Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2014, International Journal of Computer Applications
Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates establishment of new offices. However, reliability and security of services provided by ELANs need to be ensured at all times to meet expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats were critically examined in one of the ELANs. It was observed that known vulnerabilities were still around within the network. Based on the findings, the paper suggests that all software used in the networking devices need to be updated; unneeded open ports need to be closed; cache servers and security policy need to be implemented. The suggestions will ensure stability of the network during scaling out as the number of staff continues to grow.
Network security has become a key issue in today’s world of technology. Network administrators need to keep up with the recent advancements in both the hardware and software fields to prevent their as well as the user’s data. This article aims to identify the need for network security and the various threats that are present today with respect to networking computer systems.
Technologies for Protecting Networks
Designing, planning and managing telecommunication, industrial control and enterprise networks with special emphasis on effectiveness, efficiency and reliability without considering security planning, management and constraints have made them vulnerable. They have become more vulnerable due to their recent connectivity to open networks with the intention of establishing decentralized management and remote control (
2003
By writing this paper a small effort has been put to understand the growing network needs and its security. Various types of network threats and security services are discussed. This will help in designing a secure and robust network infrastructure by discussing management security policies and risk analysis.
In addition to the advancement of the web, safety, as well as protection, came to be significant stress. Additionally, the background of security allows a much better understanding of the look of safety advancement. The net structure, on its own, enabled lots of safety threats to happen. The type of the world wide web, when regulated, can easily decrease the practical assaults that could be delivered throughout the network. Recognizing the strike techniques permits appropriate surveillance to surface. Many companies protect on their own, coming from the internet using firewalls in addition to the shield of encryption devices. Businesses make an "intranet" to keep connected to the internet but gotten from possible threats. This paper briefly discussed about the security threats, security vulnerabilities and advance network security policies.
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being perfo...
International Journal of Advanced engineering, Management and Science, 2017
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an "On Demand Manner". This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
—Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integrates different operating systems and hosts hundreds of servers that provide several services such as web applications, databases, E-mail, and others. Security threats represent a serious problem to EN. They try to damage enterprise confidentiality, integrity, and availability. Security provides protection against attacks, hacking, and data theft. In this paper, we propose a security model (SMEN) of EN. The proposed model provides security at different layers. It integrates both hardware and software security solutions. We perform a defense evaluation for the proposed model The results show that SMEN was able to detect and prevent all attacks and malwares that were induced by the framework Metasploit. Performance evaluation shows that applying proposed model has a little negative effect on bandwidth utilization and hence on network performance.
Journal of Information and Computational Science, 2020
Network security is the main and essential thing in any network whether that is School, College, University, Government or Military Network. With the advancement in networking technologies, now it is a very big challenge to secure the network from advanced hackers and intruders. It is a very big concern to save your network and if we modify the structure of the internet then we will be able to secure our network because this will decrease the chances of intrusion. Most organizations create their intranet to secure themselves but they often connected to the internet by using different techniques and devices like firewalls and IDPs. So to understand the different threats that can be happened on any network and their causes and their solutions are very important and are being reviewed here.
In this paper the flaws in the network security and its impact on people have been discussed. The paper also covers a brief perspective of the threats faced in a computer network and some tools that can be used to reduce the exposure to the risks of network computing have also been discussed.
2019
With the ushering in of the information age, a wide range of technologies in the field of computer science have emerged such that many network techniques are broadly utilized in different sectors of the society at large and in its wake not only has made great economic and social benefits, but also have immensely promoted the rapid development in culture and systems. While the openness and adaptability of computer network has brought us a ton of benefits both throughout our lives and work, it also has caused a series of information security problems which put our life at risk. With the fast advancement of computer network technology, ensuring the security of the computer becomes a very essential factor that cannot be disregarded. Three major threats confronting computer network security include: threat from hackers, computer virus and denial of service attacks whiles some measures leading to the safety of the network also include legal measures, technical measures as well as management measures. This paper seeks to investigate the primary risk confronting computer network security, address system security innovations and advances to help tackle the shrouded risk of the current basic system security. KEYWORDS-Information age, Computer network, information security
With the advancement in technology we are having everything available on a single click. Instead of wasting a lot of time while standing in a queue for a task to be done now we just have to open our device and connect it to the internet and the task completes in few minutes. This all is possible due to the availability of network. On one side where we are saving the time on the other side we are exposing our secret information to a third party which may misuse it. It is because the structure of internet itself allowed many security problems to occur. We can modify the architecture of internet to reduce the possibility of attack on data. If we talk about various business organizations they keep themselves protected from threats by connecting there self to intranet instead of internet. The Network Security can be simple or complex depending upon the requirements. In order to understand the present scenario of research in this field we must first understand its importance, history and various technologies which can be used to provide security measures. Keywords— Network Security, Security Importance, History of security, Attack Methods, Vulnerable aspects.
