Academia.eduAcademia.edu

Outline

Computer Network Security: Risks and Protective Measures

2019

https://doi.org/10.1201/9781420013252

Abstract

With the ushering in of the information age, a wide range of technologies in the field of computer science have emerged such that many network techniques are broadly utilized in different sectors of the society at large and in its wake not only has made great economic and social benefits, but also have immensely promoted the rapid development in culture and systems. While the openness and adaptability of computer network has brought us a ton of benefits both throughout our lives and work, it also has caused a series of information security problems which put our life at risk. With the fast advancement of computer network technology, ensuring the security of the computer becomes a very essential factor that cannot be disregarded. Three major threats confronting computer network security include: threat from hackers, computer virus and denial of service attacks whiles some measures leading to the safety of the network also include legal measures, technical measures as well as management measures. This paper seeks to investigate the primary risk confronting computer network security, address system security innovations and advances to help tackle the shrouded risk of the current basic system security. KEYWORDS-Information age, Computer network, information security

FAQs

sparkles

AI

What are the two main classifications of computer network security measures?add

The paper categorizes computer network security measures into physical security and logical security, addressing both hardware safety and data integrity.

How do human attacks differ between internal and external sources?add

Internal attackers are typically employees who have direct access to network resources, while external attackers exploit vulnerabilities without direct access, making them easier to defend against.

What role do firewalls play in computer network security according to the research?add

Firewalls serve as a network security framework by monitoring both incoming and outgoing traffic, effectively preventing unauthorized access and mitigating Denial of Service attacks.

What are some examples of malware discussed in the text?add

Examples of malware include computer viruses, worms, Trojan horses, and ransomware, all designed to cause harm once executed on a system.

Why is training important for enhancing network security management?add

Training helps users adopt strong security habits, such as using complex passwords, thus strengthening the overall security awareness within an organization.

References (17)

  1. Sun, X. The study on computer network security and precaution. in Proceedings of 2011 International Conference on Computer Science and Network Technology. 2011.
  2. Fuguo, L. Study on security and prevention strategies of computer network. in 2012 International Conference on Computer Science and Information Processing (CSIP). 2012.
  3. Zheng, X. Computer network security and measures. in Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. 2011.
  4. Qing, W. and C. Hongju. Computer Network Security and Defense Technology Research. in 2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). 2016.
  5. Granjal, J., E. Monteiro, and J.S. Silva, Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey. Ad Hoc Networks, 2015. 24: p. 264-287.
  6. Tuna, G., et al., A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 2017. 109: p. 142-154.
  7. OneM2MPartners, o.M.-T.-.-S.-V., 2014-April-10, OneM2MPartners, oneM2M-TR-0008-Security-V1.0.0 , 2014-April-10. 2014.
  8. Definitions and Timeline, in Computer Viruses and Malware, J. Aycock, Editor. 2006, Springer US: Boston, MA. p. 11-25.
  9. Glossary, I.S., Internet Security Glossary. Internet Security Glossary.
  10. Kittur, A.S. and A.R. Pais, Batch verification of Digital Signatures: Approaches and challenges. Journal of Information Security and Applications, 2017. 37: p. 15-27.
  11. Blahut, R.E., Cryptography and Secure Communication. 2014, Cambridge: Cambridge University Press.
  12. Oppliger, R., Internet security: firewalls and beyond. Commun. ACM, 1997. 40(5): p. 92-102.
  13. Peltier, T., Peltier, J, Peltier, T., Peltier, J. (2007). Complete Guide to CISM Certification. New York: Auerbach Publications, https://doi.org/10.1201/9781420013252. 2007, New York: Auerbach Publications.
  14. Servin, A., Distributed Network Defence and Reinforcement Learning. Conference Proceedings, 2006.
  15. Collins, T., 7 Common Server Room Problems for Businesses to Consider. 2015.
  16. Chunli, L. and L. DongHui. Computer network security issues and countermeasures. in 2012 IEEE Symposium on Robotics and Applications (ISRA). 2012.
  17. Benjamin Sarpong" Computer Network Security: Risks and Protective Measures" American Journal of Engineering Research (AJER), vol.8, no.05, 2019, pp.52-58