Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Research Paper:
Network Security and Why Use It
Security And Why Use It
The security of any network should be taken seriously. A network allows someone to share resources and information with others on the network. Networks allow for distribution of computer viruses, Trojans, human intruders, and employees can damage more than just one computer. To better understand the importance of network security, one needs to think of what might happen if all the data for a company that is stored in their servers vanishes. This scenario would cause losses that the company might never recover. Networks are divided into three main categories Internetwork (internet), Wide Area Networks (WAN) and Local Area Networks (LAN). These three categories of network require security to ensure that no malicious humans gain access, and no viruses attack the network.
To better understand network security, one needs to know what a network is. A network is defined by Hu, Myers, Colizza, Vespignani, and Parisi (2009)
as a grouping of computers and other hardware which are interconnected using communication channels allowing for information and resource sharing. Network security involves protecting a network from any unauthorized access. Preventive measures are undertaken to ensure the security of any network. There are also intrusion detection systems which detect and inform the network administrator of any attempts to break into the network.
Network security can also be defined as the provisions put in place by the network administrator to secure the computer network. There are also policies that can be adopted to ensure no unauthorized access to the network. These policies include username and password requirement before one can gain access to the network, antivirus software to protect against virus attacks, intrusion detection systems to monitor the network and report of any attempted intrusion Schonlau et al. (2001)
, and physical security to protect against theft of servers and network peripherals. With the continual advancement in technology, hackers are inventing new ways of attacking computer network. Therefore, the network administrator will need to keep up with these changes and ensure that their network is protected fully form any kind of attacks.
Once a user is authorized to access a network, they need to be monitored to ensure they do not access files they are not authorized. To ensure this, every network requires a firewall which contains access privileges for every user, thus ensuring that a person does not access files or services they are not authorized to access. The firewall and security measures put in place will ensure there will be no unauthorized access to the network, but if the users who have access to the network are not properly educated this measures will not work. The users need to be taught on the need to keep their passwords safe, need to not share their access credentials with any other person, and not allowing unauthorized users to access their computer network. This training will ensure that the measures undertaken are successful.
WEP security protocol
WEP is the acronym for Wired Equivalent Privacy which is the original security standard for wireless networking. It was intended to provide confidentiality for data just like in the traditional wired network. WEP is recognized by its 10 or 26 hexadecimal digit. It is still widely used, and it is the first choice for security that is presented for router configuration. This security protocol is used for safeguarding wireless computer networks from unauthorized access. WEP provides a security system that is widely supported on the network, and this makes it easy to setup for a home network. Though, it has been proven that it is easily hacked this security protocol is better than not having one at all.
WEP protocol protects data using encryption during transmission. The data packets been sent are encrypted using either a 64-bit, 128-bit, or 256-bit encryption key. Encryption of data protects the wireless links between access points and clients. The encryption key has an initialization vector which is combined into the key for the creation of the final key. The initialization vector is used for the provision of an identifying cipher which allows the encrypted data to be decrypted when it reaches the destination. WEP 64-bit uses a 40-bit encryption key. This key is easy to crack because of its length. WEP 128-bit makes use of a 104-bit encryption key.
Because of the major security flaws identified in the WEP protocol, and the ease with which hackers can manage to crack the encryption key, it is not advisable to use this security protocol for the protecting a network. WEP protocol has been deprecated and replaced with newer protocols like WPA2 and WPA.
WPA and WPA2 security protocols
WPA which stands for, Wi-Fi Protected Access, is a security protocol for wireless networks developed to overcome the flaws of WEP protocol. WPA was initially intended to be an immediate measure while development of WPA 2 was underway. This protocol employed TKIP (Temporal Key Integrity Protocol), which uses a different key for each packet transmitted. This means that TKIP dynamically generates a 128-bit encryption key for every packet transmitted, thus preventing the kind of attacks which compromised the WEP protocolRao & Parikh, 2003.
There is also an integrity check message that is included in WPA. This message prevents an attacker from altering, capturing, or resending their own data packets.
