Sunteți pe pagina 1din 13

Running head: COMPUTER NETWORK SECURITY

Computer network security Name: Tutor: Course: College: Date:

COMPUTER NETWORK SECURITY

Introduction A network (or more specifically a computer network) relates to any interconnected computers. This is commonly achieved by linking various computing peripherals through nodes so that one node may communicate with another. Recent years have seen immense growth in terms of network growth due to acceleration in communication across the globe. Thus, in todays world it is almost impossible to single out one network without interconnecting or touching on the other; a notion that has brought about the Internet. This has definitely served communication purposes well but then there is the negative aspect in terms of security to these networks. In fact, as a result of seemingly endless interconnection of computer networks there are countless threats including worms, denial of service, IP spoofing, viruses, eavesdropping, Trojans, phishing and malware. Malicious individuals have gained a prosperous channel for carrying out malicious activities. Consequently, this has necessitated development of various security aspects to counter the ever increasing threats to networks as a valuable resource. Detailed description of the area researched As such, computer network security includes any mechanism that is applied to secure or guard computing resources; computer network comprises of various peripherals such as routers, switches, cables, and nodes. An effective network should have a mechanism to prevent, detect and or repel any form of an attack that is launched against. It is worth noting that attacks to computer networks are carried out for malicious gains and this can prove costly in most cases. This has only increased the need for proper and effective network security mechanisms as organization, personal computer users and other fields become reliant on them. Some environments such as military transfer critical and confidential applications via networks and

COMPUTER NETWORK SECURITY

protection from unintended purposes must be established. The continued interconnection of computer networks (Internet) has meant that a malicious person on one corner of the planet is able to attack another network on the other end. Computer network infrastructures are being subjected to millions of security threats on a daily basis if no proper measure in place, the likely of them being compromised is augmented. Therefore, security is indispensible to networks and their intended operation. Agreeably, there exist not even single technological mechanisms that can be put in place so as to assume that computer networks are secured; in recognition to the fact that network attacks are taking a different shape with each minute gone. Thus, development of an effective security plan remain a challenge and especially when connected to the internet or other networks. However, this has not deterred development of security mechanism. Computer networks have emerged more complex than ever and a single methodology can never manage the complexity of security requirements that has come with it. This has lead to scenarios in which various technologies are used on a single computer network in order to give it even more capacity to deal with threats. Hence, todays world of networks uses a combination of diverse security technologies or tools to secure different peripherals including cables, computers, routers, switches and others. This has been achieved through development of effective security mechanisms by understanding potential attackers, security issue, factors that exposes a network to vulnerabilities and the required security levels. Some of the technological tools include firewalls, intrusion detection, encryption and others. In turn, this has considerably lessened vulnerability of computer networks to attacks. Technology involved in the area

COMPUTER NETWORK SECURITY

Firewall may relate to hardware or software that is placed on a computer network in order to mitigate security threats. In most cases, they are placed on the point of connection to the external network (gateway). Thus, a firewall takes the form of a characteristic border control mechanism (or perimeter defense) in recognition to the fact that most probably, security threats emanate outside the intranet (Davis & Ackerman, nd). Thus, this technology is commonly used to block unwanted traffic (attacks to a network) from the external networks but may also be applied to block traffic from the intranet. As result, a firewall forms the front line network defense against intruders. The technology is designed to prevent any unauthorized access to an intranet or private network. Mostly, the technology is implemented as a combination of both hardware and software all of which augment network security. Another form of technology used in computer network security is IDS intrusion detection system. This acts as an additional measure for protection that is handy in warding off intrusions. Specifically, IDS systems refer to hardware and software devices applied on a network so as to detect an attack. The technology monitors connections on a network in order to determine if attacks are being launched. IDS may be designed just for monitor and alert in case of an attack whereas others try to block it. The third common technology for network security is anti malware software and scanners. Malicious software malware for short- include Trojan, worms as well as viruses. Such malicious software installs themselves into computer network resources causing them to function unexpectedly. Thus, any user trying to operate these resources may find them unusable or even behaving the opposite of what is expected. Most malware installations are specifically intended

COMPUTER NETWORK SECURITY

to negate common user commands and this may infuriate any operator. Anti-Malware software technology is installed on a network to detect and cure the infected system. Secure socket layer SSL- technology is also used to provide security for a network. This refers to a suite of protocols which is standard mechanism for attaining a considerable security level between a network and another (commonly a website on another network and a web browser). SSL is designed in order to create a secure channel (tunnel) between a browser and the server which in turn means that any information exchanged is secured within the established secure channel. This way, access to the server is authenticated using certificates and in case of unrecognized identity an attempt is dropped. This particular technology is handy if a network is to secure itself from phishing attacks. Cryptographic technologies are also used in providing network security. This includes encryption and as a tool it is being widely used in security engineering. In general, it involves the use of ciphers and codes that transform information into data that is unintelligible or unreadable. Specific software or hardware transform information transferred over a network into a format that cannot be readily read by malicious individuals or any person for that matter. This offers a considerable level of security to a computer network since intruders would see no need of attacking such a network because when they manage to there are no possible gains. Thus, encryption protects the network from physical threats including unauthorized spies within the intranet. In order to access or read the encrypted network information, it must be decrypted using a proper code or key. Future trends in the area

