Saturday, June 8, 2019
Network Security Research Paper Example | Topics and Well Written Essays - 2250 words
Network Security - Research Paper ExampleNetwork Security Introduction Network security is a fairly confusing and complicated subject that has historically been tackled only by experts and experienced professionals. Nonetheless, increased wiring among heap in the networked world has increased the need for people to perceive and master the fundamentals of security. This paper has been written with the basic information systems manager and information processing system user into focus so that they may acquire commensurate knowledge to hype in the market, identify potential threats and to tackle them appropriately. First, a bit of networking history is discussed. This discussion is followed by the introduction to internetworking as well as TCP/IP. Later, risk management, firewalls, and potential network threats will be discussed in order to elaborate the purpose of secure networking tools and devices. This paper is intended to lend the reference a broad perspective of the network s ecurity in general, and a sense to identify, manage and reduce risks both at home and the workplace in particular. In order to sufficiently comprehend the rules and traits of network security, it is imperative that an several(prenominal) has some basic knowledge of computer networks. Therefore, it is customary to briefly discuss the foundations of computer networking before moving over to the popular networks and their security. What is a Network? A network may be defined as a set in which lines that resemble a net interlink with one another. It is fundamentally a system of interconnected lines. Like any network, a network of computer essentially has many computers interlinked with one another. There are numerous ways to interconnect the computers. There are seven layers of communications types with interfaces according to the Reference Model of the global Standards Organization (ISO) / Open Systems Interconnect (OSI) as shown in the figure below The ISO/OSI Reference Model (Curti n, 1997). Each layer is dependent upon the services of the immediately land layer. This pattern follows until one gets on the lowest layer of physical network. This can be best understood by drawing a comparison among this model and something of everyday use like a telephone. A telephone is the operator of transmittal of message between two people when they are sufficiently away to be out of each others earshot. Same happens at the application layer of the ISO/OSI model. The telephones serve the purpose by converting the sound into electronic pulses which may be transmitted back and forth through the wire. Layers underneath the application layer serve the very purpose. Both sets of the telephone need to be connected into a switch which is an essential component of the network of switches of the telephone system. In order to make a call, an individual needs to pick the pass catcher up and dial the desired extension or number. This number indicates the central office which the req uest goes to so that a phone from that office rings up. The individual at the other end picks up the receiver and the conversation begins. Computer networks have a similar way to function. Some Popular Networks A ken of networks have been identified and employed over the last 2.5 decades or more. In this paper, two of them will be looked into. Both of the networks are public networks, that essentially means that either of them can be connected by anyone. People can
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.