Network Security and Why Use It
Security And Why Use It
The security of any network should be taken seriously. A network allows someone to share resources and information with others on the network. Networks allow for distribution of computer viruses, Trojans, human intruders, and employees can damage more than just one computer. To better understand the importance of network security, one needs to think of what might happen if all the data for a company that is stored in their servers vanishes. This scenario would cause losses that the company might never recover. Networks are divided into three main categories Internetwork (internet), Wide Area Networks (WAN) and Local Area Networks (LAN). These three categories of network require security to ensure that no malicious humans gain access, and no viruses attack the network.
To better understand network security, one needs to know what a network is. A network is defined by Hu, Myers, Colizza, Vespignani, and Parisi (2009)
as a grouping of computers and other hardware which are interconnected using communication channels allowing for information and resource sharing. Network security involves protecting a network from any unauthorized access. Preventive measures are undertaken to ensure the security of any network. There are also intrusion detection systems which detect and inform the network administrator of any attempts to break into the network.
Network security can also be defined as the provisions put in place by the network administrator to secure the computer network. There are also policies that can be adopted to ensure no unauthorized access to the network. These policies include username and password requirement before one can gain access to the network, antivirus software to protect against virus attacks, intrusion detection systems to monitor the network and report of any attempted intrusion Schonlau et al. (2001)
, and physical security to protect against theft of servers and network peripherals. With the continual advancement in technology, hackers are inventing new ways of attacking computer network. Therefore, the network administrator will need to keep up with these changes and ensure that their network is protected fully form any kind of attacks.
Once a user is authorized to access a network, they need to be monitored to ensure they do not access files they are not authorized. To ensure this, every network requires a firewall which contains access privileges for every user, thus ensuring that a person does not access files or services they are not authorized to access. The firewall and security measures put in place will ensure there will be no unauthorized access to the network, but if the users who have access to the network are not properly educated this measures will not work. The users need to be taught on the need to keep their passwords safe, need to not share their access credentials with any other person, and not allowing unauthorized users to access their computer network. This training will ensure that the measures undertaken are successful.
WEP security protocol
WEP is the acronym for Wired Equivalent Privacy which is the original security standard for wireless networking. It was intended to provide confidentiality for data just like in the traditional wired network. WEP is recognized by its 10 or 26 hexadecimal digit. It is still widely used, and it is the first choice for security that is presented for router configuration. This security protocol is used for safeguarding wireless computer networks from unauthorized access. WEP provides a security system that is widely supported on the network, and this makes it easy to setup for a home network. Though, it has been proven that it is easily hacked this security protocol is better than not having one at all.
WEP protocol protects data using encryption during transmission. The data packets been sent are encrypted using either a 64-bit, 128-bit, or 256-bit encryption key. Encryption of data protects the wireless links between access points and clients. The encryption key has an initialization vector which is combined into the key for the creation of the final key. The initialization...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now