[ REPORT ] INTRODUCTION COMPUTER NETWORK

INTRODUCTION


Although the history of the Internet is relatively short, its growth has been dynamically explosive. The number of Internet users worldwide has grown from 95 million to 130 million in 1998, and it is projected that there will be 350 million users in the year 2003 (eMarketer, 1998). The Internet is a worldwide collection of networks that links together millions of computers by various means, such as modems, fiber optic lines, routers, and servers. It provides connections to businesses, the government, industries, educational institutions, and individuals.

 Each of these organizations has become increasingly dependent on networks and distributed computing and processing systems. Furthermore, because they possess a critical and integral asset of information, internetworking security and what measures to protect this information has become a major area of concern. In this report we will address the key concepts of network security, common network vulnerabilities, network security threats and attacks, security measures and tools, and the development of a network security policy and proper violation response plan.

A breach in network security could cost your company a great deal in lost productivity, lost data, repair work, and loss of confidence among customers, partners, and employees. But these damages are preventable. You just need a solid security strategy and a well-planned implementation. With the explosion of the public Internet and e-commerce, private computers and computer networks are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees, and even human error all represent clear and present dangers to networks. And all computer users, from

The most casual Internet surfers to large enterprises could be affected by network security breaches.

 With the rapid explosion of e-commerce and the Internet as a serious business tool, a lot of attention has been given to “information security.” Helping businesses securely manage information has become a multi-billion dollar industry. Companies such as Verisign®, Microsoft®, Cisco®, Oracle® and SUN Microsystems®, to name a few, all spend a significant amount of time and money developing their services with security in mind.

    .

  For purposes of this document, rather than describe what security is, we’ll discuss the needs that security should fill. We’ll address the need for physical security, back-ground checks, firewalls, access codes, to-kens and other methods all designed to protect one’s information. In general, the need for security can be summed up as follows

Now we talks about network security, what it is?

    Network security is an ongoing process; as technology progresses and your business evolves, it will be more important than ever to keep up with your changing security needs

“Protective measures to ensure the absence of intrusion or other damaging activity.” Benjamin Field – Securityfocus.com

Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.



 With such a wide range of companies engaged in the information security business, it begs the question, “What exactly is security?” Security means different things to different people depending on their age, position within a company or access to “top secret” information.

The needs for security


1. Keep outsiders from entering the organization and gaining access to sensitive or private information. Access can be gained physically or virtually.

2. Prevent unauthorized information from leaving the premises.

3. Monitor and control internal employees’ access to information and systems.

if u like the post just say thank u in comment box.

No comments:

Post a Comment

its cool