$20 Bonus + 25% OFF +
5
%
Cashback
information
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Concept Of Security Issues In Networking

tag 1 Download6 Pages 1,348 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Security Issues in Networking.
 
 

Answer:

Introduction

A network of data or the network of computer is a network of digital telecommunications that enables the nodes for sharing the resources [2]. In all computer networks, the linked devices of computing normally exchange the confidential data amongst themselves with the help of a specific link of data. The networking connections between all the nodes are always found by utilizing either of wireless media or simply by cable media [7].The devices of computer network, which begin, direct and also finish the confidential data are known as the network nodes.

The following report outlines a brief discussion on the security issues in networking. The report discusses and provides a brief discussion about the background of the security issues in networking and explains the topic properly [10]. The report also gives technical details on the network security and the probable advantages and disadvantages of it. The final part of the report also gives suggestions about the improvements of network security. The description of the above topic is given below.

 

Background and Related Areas (Computer Network)

Network of computer is a collection of linked computers. These computers on any particular network are known as nodes. This link between the various computers is done with the help of the Ethernet cable, cabling and wirelessly with the radio waves [2]. These interlinked nodes or computers usually divide the resources, such as the easy access to the connection of Internet, file servers, printers, and many more.

Explanation of the Topic: Security issues in Networking

Computer network is secured with the help of several security measures. The network of the computer can be easily manipulated if not secured on time [8]. This can lead to extreme danger for any computer and the confidential data or information stored within it. Network security mainly includes the agreement of easy access to confidential data in any particular network that is managed by the administrator of the network. The users can easily select or are allocated with a username and password or additional authenticated information, which enables the users for accessing the programs and the information in their power [5]. Network security even covers a diversity of both private and public networks of computer, which are utilized in daily tasks; conduction of communications and the transactions amongst all the individuals, government agencies and businesses. 

 

Technical Details

The computer network can be secured with various measures. There are various ways or several technologies for securing the computer network [4]. The main ways or technologies for securing computer network are as follows:

  1. i) Passwords: This is the most basic and the simplest technology for securing a computer network. Passwords help to keep the authenticity of the computer network easily and without any type of expenses [5]. Moreover, these passwords can be changed or altered within specific period of time, so that the hackers do not get time to hack the passwords and enter into the computer network.
  2. ii) Encryption: This is again another important way of securing any type of confidential data, information and computer network. The procedure of encryption mainly follows with the encryption or hiding of the original message from any type of intruders [6]. The encryption procedure mainly deals with a public or private key that locks the content of the message by making it protected by the encrypting key. The encrypted version of the message can only be opened with the help of that public or private key.
  3. Antivirus: Antivirus is a type of software that keeps the security of any computer network. This mainly scans and removes the virus from the computer [3]. There are various types of antivirus software present in the market. All of them usually work in the same manner; however, quality varies according to the price of the software.

Advantages and Disadvantages

The computer network security has several advantages and disadvantages. The main advantages of network security are as follows:

  1. i) Enhancement of Communication: The communication is enhanced due to the network security and this is the most important and significant advantage of the security of computer network.
  2. ii) Information Availability: The information is available and thus this availability of information is claimed as one of the most important advantages of computer network security [7]. The computer network enables the access to a huge amount of necessary information that mainly involves the current events.

Enables Sharing of Resources: The most convenient resources are shared with the help of computer network security [7]. These sharing of resources are extremely important for any computer network and thus can be claimed as one of the most important advantages.

 


Sharing of Files: Networking of computer mainly enables the easy access and share of files. The complexity of the procedure is reduced with computer networking [9]. Thus, it should be secured with utmost privacy.

In spite of having such vast advantages, computer networking do have some of the most important and significant disadvantages. They are as follows:

Lack of Independency: The networking of computers mainly lacks the independency and is solely dependent on the server [7].

Issues in Security: The computer network does not have enough security and there is always a high chance that the confidentiality will be lost.

Presence of Excessive Computer Virus: The computer virus or the malware is the most important and significant problem in any computer network [5]. The files that are stored in the computer system often are corrupted due to the presence of excessive amount of computer virus and malware.

Expensive Set Up: The entire set up of the computer network is extremely expensive and this is one of the major disadvantages of the networking of computer.

 

Improvements about the topic

The security issues of networking can be improved in the future with the help of various and several methods. The most basic and the simplest way of improving the securing the network issues are as follows:

  1. i) Authentication: This is the most important and significant method for improving the security issues in networking [2]. The network should be authenticated and this will avoid any type of security problems in the network.
  2. ii) Antivirus: This is the second method for improving the security issues in the network. The antivirus is a software that helps in the overall security of any particular network.

Conclusion

Therefore, from the above discussion it can be concluded that, network security is the most important factor in case of computer network. A network of data or the network of computer is a network of digital telecommunications that enables the nodes for sharing the resources. The networking connections between all the nodes are always found by utilizing either of wireless media or simply by cable media. The devices of computer network, which begin, direct and also finish the confidential data are known as the network nodes. The above report describes about the security issues in networking. The report also gives technical details on the network security and the probable advantages and disadvantages of it. The final part of the report also gives suggestions about the improvements of network security. The suggestions help to understand the entire concept of security issues in networking.