2010
The purpose of this final year project is to research on new network security products and implementation techniques in order to enhance the current network security structure of Savonia University of Applied Sciences. This is very important because, it will avoid the university from suffering any major network attack associated with the present network security architecture. At the time this final project was approved, the university network security architecture was optimized but however, with immerging sophisticated threats and network attacks on daily basis there was need to keep researching on best means to protect the network from future attacks. In this final project research, following security products were uncovered to produce best network security results when implemented in an integrated framework. The products are: Cisco network admission control, Cisco secure access control server, Cisco network assistant and Windows 2008 server. This thesis shows how to implement a robust network security architecture with the uncovered outstanding security products. Savonia University of Applied Sciences has adopted using Cisco network assistant to securely manage Cisco network switches to minimize configuration errors. Cisco admission control and Windows 2008 server is up for implementation in the near future.
Computer networks have arguably become ubiquitous (having grown exponentially over the last 15 years) and synonymous with organizations that thrive on excellence. Hardly will anyone set-ting up a firm today, do so without thinking of the modalities of incorporating an efficient computer network infrastructure that connects the business to the outside world especially via the Internet. This is because present day businesses depend heavily on platforms and network infra-structures that make communication easy, efficient, available and accessible. Robust computer networks provide such basis for interactivity, thereby bringing a whole lot of people and businesses together. Also, in this age of the internet, almost anyone anywhere, can access information from any part of the world. Consequently, all these have amounted to growing security concerns over the years, critical across sectors and industries. In this paper, a comprehensive study of some network vulnerabilities is carried out and counter-measures on how they can be prevented or contained to prevent malicious attacks and how to prevent wanton escalation in the event of a successful attack.
— Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people becomè`wired'', an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them. Some history of networking is included, as well as an introduction to TCP/IP and internetworking. We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality. It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace.
2010
In recent years, so many networks are being built and some of the organizations are able to provide security to their networks. The performance of a network depends on the amount of security implemented on the network without compromising the network capabilities. For building a secure network, administrators should know all the possible attacks and their mitigation techniques and should perform risk analysis to find the risks involved in designing the network. And they must also know how to design security policies for implement the network and to educate the employees, to protect the organization's information. The goal behind this case-study is to build a campus network which can sustain from reconnaissance attacks. This thesis describes all the network attacks and explores their mitigation techniques. This will help an administrator to be prepared for the coming attacks. This thesis explains how to perform risk analysis and the two different ways to perform risk analysis. It also describes the importance of security policies and how security policies are designed in real world.
International Journal of Innovative Science and Research Technology, 2022
Network security is becoming increasingly important to personal computer users, businesses, and the military. Security became a major concern with the advent of the internet, and understanding the history of security allows a better understanding of the emergence of security technology. Many security threats can occur due to the structure of the internet. If the internet's architecture is changed, it can reduce the number of possible attacks that can be sent across the network. Knowing the attack methods enables us to respond with adequate security. Many businesses use firewalls and encryption mechanisms to protect themselves from the internet. To stay connected to the internet, businesses create an "intranet.
Network Security, 2007
The purpose of this chapter is to introduce some basic network security terms and lead the reader through the rest of the book. It provides a baseline level of knowledge in the areas of information technology (IT) security and network security for those readers who are unfamiliar with these concepts. It also provides a set of common terms and defi nitions which will help those readers who already have some basic knowledge in network security to have a common understanding of the chapters that follow. However, advanced readers with a good background in networking and IT security may skip this chapter and proceed to the more specifi c areas covered in this book.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.