper:  $26.88

or

2.  Buy & remove for 30 days:  $38.47

or

3.  Access all 175,000+ papers:  $41.97/mo

(Already a member?  Click to download the paper!)

or

4.  Let us write a NEW paper for you!

Ask Us to Write a New Paper
Most popular!

Networking System Support Virtualization Research Proposal


Networking and Organizations Term Paper


Networking Solution Term Paper


Networking and Career Fairs Term Paper


Networking -- Discussion of Recent Developments Article Review


View 1,000+ other related papers  >>

Cite This Term Paper:

APA Format

Networking and TCP/IP and Internetworking.  (2004, March 10).  Retrieved April 21, 2019, from https://www.essaytown.com/subjects/paper/networking-tcp-ip-internetworking/8268153

MLA Format

"Networking and TCP/IP and Internetworking."  10 March 2004.  Web.  21 April 2019. <https://www.essaytown.com/subjects/paper/networking-tcp-ip-internetworking/8268153>.

Chicago Format

"Networking and TCP/IP and Internetworking."  Essaytown.com.  March 10, 2004.  Accessed April 21, 2019.
https://www.essaytown.com/subjects/paper/networking-tcp-ip-internetworking/8268153.