Application of computer network security system

Publish Year: 1399
نوع سند: مقاله کنفرانسی
زبان: English
View: 325

This Paper With 5 Page And PDF and WORD Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CMECE03_094

تاریخ نمایه سازی: 17 اسفند 1399

Abstract:

Today’s the network security is more important to personal computer, organizations, and the military users. The world is becoming more interconnected with the advent of the Internet and new networking technology. Due to the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses in the world secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an intranet to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed. Flourishing in today’s economy, service providers should provide open and easily accessible communications services, which will enable their end users to contact anyone in the world. The same open and freely scalable communication architecture offers limitless communications services to end users and also sets a very attractive target to hackers who would abuse that open communication access for their own financial benefits. A security implementation of an organization, irrespective of its size, should consider all forms of access and intrusion on network hardware both physically and remotely, such as environmental monitoring, using video surveillance and IP, securing remote access using AAA (TACACS+) and deploying of firewalls and demilitarized zone. Because security is a long-term issue, service providers need a security strategy and staff that is well educated in that strategy. To that end, this article discussed the tools and practices that are indispensable to network operators in securing their networks against denial of service (DoS) attacks and other common security threats. Finally, service providers can turn those necessary security protections into profitable managed security services for their enterprise customers.

Authors

Yoonis Raysee

Department of Computer Sciences, Payame Noor University, IRAN