COMPUTER NETWORK SECURITY

As network threats continually take a new face with each network designed, so do security and the future will most definitely take a new dimension altogether. In fact, threats to a computer network is fast changing that even with the various technologies listed above and many othersit is becoming almost impossible to stop or eliminate them. For instance, viruses continue to be a menace even with anti-malware technology in place. This is because threats are taking new characteristics that are not easy to deal with. Overall, the nature of network security will continually become complex as technologies advances. Computing and digital interactions over networks are becoming ubiquitous and users privacy is increasingly being exposed. As part of the communication and within application data, a considerable information amount may be revealed which may of course lead to violations of individual users privacy (Haibo et al, 2006). Therefore, network security will increasingly include many aspects in all its facets. Technical solutions to network security are fast becoming mature as well as evolving from designs that are ad hoc to those that are subject to formal analysis. Areas in which most of the work has already been done involve confidentiality of network content of which include a long cryptographic research history and anonymity. In future, frameworks will be developed where the degree of anonymity offered by a network (or system) will be measured. Anonymity degree metrics will help in selecting an optimal network security strategy with respect to dummy traffic and delays so as to balance anonymity and performance. Additionally, traditional technologies were developed initially to function while security aspects were considered as secondary and thus integrated at a later stage. Digital interactions continue to expand with network interconnections and in the future security privacy- will be

COMPUTER NETWORK SECURITY

built within the systems and applications by design. As such, network security extensions will not just be added into existing networks. Network security will be addressed everywhere unlike present times in which security controls are at specific network points. In addition, as technical security measures become more and more advanced, they will be developed or designed to fit into the general plan in which they will be balanced with various needs of security as well as the intended functionality. This shows that network security will continue down the same route but specific additions will be integrated into the systems during design. Such additions will include enhanced biometric identification will be far more superior in terms of authentication when compared to the current password mechanisms. Consequently, new technologies such as smart card continue to surface in research of security for computer networks. In particular, software aspect involving network security will become even more dynamic. This has already been characterized through constant implementation of new encryption and firewall schemes. All in all, network security will purely be driven through a set of applications. The future will most likely take security similarly to an immune system that can fight off threats and consequently build itself for fight against tougher enemies. Example companies involved in the area Countless companies are involved in providing or administering network security. Some of the major companies include Cisco, Kaspersky Lab, Dell, Hewlett Packard (HP) and International Business Machines (IBM).

COMPUTER NETWORK SECURITY

Kaspersky Company is an international corporation operating in over one hundred nations from different continents. Its headquarters are situated in Moscow Russia- from where it oversees worldwide operations. The company is distinguished as among the fastest growing security companies. Various products from the company targeting provision of network security include KSCSPE (kaspersky security center service provider edition) which is a network security management tool targeting service provider. The company protects millions of users and network peripherals from attacks across the world. IBM is among the earliest companies dealing with computers. As the corporation continues to grow, it has entered into security business by partnering with more security focused companies into its activities. This has seen development of network peripherals that have security mechanisms embedded for user to activate. Cisco systems dates back to early eighties and founded in California. The company represent one of the completely security oriented companies in the world. Besides manufacturing network peripherals (routers and switches), the company has designed a specific operating system that incorporates a different form of experience in terms of security (Cisco, 2012). In fact, peripherals from the company can be configured with particular instructions to enhance security. Cisco IOSinternetworking operation system- supports features such as VPN-virtual private network-, firewall and intrusion prevention system all of which help augment security of a computer network. HP (Hewlett Packard) corporation recently purchased ArcSight - a company that is largely focused on providing security (Rashid, 2011). This shows that the one of the most renowned companies for hardware manufacturing has shifted focus on network security. Another big

