Abstract- The rapid development in computer network technology leads to the security challenges faced by it at every step of its growth. Three main threats facing computer network security include: hackers, computer virus and denial of service attack. Safety factors of the network are mainly: resources sharing, data communication, computer virus and TCP/IP protocol security flaws. A safety network system should include at least three kinds of measures: legal measures, technical measures and review and management measures. The paper analyzes the main threat facing computer network security, discusses network security technology and advances some effective countermeasures in view of the hidden danger of current common network security. …show more content…
Different users have different understanding towards network security. To general users who may just prefer individual privacy or confidential information to be secure and to be protected from eavesdropping, tampering and forge. But for network providers, they not only care about the network information safety, but also cope up with sudden disasters, such as military strike to network hardware damage. Major threats of computer network 1. Damage the integrity of information: attackers may damage the information integrity in different aspects: changing the order and form of information. Deleting the information and inserting some other content. 2. Pretending: The attacker may pretend to do the following: pretend to be leadership issue orders and read the documents; Pretend to be host deceives legitimate hosts and legitimate users. Pretend to be network control program to show or modify the access to key information, passwords, etc, excessive use of network equipment and resources: take over a legitimate user, cheat the system, take up the resources of the legitimate users. 3. Destroy System Availability: The attacker may damage from the following aspects of network system availability: making a legitimate user not able to have normal access to the network resources; Making a strict time
The purpose of this paper is to touch on the issue of Hacking. It will go into detail about the history, evolution, future and prevention of Hacking. In addition, this paper will discuss different types of hackers and their motivation behind hacking. This paper examines the major impact caused by malicious hackers and give modern examples of such attacks. To conclude, it will predict how hacking will be in the near future and give the precautionary measures Information Security professionals can take to mitigate the risk of being victimized.
Another type of method to gain unauthorised access is the exploitation of known security weaknesses. Two types of security weaknesses exist: configuration errors and security bugs. Configuration errors occur when a system is set up in such a way that unwanted exposure is allowed. Then, according to the configuration, the system is at risk from even legitimate actions. An example of this would be if a system “exports” a file system to the world (makes the contents of a file system available to all other systems on the network). Then any other machine can have full access to that file system.
Security is almost certainly the most difficult aspect of a network to perfect. It is important to have the correct procedures and components in place to make certain network security is being accounted for and addressed on any given network. The journal, “Future Generation Computer Systems” elaborates on this necessity for an information system. “Future Generation Computer Systems”, this component of a network is discussed thoroughly. “Essentially securing an Information System (IS), involves identifying unique threats and challenges which need to be addressed by implementing the appropriate countermeasures” (Dimitrios Zissis, Dimitrios Lekkas, 2012). This was achieved through configuring access lists as well as CHAP configuration on the routers connecting to the edge
Eavesdropping, breaking and entering, social engineering, malicious code, session hijacking, man-in-the-middle attacks, wireless hacking, SQL injections, web site attacks, and more.
When a computer connects to a network and engages in communication with other computers, it is essentially taking a risk. Internet security involves the protection of a computer's Internet account and files from intrusion of an unknown user. Internet security has become an alarming issue for anyone connected to the net. This research paper argues the need for security over corporate intranets that have been dealing with the lack of security within the internet and the numerous attacks and malware threats that hackers use to breach security measures. A corporation uses a private computer network that uses Internet Protocol technologies to securely share any part of an organization's
Viruses, insider abuse of net access, unauthorized access by insiders, system penetration by outsiders, theft of proprietary info, sabotage, and financial fraud.
Maintaining Access – Once a black-hat hacker gains access to a system, it will target the data that is usually found on the WAN domain, many of these servers may hold intellectual
Because these vulnerabilities can provide access to the sensitive information, this can result in loss of confidential data. In some cases, the attacker can take control the host web application by using SQL injection.
Network Security Issues – major threats and the means to fight them Network security issues are the top priority of all who want to protect their data.
With the increasing use of technology today with computers, there are better ways we can came up with to stop vulnerabilities in a network. As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Network security is the becoming more important to a business because of the networks and applications. You never know when someone is coming for your business system. Looking at every strategy you have going on for your business. Need to have the set of tools for the security walls to be high. When dealing with hackers or competition all servers not to be access easily. There is a large amount
Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself.
The correct configuration of security technologies is mandatory to balance the need for access and safety of information (Cavusoglu & Raghunathan, 2009). Many companies use the layered approach to ensure protection of their network information system (Cavusoglu & Raghunathan, 2009). By using this approach, many security technologies rely on each other to operate effectively (Cavusoglu & Raghunathan, 2009). Three technologies commonly used together are Intrusion Detection Systems, Intrusion Prevention Systems, and firewalls. When configured properly, these technologies complement each other (Cavusoglu & Raghunathan, 2009).
An attack is any malicious or accidental disruption in the confidentially, integrity, or availability of information and network resources. Attacks can come from many places, electronic, physical, or human. Electronics attacks may come from the external network (Internet) or the internal network (Intranet); physical attacks can come in the form of hardware and equipment sabotage or theft, and human attacks most often come in the form of social engineering. Some of the attacks identify and evaluate in this paper are: spoofing, replays attacks, access attack suppress-relay, and source and repudiation attack.
It is crucial to understand your cyber environment: hardware, software, operating systems, storage, etc. Attackers frequently take advantage of system hardware that has been
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.