Saturday, 7 September 2019

Network Security Research Paper Example | Topics and Well Written Essays - 2250 words

Network Security - Research Paper Example Network Security Introduction: Network security is a fairly confusing and complicated subject that has historically been tackled only by experts and experienced professionals. Nonetheless, increased wiring among people in the networked world has increased the need for people to perceive and master the fundamentals of security. This paper has been written with the basic information systems manager and computer user into focus so that they may acquire sufficient knowledge to hype in the market, identify potential threats and to tackle them appropriately. First, a bit of networking history is discussed. This discussion is followed by the introduction to internetworking as well as TCP/IP. Later, risk management, firewalls, and potential network threats will be discussed in order to elaborate the purpose of secure networking tools and devices. This paper is intended to lend the audience a broad perspective of the network security in general, and a sense to identify, manage and reduce risk s both at home and the workplace in particular. In order to sufficiently comprehend the rules and traits of network security, it is imperative that an individual has some basic knowledge of computer networks. Therefore, it is customary to briefly discuss the foundations of computer networking before moving over to the popular networks and their security. What is a Network? A network may be defined as a set in which lines that resemble a net interlink with one another. It is essentially a system of interconnected lines. Like any network, a network of computer essentially has many computers interlinked with one another. There are numerous ways to interconnect the computers. There are seven layers of communications types with interfaces according to the Reference Model of the International Standards Organization (ISO) / Open Systems Interconnect (OSI) as shown in the figure below: â€Å"The ISO/OSI Reference Model† (Curtin, 1997). Each layer is dependent upon the services of the immediately lower layer. This pattern follows until one gets on the lowest layer of physical network. This can be best understood by drawing a comparison between this model and something of everyday use like a telephone. A telephone is the means of transmittal of message between two people when they are sufficiently away to be out of each other’s earshot. Same happens at the application layer of the ISO/OSI model. The telephones serve the purpose by converting the sound into electronic pulses which may be transmitted back and forth through the wire. Layers underneath the application layer serve the very purpose. Both sets of the telephone need to be connected into a switch which is an essential component of the network of switches of the telephone system. In order to make a call, an individual needs to pick the receiver up and dial the desired extension or number. This number indicates the central office which the request goes to so that a phone from that office rings up. Th e individual at the other end picks up the receiver and the conversation begins. Computer networks have a similar way to function. Some Popular Networks: A lot of networks have been identified and employed over the last 2.5 decades or more. In this paper, two of them will be looked into. Both of the networks are public networks, that essentially means that either of them can be connected by anyone. People can

No comments:

Post a comment