Network Security Term Paper

Total Length: 3486 words ( 12 double-spaced pages)

Total Sources: 1+

Page 1 of 12

Network Security

History and Evolution of Network Security:

The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include the various operations of the access to a program, the deletion of any particular program and the modification to any program. (Network Security: The Concise Tech encyclopedia)

It was during the 1960's that the vacuum-based computers that were being manufactured in the U.S.A. began to become popular, and it was in the year 1967 that the idea of developing 'encrypted passwords' in order to maintain security for the user of the computer was mooted, and, accordingly, the first encrypted password that would bar access to unauthorized persons trying to access programs on the computer was created. There was further progression during the next decade when the year 1970 saw the development of the idea of a computer user being able to log onto a remote computer. Telnet initially introduced the concept. BBN, under Ray Tomlinson of ARPANET was able to introduce the '@' sign for the users of e-mail programs on the Internet in the same year. ARPANET also introduced the very first International Internet connections from the University College of London, England to Norway.

In the year 1974, Vint Cerf and Bob Khan introduced the first 'Transmission Control Program' in their publication, 'A Protocol for Packet Network Interconnection', and by the year 1977, the easy to use computer began to be mass produced and the first company to have achieved this is the 'Apple', followed by the introduction of the 'Personal Computer' by IBM in the year 1981. When in 1982 the TCP/IP a set of protocols for the Internet user was introduced by DCA and ARPA, the Internet began to be defined as a set of connected networks, and this idea became standardized. The 'domain name' system came into being in the year 1984 and this in itself led to the growing popularity of the Internet, and by the next year the term 'hacker' had come into being. The hacker is a person who is able to push his way through the security system of the computer in order to illegally gain access to whatever he needs from such a program.

Challenge response protocols and password tokens were soon introduced, and the 'Symbiolics.com' became one of the first names to be registered as a 'domain'. The concept of 'virus' came into being for the first time in 1986, and one of the first viruses to be discovered was the 'Brain' that had supposedly been developed in Pakistan. Hackers began to do brisk illegal business by the year 1988, and one of the famous hackers of the time is the 'Cuckoos Egg' hacker, and the 'worm' virus that was responsible for infecting about 6,000 internet hosts single-handedly was also discovered at this time. The CERT or the 'Computer Emergency Response Team' was founded in the same year and this team was supposed to respond to emergencies related to infections caused by viruses like the 'worm' and the 'brain'. The fact was that even in the year 1989 the security for the Internet was not at all sufficient enough to promise safety, as demonstrated by the example of a 14-year-old child being able to crack open the computer coding of the U.S. Satellite Positioning System.

It was only during the year 1990 that the issue of Internet security was given serious enough attention, and this led to the creation of modern software that promised to provide adequate Internet security for all its users. In 1991 the 'www' formula was created in order to establish dial up connections to the Internet, by which time the number of computer viruses that had been officially discovered was 1000. The year 1993 saw the creation of the concept of 'firewalls' to fight intruders of Internet security, and in order to provide better security for the more than 100,000 hosts who provided Internet services to the more than millions of users world wide. Internet security became even more important by the year 1994 when the idea of 'shopping' on the Internet began to gain in popularity, as did banking and also advertising for several products.
In 1995, the first 'Internet Wiretap' was introduced officially, and this helped the Secret Service and also the Drug Enforcement Agency to apprehend some persons who had been conducting business over the Internet by selling some electronic devices and also certain equipment that could be used for the cloning of cell phones, thus setting a trend in the manufacture of equipment to fight for internet security.