 

References

M. Ko?odziejczyk and M. Ogiela, "Applying of security mechanisms to middle and high layers of OSI/ISO network model", Theoretical and Applied Informatics, vol. 24, no. 1, 2012.

B. Forouzan, Data communications and networking. New York, NY: McGraw-Hill, 2013.

H. Jung, Future information communication technology and applications. Dordrecht: Springer, 2013.

D. Frey, Distributed computing and networking. Berlin: Springer, 2013.

H. Hodara, "Brief Review ofOptical Fiber Communication (OFC) Conference 2013", Fiber and Integrated Optics, vol. 32, no. 3, pp. 143-144, 2013.

P. Stern, "Connection, Connection, Connection...", Science, vol. 342, no. 6158, pp. 577-577, 2013.

"Introduction to Computer and Network Security", Network Security, vol. 2013, no. 11, p. 4, 2013.

"Introduction to Information Security", Network Security, vol. 2013, no. 12, p. 4, 2013.

I. Boureanu, P. Owesarski and S. Vaudenay, Applied Cryptography and Network Security. Cham: Springer International Publishing, 2014.

F. Bao, P. Samarati and J. Zhou, Applied Cryptography and Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

OR

MyAssignmenthelp.com has assembled a team of extraordinarily talented and knowledgeable PhD qualified online dissertation experts to provide students required dissertation writing help in Canberra, Adelaide, Perth, Melbourne, Sydney and other parts of Australia. Students can buy dissertation online from us with three simple steps. Auditing dissertation help, history dissertation help, geography dissertation help, maths dissertation help are few popular services under our dissertation writing assistance.

Most Downloaded Sample Of It Write Up

ICT616 Data Resources Management: Data Set

Download : 0 | Pages : 7
  • Course Code: ICT616
  • University: Murdoch University
  • Country: Singapore

Answer Topic: The proposed topic of the research based on ‘Student Performance Data’ is- ‘The major contributing factors behind the Final Grade of the students studying Mathematics and Portuguese Language’. Source of the data set: The data is collected from online source (UCI Learning website, ‘University of California’). Hence, the data set is secondary to the researcher. This website contains raw, reli...

Read More arrow

COIS11011 Foundations Of Business Computing

Download : 0 | Pages : 6

Answers: 1. Database Management System: A Database Management System can be defined as the system software that helps in the storing, managing, and creation of data in a systematic way (Jukic, Vrbsky and Nestorov 2016). A Database Management System or DBMS is also capable of providing the users and the programmers to utilize the data for further creation, updating, management and retrieval in a systematic way so that these data can be easily ...

Read More arrow

ACC2002 Managerial Accounting

Download : 0 | Pages : 10
  • Course Code: ACC2002
  • University: National University Of Singapore
  • Country: Singapore

Introduction Technology has been helping in the growth of various organizations in the market.  The implementation of technology in the accounting information system have been beneficial for the development of companies. Companies used to invest huge amount of money in these tools for development of their operational methods. Accounting has been providing solutions to different challenges including trade, competitors, business agreements ...

Read More arrow

ICT50115 Diploma Of Information Technology

Download : 0 | Pages : 4

Answers: Introduction This is a report that describes the migration process of database from file.txt to new java database. The process of data migration involves different processes (Dunn and Kelbie ,2009). This report describes this processes from notifying members to attend the scheduled meeting to test the database up to how the new database will be implemented. Notification to members Dear members, This is notify you of data migration...

Read More arrow

ITECH 7401-Balanced Leadership Perspective

Download : 0 | Pages : 5
  • Course Code: ITECH 740
  • University: Federation University
  • Country: Australia

Answer: Introduction Leadership, in general, can be said to be a social influence that guides the direction, opinion, course or action for a certain project or program. It is different from management as management is done for a specific purpose. There exist various perspectives in organizational project management which can be applied independently or in combination. These leadership perspectives continue to diversify from the old vertical l...

Read More arrow
Next
watch

Save Time & improve Grade

Just share your requirement and get a customized solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,135,324

Orders

4.9/5

Overall Rating

5,046

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

1309 Order Completed

100% Response Time

Gemmie Chen

MSc in Nursing

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

It seems a same kind of stuff as posted prior. I am okay with this. Thanks for your help...

flag

User Id: 172914 - 12 Nov 2019

Australia

student rating student rating student rating student rating student rating

Piss poor quality work. They didnt even want to fix their mistakes. No conclusion, no references, improperly formatted. Was definitely not worth the money and will never use them again. Never received the four pages that I paid for

flag

User Id: 341622 - 12 Nov 2019

Australia

student rating student rating student rating student rating student rating

good work by the writer and i am going to ask for more assignments from this writer only

flag

User Id: 312817 - 12 Nov 2019

Australia

student rating student rating student rating student rating student rating

Assignment was not complete. Improperly formatted. No in text citations, no references. Ask for a redo or completion and they wanted me to wait 24 hours to fix a mistake they made. They wanted me to submit my assignment late and didnt want to refund...

flag

User Id: 341622 - 12 Nov 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?