Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Concept Of Security Issues In Networking

tag 1 Download6 Pages 1,348 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
Cristopher Webb Student Reviews Student Reviews Student Reviews Student Reviews Student Reviews 4/5 hire me

Question:

Discuss about the Security Issues in Networking.
 
 

Answer:

Introduction

A network of data or the network of computer is a network of digital telecommunications that enables the nodes for sharing the resources [2]. In all computer networks, the linked devices of computing normally exchange the confidential data amongst themselves with the help of a specific link of data. The networking connections between all the nodes are always found by utilizing either of wireless media or simply by cable media [7].The devices of computer network, which begin, direct and also finish the confidential data are known as the network nodes.

The following report outlines a brief discussion on the security issues in networking. The report discusses and provides a brief discussion about the background of the security issues in networking and explains the topic properly [10]. The report also gives technical details on the network security and the probable advantages and disadvantages of it. The final part of the report also gives suggestions about the improvements of network security. The description of the above topic is given below.

 

Background and Related Areas (Computer Network)

Network of computer is a collection of linked computers. These computers on any particular network are known as nodes. This link between the various computers is done with the help of the Ethernet cable, cabling and wirelessly with the radio waves [2]. These interlinked nodes or computers usually divide the resources, such as the easy access to the connection of Internet, file servers, printers, and many more.

Explanation of the Topic: Security issues in Networking

Computer network is secured with the help of several security measures. The network of the computer can be easily manipulated if not secured on time [8]. This can lead to extreme danger for any computer and the confidential data or information stored within it. Network security mainly includes the agreement of easy access to confidential data in any particular network that is managed by the administrator of the network. The users can easily select or are allocated with a username and password or additional authenticated information, which enables the users for accessing the programs and the information in their power [5]. Network security even covers a diversity of both private and public networks of computer, which are utilized in daily tasks; conduction of communications and the transactions amongst all the individuals, government agencies and businesses. 

 

Technical Details

The computer network can be secured with various measures. There are various ways or several technologies for securing the computer network [4]. The main ways or technologies for securing computer network are as follows:

  1. i) Passwords: This is the most basic and the simplest technology for securing a computer network. Passwords help to keep the authenticity of the computer network easily and without any type of expenses [5]. Moreover, these passwords can be changed or altered within specific period of time, so that the hackers do not get time to hack the passwords and enter into the computer network.
  2. ii) Encryption: This is again another important way of securing any type of confidential data, information and computer network. The procedure of encryption mainly follows with the encryption or hiding of the original message from any type of intruders [6]. The encryption procedure mainly deals with a public or private key that locks the content of the message by making it protected by the encrypting key. The encrypted version of the message can only be opened with the help of that public or private key.
  3. Antivirus: Antivirus is a type of software that keeps the security of any computer network. This mainly scans and removes the virus from the computer [3]. There are various types of antivirus software present in the market. All of them usually work in the same manner; however, quality varies according to the price of the software.

Advantages and Disadvantages

The computer network security has several advantages and disadvantages. The main advantages of network security are as follows:

  1. i) Enhancement of Communication: The communication is enhanced due to the network security and this is the most important and significant advantage of the security of computer network.
  2. ii) Information Availability: The information is available and thus this availability of information is claimed as one of the most important advantages of computer network security [7]. The computer network enables the access to a huge amount of necessary information that mainly involves the current events.

Enables Sharing of Resources: The most convenient resources are shared with the help of computer network security [7]. These sharing of resources are extremely important for any computer network and thus can be claimed as one of the most important advantages.

 


Sharing of Files: Networking of computer mainly enables the easy access and share of files. The complexity of the procedure is reduced with computer networking [9]. Thus, it should be secured with utmost privacy.

In spite of having such vast advantages, computer networking do have some of the most important and significant disadvantages. They are as follows:

Lack of Independency: The networking of computers mainly lacks the independency and is solely dependent on the server [7].

Issues in Security: The computer network does not have enough security and there is always a high chance that the confidentiality will be lost.

Presence of Excessive Computer Virus: The computer virus or the malware is the most important and significant problem in any computer network [5]. The files that are stored in the computer system often are corrupted due to the presence of excessive amount of computer virus and malware.

Expensive Set Up: The entire set up of the computer network is extremely expensive and this is one of the major disadvantages of the networking of computer.

 

Improvements about the topic

The security issues of networking can be improved in the future with the help of various and several methods. The most basic and the simplest way of improving the securing the network issues are as follows:

  1. i) Authentication: This is the most important and significant method for improving the security issues in networking [2]. The network should be authenticated and this will avoid any type of security problems in the network.
  2. ii) Antivirus: This is the second method for improving the security issues in the network. The antivirus is a software that helps in the overall security of any particular network.

Conclusion

Therefore, from the above discussion it can be concluded that, network security is the most important factor in case of computer network. A network of data or the network of computer is a network of digital telecommunications that enables the nodes for sharing the resources. The networking connections between all the nodes are always found by utilizing either of wireless media or simply by cable media. The devices of computer network, which begin, direct and also finish the confidential data are known as the network nodes. The above report describes about the security issues in networking. The report also gives technical details on the network security and the probable advantages and disadvantages of it. The final part of the report also gives suggestions about the improvements of network security. The suggestions help to understand the entire concept of security issues in networking.

 

References

M. Ko?odziejczyk and M. Ogiela, "Applying of security mechanisms to middle and high layers of OSI/ISO network model", Theoretical and Applied Informatics, vol. 24, no. 1, 2012.

B. Forouzan, Data communications and networking. New York, NY: McGraw-Hill, 2013.

H. Jung, Future information communication technology and applications. Dordrecht: Springer, 2013.

D. Frey, Distributed computing and networking. Berlin: Springer, 2013.

H. Hodara, "Brief Review ofOptical Fiber Communication (OFC) Conference 2013", Fiber and Integrated Optics, vol. 32, no. 3, pp. 143-144, 2013.

P. Stern, "Connection, Connection, Connection...", Science, vol. 342, no. 6158, pp. 577-577, 2013.

"Introduction to Computer and Network Security", Network Security, vol. 2013, no. 11, p. 4, 2013.

"Introduction to Information Security", Network Security, vol. 2013, no. 12, p. 4, 2013.

I. Boureanu, P. Owesarski and S. Vaudenay, Applied Cryptography and Network Security. Cham: Springer International Publishing, 2014.

F. Bao, P. Samarati and J. Zhou, Applied Cryptography and Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

OR

MyAssignmenthelp.com has assembled a team of extraordinarily talented and knowledgeable PhD qualified online dissertation experts to provide students required dissertation writing help in Canberra, Adelaide, Perth, Melbourne, Sydney and other parts of Australia. Students can buy dissertation online from us with three simple steps. Auditing dissertation help, history dissertation help, geography dissertation help, maths dissertation help are few popular services under our dissertation writing assistance.

Most Downloaded Sample Of It Write Up

Concept Of Security Issues In Networking

Download : 1 | Pages : 6

Question: Discuss about the Security Issues in Networking.     Answer: Introduction A network of data or the network of computer is a network of digital telecommunications that enables the nodes for sharing the resources [2]. In all computer networks, the linked devices of computing normally exchange the confidential data amongst themselves with the help of a specific link of data. The net...

Read More arrow Tags: Australia Lakemba Humanities Hotel and Resort Planning and Design  University of New South Wales Management 

Effective Communication : Challenges And Ways

Download : 0 | Pages : 7

Question: Discuss about the Effective Communication for Challenges and Ways.     Answer: Introduction: Communication is the soul of any organization. In fact, it is the living organism like oxygen for human beings. It is a vital link which connects with all the stakeholders. The information and communication technology (ICT) has compelled the business firms to review, redefine the strategies from sustainability development point...

Read More arrow Tags: Australia Docklands Management Team Management Performances University of Queensland MBA 

Evidence From Young European Biotech

Download : 0 | Pages : 18

Question: Discuss about the Evidence from Young European Biotech Companies.   Answer: Introduction This report covers a literature review on many terms that people are not aware about. The relations between various terms are discussed along with their importance. Innovation and creativity is the key reason of success of every organisation as it helps in gaining success worldwide. Creativity and innovation are two different terms but a...

Read More arrow

Power Consumptions Of NPC Solar Panels

Download : 0 | Pages : 3

Question: Discuss about hte Power Consumptions Of NPC Solar Panels.     Answer: System scope documentation The main aim of the system is to provide the Neighborhood Power Cooperative with the investigation report of the power consumptions and also monitor the systems that are connected to the NPC solar panels. The system should be able to provide the organization with the data about the use of power in the area. The system shoul...

Read More arrow

Concepts Of Green ICT

Download : 1 | Pages : 4

Questions: 1. As a software developer, you are required to develop programs that can be readily accessed by a wide range of clients.Discuss ways in which you can design your software and applications for 2 of the following:a.Blind or visually impaired clientsb.Clients with limited or poor hand coordinationc.Learning programs for children recovering from traumad.Clients who are colour blinde.Clients who are hearing impaired   2. We have be...

Read More arrow
Next
Free plagiarism check online Free plagiarism check online on mobile
Have any Query?