Network Security Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Network Security

History and Evolution of Network Security:

The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include the various operations of the access to a program, the deletion of any particular program and the modification to any program. (Network Security: The Concise Tech encyclopedia)

It was during the 1960's that the vacuum-based computers that were being manufactured in the U.S.A. began to become popular, and it was in the year 1967 that the idea of developing 'encrypted passwords' in order to maintain security for the user of the computer was mooted, and, accordingly, the first encrypted password that would bar access to unauthorized persons trying to access programs on the computer was created. There was further progression during the next decade when the year 1970 saw the development of the idea of a computer user being able to log onto a remote computer. Telnet initially introduced the concept. BBN, under Ray Tomlinson of ARPANET was able to introduce the '@' sign for the users of e-mail programs on the Internet in the same year. ARPANET also introduced the very first International Internet connections from the University College of London, England to Norway.

In the year 1974, Vint Cerf and Bob Khan introduced the first 'Transmission Control Program' in their publication, 'A Protocol for Packet Network Interconnection', and by the year 1977, the easy to use computer began to be mass produced and the first company to have achieved this is the 'Apple', followed by the introduction of the 'Personal Computer' by IBM in the year 1981. When in 1982 the TCP/IP a set of protocols for the Internet user was introduced by DCA and ARPA, the Internet began to be defined as a set of connected networks, and this idea became standardized. The 'domain name' system came into being in the year 1984 and this in itself led to the growing popularity of the Internet, and by the next year the term 'hacker' had come into being. The hacker is a person who is able to push his way through the security system of the computer in order to illegally gain access to whatever he needs from such a program.

Challenge response protocols and password tokens were soon introduced, and the 'Symbiolics.com' became one of the first names to be registered as a 'domain'. The concept of 'virus' came into being for the first time in 1986, and one of the first viruses to be discovered was the 'Brain' that had supposedly been developed in Pakistan. Hackers began to do brisk illegal business by the year 1988, and one of the famous hackers of the time is the 'Cuckoos Egg' hacker, and the 'worm' virus that was responsible for infecting about 6,000 internet hosts single-handedly was also discovered at this time. The CERT or the 'Computer Emergency Response Team' was founded in the same year and this team was supposed to respond to emergencies related to infections caused by viruses like the 'worm' and the 'brain'. The fact was that even in the year 1989 the security for the Internet was not at all sufficient enough to promise safety, as demonstrated by the example of a 14-year-old child being able to crack open the computer coding of the U.S. Satellite Positioning System.

It was only during the year 1990 that the issue of Internet security was given serious enough attention, and this led to the creation of modern software that promised to provide adequate Internet security for all its users. In 1991 the 'www' formula was created in order to establish dial up connections to the Internet, by which time the number of computer viruses that had been officially discovered was 1000. The year 1993 saw the creation of the concept of 'firewalls' to fight intruders of Internet security, and in order to provide better security for the more than 100,000 hosts who provided Internet services to the more than millions of users world wide. Internet security became even more important by the year 1994 when the idea of 'shopping' on the Internet began to gain in popularity, as did banking and also advertising for several products. In 1995, the first 'Internet Wiretap' was introduced officially, and this helped the Secret Service and also the Drug Enforcement Agency to apprehend some persons who had been conducting business over the Internet by selling some electronic devices and also certain equipment that could be used for the cloning of cell phones, thus setting a trend in the manufacture of equipment to fight for internet security.

In the year 2000, all the major websites that were in use at that time were forced into a crisis by an attack launched against them for 'denial of services'. Hackers were now being able to penetrate even the best kept and the most confidential records, like for example, the records of thousands of patients of the University of Washington Medical Center. The 'Code Red Worm' and also the 'Sircam' were discovered to have caused unlimited damage to thousands of servers and e-mail accounts at this time, and in the year 2002, there was a DDoS or 'distributed denial of service attack' wherein 13 out of 18 root servers were attacked and destroyed, and the SQL Slammer Worm was responsible for causing a massive attack of DDoS in about ten mere minutes and causing damages to five of thirteen root servers and also affecting bank ATMs and even air traffic control systems. The Sobig F virus, the Blasterworm and many other viruses also managed to damage a lot of sites and domains and this resulted in the introduction of the 'wildcard' service that was actually a site finder, to the various dotcoms. (History of Internet Security)

Motivation for the Development of Network Security:

IT industry is seeking for remedies to security problems which would enable to reduce the influence to their functioning of businesses. Hence an all-inclusive model for security solutions is essential for any firm which seeks to find a solution to the dangers involved in security concerns and for minimizing the expenses of business. (Brenton, 1998) Even though the idea of survival is foremost in the running of any sort of business establishment, the question of how to survive is more important, since all of the business's data is prone to a breach of security at any time, both external as well as internal. The results of such breaches can be extremely damaging to the enterprise in terms of losses or changes in important data, and a complete disruption of services. For example, even a high school student will be bale to penetrate all of the company's records and cause such a breach that it will lose important data that will make the company in - operational for quite some time. The breach may even occur in the company's web pages where an infiltrator can corrupt all its information, or even turn over the entire web page to a competitor, or add obscene and unwanted content or pictures into the web page, which the company will not even be aware of. However, there exists in the world of business a conflict between the objectives behind security and the operational requirements of the company. All organizations will produce information that is critical to the running of the company, and this information can be termed as 'high secret' or 'secret' or 'sensitive', and all such information will have to be protected under a blanket of security. This then is the motivation for a company to formulate and develop good security plans so that there is no breach in security. (Information Security Program Development)

The Importance of Network Security:

Despite all the facts about the various ways and means of breaching network security being used by professional all over the world, certain businesses are yet to come to terms of increasing the security for their computers and related networks. Today, companies are no longer the fortresses that could withstand any attack on their security network; they rather need more fortification against the newer methods being created by hackers and other breaches of the security of a network. It is therefore a basic requirement for all companies to have a written copy of all its formal security plans as well as of its various security policies, keeping in mind the fact that the management of the company must be able to accept this cost as part of the company's essential expenditure. (Head in the Sand- Importance of Network Security)

Network security would enable to break the hazards of the original perfect state of one's computer network. It also enables to threaten the monetary integrity of one's firm. Hence safeguarding one's network from the dangers…[continue]

Cite This Term Paper:

"Network Security" (2004, November 05) Retrieved December 3, 2016, from http://www.paperdue.com/essay/network-security-57413

"Network Security" 05 November 2004. Web.3 December. 2016. <http://www.paperdue.com/essay/network-security-57413>

"Network Security", 05 November 2004, Accessed.3 December. 2016, http://www.paperdue.com/essay/network-security-57413

Other Documents Pertaining To This Topic

  • Network Security

    Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

  • Network Security

    Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

  • Network Security the Practice of

    Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are

  • Network Security as an Issues for Business Data Communication

    Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has

  • Network Security Opening to the

    The main lesson learned from viewing the tutorials and programs is the ease and flexibility of configuring each specific session to the unique needs of an audience. Feasibly these technologies could be used for creating highly unique and tailored learning experiences for students who were learning through online universities only for example. The ability to tailor all forms of digital content, from music and video to drawing boards and

  • Network Security

    Best Practice Wireless Network Security Best Practices for Network Security Wireless network is a technology that relies on radio waves instead of wires in connecting computer devices to the internet. There is a transmitter, with the name wireless access point or gateway, wired into an internet connection, which provides a "hotspot" transmitting the connectivity over radio waves. Hotspot has the capability to identify information, that include an item known as an SSID

  • Network Security

    networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere


Read Full Term Paper
Copyright 2016 . All Rights Reserved