Importance Of Security Research Paper

PAGES
5
WORDS
1535
Cite

Network Security and Why Use It Security And Why Use It

The security of any network should be taken seriously. A network allows someone to share resources and information with others on the network. Networks allow for distribution of computer viruses, Trojans, human intruders, and employees can damage more than just one computer. To better understand the importance of network security, one needs to think of what might happen if all the data for a company that is stored in their servers vanishes. This scenario would cause losses that the company might never recover. Networks are divided into three main categories Internetwork (internet), Wide Area Networks (WAN) and Local Area Networks (LAN). These three categories of network require security to ensure that no malicious humans gain access, and no viruses attack the network.

To better understand network security, one needs to know what a network is. A network is defined by Hu, Myers, Colizza, Vespignani, and Parisi (2009)

as a grouping of computers and other hardware which are interconnected using communication channels allowing for information and resource sharing. Network security involves protecting a network from any unauthorized access. Preventive measures are undertaken to ensure the security of any network. There are also intrusion detection systems which detect and inform the network administrator of any attempts to break into the network.

Network security can also be defined as the provisions put in place by the network administrator to secure the computer network. There are also policies that can be adopted to ensure no unauthorized access to the network. These policies include username and password requirement before one can gain access to the network, antivirus software to protect against virus attacks, intrusion detection systems to monitor the network and report of any attempted intrusion Schonlau et al. (2001)

, and physical security to protect against theft of servers and network peripherals. With the continual advancement in technology, hackers are inventing new ways of attacking computer network. Therefore, the network administrator will need to keep up with these changes and ensure that their network is protected fully form any kind of attacks.

Once a user is authorized to access a network, they need to be monitored to ensure they do not access files they are not authorized. To ensure this, every network requires a firewall which contains access privileges for every user, thus ensuring that a person does not access files or services they are not authorized to access. The firewall and security measures put in place will ensure there will be no unauthorized access to the network, but if the users who have access to the network are not properly educated this measures will not work. The users need to be taught on the need to keep their passwords safe, need to not share their access credentials with any other person, and not allowing unauthorized users to access their computer network. This training will ensure that the measures undertaken are successful.

WEP security protocol

WEP is the acronym for Wired Equivalent Privacy which is the original security standard for wireless networking. It was intended to provide confidentiality for data just like in the traditional wired network. WEP is recognized by its 10 or 26 hexadecimal digit. It is still widely used, and it is the first choice for security that is presented for router configuration. This security protocol is used for safeguarding wireless computer networks from unauthorized access. WEP provides a security system that is widely supported on the network, and this makes it easy to setup for a home network. Though, it has been proven that it is easily hacked this security protocol is better than not having one at all.

WEP protocol protects data using encryption during transmission. The data packets been sent are encrypted using either a 64-bit, 128-bit, or 256-bit encryption key. Encryption of data protects the wireless links between access points and clients. The encryption key has an initialization vector which is combined into the key for the creation of the final key. The initialization...

...

WEP 64-bit uses a 40-bit encryption key. This key is easy to crack because of its length. WEP 128-bit makes use of a 104-bit encryption key.
Because of the major security flaws identified in the WEP protocol, and the ease with which hackers can manage to crack the encryption key, it is not advisable to use this security protocol for the protecting a network. WEP protocol has been deprecated and replaced with newer protocols like WPA2 and WPA.

WPA and WPA2 security protocols

WPA which stands for, Wi-Fi Protected Access, is a security protocol for wireless networks developed to overcome the flaws of WEP protocol. WPA was initially intended to be an immediate measure while development of WPA 2 was underway. This protocol employed TKIP (Temporal Key Integrity Protocol), which uses a different key for each packet transmitted. This means that TKIP dynamically generates a 128-bit encryption key for every packet transmitted, thus preventing the kind of attacks which compromised the WEP protocolRao & Parikh, 2003.

There is also an integrity check message that is included in WPA. This message prevents an attacker from altering, capturing, or resending their own data packets.

There have been flaws discovered in the WPA protocol. These flaws mostly affect short packets that have known contents. This flaw does not allow for the encryption key to be discovered or recovered, but the hackers can get a keystream which they can use to encrypt certain packets. The keystream can be used seven times to inject data to an identical packet length.

WPA2 was introduced to overcome the TKIP security flaw of WPA. WPA2 uses the CCMP (Counter Cipher Mode Protocol) which is a new encryption protocol developed specifically for Wireless LAN. This new standard is much more secure than WEP and WPA TKIP protocol. CCMP ensure that there is more data confidentiality, better authentication, and control of user access.

Firewalls

According to Krishna and Victoire (2011)

a firewall assists in securing a network from external and unauthorized attacks. It can either be hardware-based of software-based. The primary objective of any firewall is controlling the outgoing and incoming network traffic. It controls by analyzing all the data packets and determines if they should pass in to the network or out of the network, by using some predetermined set of rules. The firewall of a network is installed as a bridge between the external insecure network, and the internal secure network. The operating systems for many computers come with a software-based firewall, which protects the computer against attacks from the internet. Routers also come with software-based firewall components. Majority of firewalls have the capability to perform some basic routing functions.

A firewall allows a computer network to be protected from external attacks. The computer network will be accessing the internet using one main computer which has the firewall installed. This computer performs the processing of data received from the internet and checks it to determine if it meets the set rules. The firewall will also perform the following services proxy services, packet filtering, and stateful inspection.

The proxy service retrieves and sends information from the internet, and transmits this information to the requesting system. Packet filtering analyses all packets been sent and received within the network to ensure they meet the predetermined set of rules before been forwarded to the requesting system. Packets that do not meet the set criteria are discarded. Stateful inspection checks some key parts against a trusted information database, if the packets meet a reasonable match they are allowed to pass through.

Conclusion

The security of any network should ensure that an attacker would require considerable time to attack the network, and they would not be guaranteed access after their efforts. Having in place the best and updated security measures will ensure that the computer network…

Sources Used in Documents:

References

Hu, H., Myers, S., Colizza, V., Vespignani, A., & Parisi, G. (2009). WiFi Networks and Malware Epidemiology. Proceedings of the National Academy of Sciences of the United States of America, 106(5), 1318-1323.

Krishna, V.A., & Victoire, T.A.A. (2011). A Descriptive Study on Firewall. [Article]. European Journal of Scientific Research, 63(3), 339-346.

Papaj, J., Dobos, L. u., & izmar, A. (2012). Opportunistic Networks and Security. [Article]. Journal of Electrical & Electronics Engineering, 5(1), 163-166.

Rao, B., & Parikh, M.A. (2003). Wireless Broadband Networks: The U.S. Experience. International Journal of Electronic Commerce, 8(1), 37-53.


Cite this Document:

"Importance Of Security" (2012, November 07) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/importance-of-security-76319

"Importance Of Security" 07 November 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/importance-of-security-76319>

"Importance Of Security", 07 November 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/importance-of-security-76319

Related Documents

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Also, it goes without saying that anyone hired in an important position like this one should have a wealth of experience and knowledge pertaining to information technology and information security (Slater, p. 2). The broad spectrum of activities a CSO must engage in Author Tyler Justin Speed explains that while it security staff can be counted on for the most part to protect stored digital data, unless the chief of

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields