Router Security Understanding Network Security Term Paper

Length: 4 pages Sources: 4 Subject: Education - Computers Type: Term Paper Paper: #81954499 Related Topics: Wireless Network, Ip Address, Cisco Systems, Private Security
Excerpt from Term Paper :

Data destruction is when an attacker goes in and starts deleting things (Curtin, 1997).

There are a number of ways that a company's network can get attacked. One being if you have a single component to provide security, an attacker only has that one thing to get around in order to gaining full control of your system. Also not having secure modems can give access to unwanted attacks. However, these are evolving every single day. The first one being shortened URLs, a Shortened URL nickname can be handy, but pose risks. Since they give no hint of the destination, attackers can exploit them to send you to malicious sites. Then it discusses data harvesting of your profile. This is when an attacker collects enough information to access your sensitive accounts. They do this by the information you share on social networks, such as your high school, hometown, or birthday, which are often "secret" security questions or even passwords. Which also leads into social network imposters, attackers can take control of your friends online persona and exploit that trust. You also have to worry about web snooping. Now that we use our private PC for entertainment, shopping, and socializing, every Internet user leaves a digital trail of preferences; the books you read, movies you rent, different people you interact with, the items you buy and other details can be a gold mine of demographic data for search engines, advertisers, or anyone that might want to snoop around on your computer. There is an attack tool called Scareware. This program has a twist on the standard phishing attack, in that it tricks you into installing rogue antivirus software by "alerting" you that your PC has been infected. There is another type of attack where one might receive a text message to your mobile phone that looks as if it's from your network provider or financial institution. These attacks are called Trojan horse text messages and they can request permission to implement an update that allows...


They can also direct you to malicious sites or even unpatched software. Some very knowledgeable programmers can create Rogue Wi-Fi spots that appear to be regular free Wi-Fi but are being used by an attacker to capture sensitive information. A really good hacker could get into a weak Wi-Fi network to do this as well. You could also be at risk if you happen to lose any of your personal devices. This includes data backups if you happen to use CDs, DVDs, flash card, things that can be portable.

One step that can be taken is to begin using Ciscos' Security Device Manager Version 1.0. This function handles the internetwork operating system-based security functions for access routers. Security Device Manager is a Web-based device-management tool for Cisco routers that can improve the productivity of network managers, simplify router deployments, and help troubleshoot complex network and VPN connectivity issues. Network and security administrators can use SDM for faster and easier deployment of routers for integrated services such as dynamic routing, WAN access, WLAN, firewall, VPN, SSL VPN, IPS, and QoS. Network Security is and will always be a large issue for administrators. As long as you have a connection to the outside world, an attacker has access to you. In order to be able to sufficiently protect yourself is to identify and evaluate all possible avenues, as well as having a good security policy implemented (Musich, 2003).

In conclusion, network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "wired," an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them at any size company or organization.


Bradley, T. (January 24, 2010). How to Stop 11 Hidden Security Threats. Retrieved from

Curtin, M. (March 1997). Introduction to Network Security. Retrieved from

Musich, P. (2003). Cisco Beefs up Security Tools. EWeek, 36.

Sources Used in Documents:


Bradley, T. (January 24, 2010). How to Stop 11 Hidden Security Threats. Retrieved from

Curtin, M. (March 1997). Introduction to Network Security. Retrieved from

Musich, P. (2003). Cisco Beefs up Security Tools. EWeek, 36.

Cite this Document:

"Router Security Understanding Network Security" (2012, February 20) Retrieved August 13, 2022, from

"Router Security Understanding Network Security" 20 February 2012. Web.13 August. 2022. <>

"Router Security Understanding Network Security", 20 February 2012, Accessed.13 August. 2022,

Related Documents
Network Plan for ABC Corp
Words: 2595 Length: 9 Pages Topic: Education - Computers Paper #: 5407711

The paper creates Extended Access Control Lists for ABC Corporation using Port Numbers. Extended Access Control Lists for ABC Corporation using Port Numbers access-list 101 permit tcp any eq 20 access-list 101 permit tcp any eq 21 access-list 101 permit tcp any eq 22 access-list 101 permit tcp any eq 25 access-list 101 permit tcp any eq 35 access-list 101 permit tcp any eq18 access-list 101

Network Management and Systems Administration
Words: 937 Length: 3 Pages Topic: Education - Computers Paper #: 86522281

Network Management and System Administration The aim of the paper is to establish the difference between a system administrator and a network administrator. The paper is thus divided into three sections. The first section deals with the basic definition and responsibilities of a system administrator; the second does the same for a network administrator and the third compares their responsibilities to clearly identify the differences between the two. System Administrator The maintenance of

Network Design Network Engineers Together
Words: 995 Length: 3 Pages Topic: Transportation Paper #: 74690008

During the PDIOO procedure one has to define main deliverables and related actions with a direct connection to the additional value and advantage for the customer network. For instance, understanding business objectives, usage features, and network necessitieshelps a person avoid pointlesselevations and network redesigns, thus reducing the time taken to introduce fresh services in the network. Planning Phase During the planning period one can test the significance of the design for future

Security Policy of a Dental
Words: 1254 Length: 3 Pages Topic: Education - Computers Paper #: 18121461

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Pages Topic: Education - Computers Paper #: 659336

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Pages Topic: Business Paper #: 25262390

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and