COMPUTER NETWORK SECURITY

company that has partnered with more security focused corporations is Dell. I general, new security focused companies have emerged and in most cases they partner with early and established companies in order to develop better products. Regulatory issues surrounding the area Regulatory issues that particularly relate to the security of computer networks involve the breach of security by various parties including internal as well as external ones. As a result, the specific network loses integrity, is vulnerable and corrupt. Some of the major regulatory issues that are faced by computer networks involve privacy, accessibility, scalability, quality of service, infrastructure and reliability. In particular, privacy of users on a computer network is extensively regulated by numerous laws. Various international organizations including IETF control design of network peripherals including security mechanism that are applied. In this, users of a particular network ought to have their privacy protected from malicious threats as well as attacks (Bhaiji, 2008). Thus, any particular computer network is mandated with a responsibility to ensure that users do not suffer as a result of compromise to security. The network should have the capability to deal with attacks so that confidential information pertaining user privacy is maintained and should never be accessed by unintended parties. As such, design of a network is necessitated to integrate security. Failure to comply with stated regulations pertaining privacy may lead to legal actions against an organization. This happens when consumers (users) have their privacy exposed. Other regulatory laws concerning privacy of users of a computer network include HIPAA which applies on medical electronic records. The organization restricts any disclosure of individual health information that is stored within information systems. Disclosure of any form of electronic

COMPUTER NETWORK SECURITY

10

communications or record is regulated by ECPA. This pertain the usage of any information given by users of a network. In addition, distribution of such information must be to the intended persons as well as purpose. Another major regulatory issue relates to development of network security infrastructure. Various international organizations control development of standards associated to optimal levels of security. However, standards concerning means to authenticate users remain different and it is common to encounter scenarios in which disclosure is required; some environments require values of openness and time and again there is conflict with network security interest. Challenges often become even more complicated with inherent friction between the need for maintaining network security and averting unauthorized access or usage on one hand and the desire for privacy protection on the other. Overall, the current path illustrates increase in costs associated with compliance, policy making and legal exposure. Global implications for the area As network security becomes a challenge to all the partners involved, appropriate systems as well as security controls will have to be implemented. The internet is continually becoming prevalent and this increases threats from organizations down the stand alone user. Resultantly, this translates into increase in numbers of malicious users. This does not go well with todays economies that are heavily dependent on communication and related networks. Network security is critical if economies are to operate in an efficient and effective manner. Thus, threats over communication networks have translated into increase in costs during development and maintenance of this vital tool. This is because governments, organization and

COMPUTER NETWORK SECURITY

11

individual user of computer networks have to put in place various measures for security. Network security tools such as anti malware software come at a price to the organization and therefore it means that considerable resources are being channeled into different usage or means. In fact, todays government budgets allocate millions of dollars to information system security which in itself drains other sectors such as health. With all the efforts, global economy is still significantly exposed to the risk of malicious individuals who seek to infiltrate networks for malevolent gains or intent. In addition, technical expertise necessary to install measures for network security is becoming even more expensive. With increase in interconnection of computer networks, the cost of eliminating a single threat (virus, worm and others) is becoming more and out of reach for a majority of users. A single full scale attack on computer network is translating into millions of dollars going down the drain (Computerworld, 2004). Recent years have seen sensitive information pertaining banks, and governments stolen by malicious users to greater impact on global economy. Apart from the resources (funds) that are stolen in these attacks, governments and organizations have to keep on restructuring their networks in order to curb recurrence as network security threats keep on changing. Network devices are also becoming more and more costly/expensive as various security softwares are embedded into them. All of this illustrates the ever increasing cost of network security and the detrimental cost to the global economy. It is a fact that the cost of developing a simple network is increasing due to security concerns. Conclusion Computer networks are almost indispensible if not- in todays world in which much dependence is on communication. The growth of the internet (global network) is valuable but

COMPUTER NETWORK SECURITY

12

with it come a great challenge in terms of security. Currently, the challenge remains the largest impendent to global communication even though the future looks promising in terms of security technologies. A secure computing environment remains a worldwide dream.

References Molva R. (1999). Institute Eurecom,Internet Security Architecture, in Computer Networks & ISDN Systems Journal, vol. 31, pp. 787804. Douligeris C, Gerpanos D. (2007). Network security: current status and future directions. USA: John Wiley & Sons Publisher. Cisco. (2012). A beginners guide to network security. Retrieved from http://www.cisco.com/warp/public/cc/so/neso/sqso/beggu_pl.pdf Bhaiji Y. (2008). Network security technologies and solutions. USA: Cisco Press. Dowd P, McHenry J. (1998). Network security: it's time to take it seriously. Computer, vol.31, no.9. Rashid F. (2011). IT security & network security news & reviews. PC Mag. Also available from http://www.pcmag.com/author-bio/fahmida-y.-rashid Haibo T et al. (2006). The future network security. Retrieved from http://www.chinacic.org.cn/english/digital%20library/200608/4.pdf

COMPUTER NETWORK SECURITY

13

Davis D., Ackerman M. (n.d). Privacy and security issues in E-commerce. Retrieved from http://econ.ucsb.edu/~doug/245a/Papers/ECommerce%20Privacy.pdf Computerworld. (2004). Computerworld: power has a price. Vol. 38. No. 11.USA: Computer Associates.

S-ar putea să vă placă și