Network Security

Read Complete Research Material

NETWORK SECURITY

NETWORK SECURITY

NETWORK SECURITY

Introduction

With spread of Hackers and Hacking incidents, time has come, when not only system administrators of servers of big companies, but also people who connect to Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have the static IP or the dynamic one, if your system is connected to Internet or an Ethernet system, and then there is every chance of it being attacked. (Cisco 2006)

Body: Discussion and Analysis

The challenge of operating the secure web site is very real. The 1999 Information Security Industry Survey conducted by ICSA reports number of companies that have been attacked by hackers jumped 92 percent from 1997 to 1998. The asymmetric nature of public key cryptography makes it the valuable encryption tool for messaging on web because it means two parties (sender and receiver) do not need to share the single key. When you encrypt the message with your private key, then the recipient using your public key to decrypt message will know that it is in fact from you. When someone uses your public key to encrypt the message to you, they will know that only you (as holder of private key) will be able to decrypt and read it.

Basic Security Concepts

Three basic security concepts important to information on Internet are confidentiality, integrity, and availability. Concepts relating to people who use that information are authentication, authorization, and no repudiation.

When information is read or copied by someone not authorized to do so, result is known as loss of confidentiality. For some types of information, confidentiality is the very important attribute. Examples encompass study facts and figures, medical and protection records, new product specifications, and business buying into strategies. In some locations, there may be the legal obligation to protect privacy of individuals. This is especially factual for banks and loan businesses; debt collectors; enterprises that continue borrowing to their customers or issue credit cards; clinics, medical practitioners' agencies, and health testing laboratories; individuals or bureaus that offer services such as psychological therapy or pharmaceutical treatment; and bureaus that collect taxes. (Self-Defending Networks 2006)

Incidents and Internet Growth

Since CERT & Coordination Center began operating in 1988, number of security incidents reported to center has grown dramatically, from less than 100 in 1988 to almost 2,500 in 1995, last year for which complete statistics are available as of this writing. ...
Related Ads