In the year 2000, all the major websites that were in use at that time were forced into a crisis by an attack launched against them for 'denial of services'. Hackers were now being able to penetrate even the best kept and the most confidential records, like for example, the records of thousands of patients of the University of Washington Medical Center. The 'Code Red Worm' and also the 'Sircam' were discovered to have caused unlimited damage to thousands of servers and e-mail accounts at this time, and in the year 2002, there was a DDoS or 'distributed denial of service attack' wherein 13 out of 18 root servers were attacked and destroyed, and the SQL Slammer Worm was responsible for causing a massive attack of DDoS in about ten mere minutes and causing damages to five of thirteen root servers and also affecting bank ATMs and even air traffic control systems. The Sobig F virus, the Blasterworm and many other viruses also managed to damage a lot of sites and domains and this resulted in the introduction of the 'wildcard' service that was actually a site finder, to the various dotcoms. (History of Internet Security)

Motivation for the Development of Network Security:

IT industry is seeking for remedies to security problems which would enable to reduce the influence to their functioning of businesses. Hence an all-inclusive model for security solutions is essential for any firm which seeks to find a solution to the dangers involved in security concerns and for minimizing the expenses of business. (Brenton, 1998) Even though the idea of survival is foremost in the running of any sort of business establishment, the question of how to survive is more important, since all of the business's data is prone to a breach of security at any time, both external as well as internal. The results of such breaches can be extremely damaging to the enterprise in terms of losses or changes in important data, and a complete disruption of services. For example, even a high school student will be bale to penetrate all of the company's records and cause such a breach that it will lose important data that will make the company in - operational for quite some time. The breach may even occur in the company's web pages where an infiltrator can corrupt all its information, or even turn over the entire web page to a competitor, or add obscene and unwanted content or pictures into the web page, which the company will not even be aware of. However, there exists in the world of business a conflict between the objectives behind security and the operational requirements of the company. All organizations will produce information that is critical to the running of the company, and this information can be termed as 'high secret' or 'secret' or 'sensitive', and all such information will have to be protected under a blanket of security. This then is the motivation for a company to formulate and develop good security plans so that there is no breach in security. (Information Security Program Development)

The Importance of Network Security:

Despite all the facts about the various ways and means of breaching network security being used by professional all over the world, certain businesses are yet to come to terms of increasing the security for their computers and related networks. Today, companies are no longer the fortresses that could withstand any attack on their security network; they rather need more fortification against the newer methods being created by hackers and other breaches of the security of a network. It is therefore a basic requirement for all companies to have a written copy of all its formal security plans as well as of its various security policies, keeping in mind the fact that the management of the company must be able to accept this cost as part of the company's essential expenditure. (Head in the Sand- Importance of Network Security)

Network security would enable to break the hazards of the original perfect state of one's computer network. It also.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Related Essays

Mobile Devices Networking Performance and Security Related Issues

use of internet and increased mobile apps facilitates poor latency. Index Terms – Mobile Device, Network Security, Performance I. Introduction Over the years, the requirements for mobile networks have transformed and shifted from single-purpose networks to multi-purpose networks. A mobile networking system comprises of two or more different kinds of devices running specifically advanced software to maintain, for a period of time, a wireless communication linkage between them. These devices consist of mobile telephone, generally encompass devices based on Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Global System for Mobile Communications (GSM), and Wireless Personal Digital Assistants (WPDA) digital technologies and follow-ons,… Continue Reading...

The Problem Statement Related to Virtual Teams

the issues confounding virtual teams are not technological issues such as network security but rather, are related to social and psychological factors. The failure of virtual teams to achieve stated goals may be due to any number of challenges, ranging from the lack of face-to-face interaction that provides the nonverbal communication context (Quisenberry, 2018) to the different means by which each member of the team uses or interacts with the technology and with team members (German, 2017). Global virtual teams are instrumental, necessitating further research into how to formally improve their operations via improvements to leadership models or to the actual… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Network Security" (2004, November 05) Retrieved May 6, 2024, from
https://www.aceyourpaper.com/essays/network-security-57413

Latest MLA Format (8th edition)

Copy Reference
"Network Security" 05 November 2004. Web.6 May. 2024. <
https://www.aceyourpaper.com/essays/network-security-57413>

Latest Chicago Format (16th edition)

Copy Reference
"Network Security", 05 November 2004, Accessed.6 May. 2024,
https://www.aceyourpaper.com/essays/network-security-57413