There have been flaws discovered in the WPA protocol. These flaws mostly affect short packets that have known contents. This flaw does not allow for the encryption key to be discovered or recovered, but the hackers can get a keystream which they can use to encrypt certain packets. The keystream can be used seven times to inject data to an identical packet length.
WPA2 was introduced to overcome the TKIP security flaw of WPA. WPA2 uses the CCMP (Counter Cipher Mode Protocol) which is a new encryption protocol developed specifically for Wireless LAN. This new standard is much more secure than WEP and WPA TKIP protocol. CCMP ensure that there is more data confidentiality, better authentication, and control of user access.
According to Krishna and Victoire (2011)
a firewall assists in securing a network from external and unauthorized attacks. It can either be hardware-based of software-based. The primary objective of any firewall is controlling the outgoing and incoming network traffic. It controls by analyzing all the data packets and determines if they should pass in to the network or out of the network, by using some predetermined set of rules. The firewall of a network is installed as a bridge between the external insecure network, and the internal secure network. The operating systems for many computers come with a software-based firewall, which protects the computer against attacks from the internet. Routers also come with software-based firewall components. Majority of firewalls have the capability to perform some basic routing functions.
A firewall allows a computer network to be protected from external attacks. The computer network will be accessing the internet using one main computer which has the firewall installed. This computer performs the processing of data received from the internet and checks it to determine if it meets the set rules. The firewall will also perform the following services proxy services, packet filtering, and stateful inspection.
The proxy service retrieves and sends information from the internet, and transmits this information to the requesting system. Packet filtering analyses all packets been sent and received within the network to ensure they meet the predetermined set of rules before been forwarded to the requesting system. Packets that do not meet the set criteria are discarded. Stateful inspection checks some key parts against a trusted information database, if the packets meet a reasonable match they are allowed to pass through.
The security of any network should ensure that an attacker would require considerable time to attack the network, and they…[continue]
"Importance Of Security" (2012, November 07) Retrieved October 27, 2016, from http://www.paperdue.com/essay/importance-of-security-76319
"Importance Of Security" 07 November 2012. Web.27 October. 2016. <http://www.paperdue.com/essay/importance-of-security-76319>
"Importance Of Security", 07 November 2012, Accessed.27 October. 2016, http://www.paperdue.com/essay/importance-of-security-76319
Intrusion Detection Systems: Retail-Based Cybercrime and the Importance of Security Point of Sales Endpoints Systems Retail-based cybercrime and the importance of security Point of Sales Endpoints Systems The recent technological advances have resulted in increased dependability of network-based technology for everyday usage. Points of sales systems have also evolved, and they are now linked to the company's network, which makes them vulnerable to attacks. The number of attacks leveled against POS endpoints
Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of
Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,
Also, it goes without saying that anyone hired in an important position like this one should have a wealth of experience and knowledge pertaining to information technology and information security (Slater, p. 2). The broad spectrum of activities a CSO must engage in Author Tyler Justin Speed explains that while it security staff can be counted on for the most part to protect stored digital data, unless the chief of
Security at Work Information Security within the nursing fraternity With the advent of consolidated information storage within the nursing fraternity, there has grown the need to have better security and controlled access to such information that may be considered confidential and for the use by the nurse and the patient alone. When anyone wants therefore to have access to the documents I will always need to verify several details just to be
Security and Baseline Anomalies Base lining is the performance of measuring and evaluation the presentation of a network in instantaneous situations. Provision of a network baseline calls for quizzing and reporting of physical connectivity, throughout the range of network usage. Such in-detailed network scrutiny is required in identifying problems associated with speed, accessibility, and finding vulnerabilities within the network. Predefined security settings are put in place to manage large security networks.
Security Privacy In health care, the protection of confidential patient information is an important key in to addressing critical issues and safeguarding the privacy of the individual. To provide more guidance are federal guidelines such as: the Health Care Insurance Affordability and Accountability Act (HIPPA). On the surface, all facilities are supposed to have procedures in place for discarding these kinds of materials. ("Summary of HIPPA Privacy Rule," 2102) In the case