Network Security: Overview of Issues, Advantages, and Challenges

Verified

Added on  2020/02/18

|5
|2291
|44
Report
AI Summary
This report delves into the multifaceted realm of networking security, examining critical issues that organizations face. It begins by establishing the significance of network security in safeguarding data and resources from unauthorized access and malicious attacks, emphasizing the growing threats posed by cybercriminals. The report explores various security concerns, including viruses, worms, Trojans, spam, phishing, and packet sniffers, illustrating how attackers exploit these vulnerabilities. It then outlines the technical details of network security implementation, such as authentication methods. Furthermore, the report presents the advantages of network security, like data protection and cyberattack prevention, alongside disadvantages like time-consuming software and the need for skilled staff. Finally, it touches upon the evolution of networking security, with advancements like stronger authentication and authorization methods, concluding with the importance of defining security policies for businesses.
Document Page
1
Security issues in networking
Name
Course
Professor
School
City
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
Introduction
Security issues in networking relates to the requirements which are required for business or even the
network supervisor which help in safeguarding of the network , the computer systems in addition to the
resources that are reliable by the networks [11]. The network needs to be safeguarded from any specific
not authorized entrance, malicious elements as well as tracking consistently.
Networking safety is a significant issue to each business that has a computer which is linked to the
coverage. The networking security that has been jeopardized signifies that the rival or even the hacker
might gain an entry to the susceptible or maybe the crucial information which they might remove or even
render off with the data that could lead to loss in data or perhaps the complete system devastation [2]. The
networking security is much more taken as the specification protection from the outside invaders in the
program. With the increase in the number of people getting linked to the networks, the security threats
that causes the massive harm is increasing [11]. The networking security is the primary section of the
network which must be managed given that the information is transferred between the computer systems
which could be vulnerable to attack [12]. Over the past five years individuals who manages the network
security have seen the massive increase of the attackers as well as the criminals creating of malicious
attacks which are pumped into the networks globally. In this report, it will highlight the background and
the related areas of networking security, it will also explain on this topic, the technical details and the
advantages and the disadvantages of the networking security. Additionally, the report will show some
improvements that have been done about the networking security over the years.
Background and related areas
The security issues in networking have led to the widespread of the identity theft as well as financial
fraud. Spam, viruses as well as the spyware have caused problems to the clients along with the
businesses. A breach in security could irreparably damage on the brand of the organization [3]. An
example in the USA, the security concerns threaten to slow on the federal adoption of the electronic
medical records. In the EU it is an equivalent issue whenever the consumers’ confidence which refers to
the security and data protection is the barrier to a lot faster growth of the e-commerce across the member
state borders .Today it has been observed that the information attacks has become a profitable business
organization and it is more often been controlled by the organized crime syndicates [5]. The growth in the
sosphicated cybercrime business models, which may include the appearance of the criminal businesses,
tend to be more often developed on selling the tools and services for the starting of the networking attacks
, as opposed to offering the information that has already been gained from the attacks . The security
technology has continued to progress , that has changed from the passive , the point to point product
dependent to active , which is the end to end methods to the security recognition , and quarantine [9].
Moreover, the internet service providers are contending on the safety in addition to the consumers ISPS
provided security that is section of their services. The security concerns in the networking continues to be
a significant topic of issue by the policy makers around the globe who are concentrating on the state of
the data system. The policy makers intend to make certain that the users of the networks employs the
ideal technology as well as the process practices in order to make the networks more secure [4]. Other
related topic on the subject is on the networking issues in the internet of things that has highlighted on the
networking issues In the IOT. There are many vulnerabilities, attacks and the mitigation with regards to
the internet of things.
Explanation of the topic
This topic explores on the security issues or concern in networking. In any network it can encounter
various threats which may lead to the compromise of the data for the clients or the business. The security
issues in networking exists and organization can be prone to attack if they do not have appropriate
mechanism in place to protect themselves against the vulnerabilities and the attacks[3]. Some of the
Document Page
3
security issues are virus and the worms, Trojan, SPAM, phishing and the packet sniffers. These are the
methods which are used by the attackers to exploits on the network. The virus and the worms are the
programs which has been loaded onto the system without the knowledge of the user and runs against the
wishes of the owner [8]. The viruses could cause huge amount of damage to the networks. In case the
virus are downloaded and then the computer systems in the networks might be impacted because they
could make copies of on its own and spread across the networks. This is a problem to the networking
administrator since attackers are able to steal data from the business. On the Trojans these are programs
which are malicious and when installed in the networks it can tamper with the allocation of the files and
cause a massive damage to the system in a given network [7]. This is a security issue since individuals or
the business may lose important information which they did not have a backup for and store. Another
security concern that is highlighted is the spam. This is the flooding of the internet with many different
replicates of the same message, to try to forcing the information on individuals that do not otherwise
could not want to obtain it. Phishing is an email fraudulence method and is one of the biggest security
issues when it comes to networking [10]. This method is the worst security threats since there are many
individuals who uses the computers which are linked to the networks and they may be amateurs and who
be vulnerable in giving their data that causes situations such as theft of money and the identity theft.
Technical details
The process of security issues in networking begin with the authentication of the user who logs to the
appropriate passwords as well as the users name which are the one factor authentication [11]. When the
authentication becomes known the two factor authentication could be used. Networking aspect is all about
constructing, design and the use of the network that may include the physical, the selection along with the
use of the telecommunication protocol as well as the computer software for the use and managing on the
network.
Advantages and disadvantages
The security in networking entails securing on the networks. The security involves prevention of any
misuse or the authorized access to the networks or the resources. Some of the advantages and the
disadvantages of the needs of security in networking is as follows;
Advantages
To protect the data: The security keeps a check on to the unauthorized access. The network usually
contain numerous confidential data such as the personal client data [1]. Any person who breaks on the
system might impede on sensitive information. The security in the network needs to be there to protect it.
Prevents cyber-attack: most of the attacks in networking usually derives from the World Wide Web.
You will discover attackers that are specialists in and then there are viral strain attacks. If negligent, they
might perform lots of information obtainable in the network [4]. The networking security could prevent
these attacks from harming the system.
The levels of access: The security software offer numerous amounts of access to the various users. The
authentication of the users is accompanied by authorization techniques in which could be looked at
whether or not the user is certified to gain access to different resource [2].
Disadvantages
Time consuming: The software that are used in networking could be difficult to work with. They may
need authentication using two passwords in order to ensure double security that can be entered each time
you edit on the document [1].
Document Page
4
Requires skilled staff: when it comes to the management of network it is not an easy task. It entails a
highly skilled technicians are able to handle on any security issues that may arise [5]. The networking
administrator should be employed in order to ensure the smooth working of the network. These
individuals should be adequately be trained in meeting on the requirement.
Improvements about the topic which has been made over years
There has been improvement which have been made over the years over the security issues in networking.
There has been growth rate of the broadband in regards to the customers and the bandwidth against the
growth of the cyber-crime [1]. The network operators have gained ground over the years. It has been
seem that there has been strong network authentication as well as authorization which would capitalize on
this trend. The value of networking would continue to grow, and individuals are using them in interesting
ways. Over the years there has been security issues in networking such as zombie computers and botnets,
passwords attacks as well as the maliciously coded websites [7]. These are security concern which have
occurred over the years and which have caused the networking issues to arise.
Conclusion
The security issues is a very difficult topic. Each and every idea of what the security level is and the
accepted risk. The key for building for carrying secure networking would be to define the security ways
to the business enterprise. As soon as this has been undoubtedly defined, everything which happens the
network could be examined with regards to the policy.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
References
[1] Dabbagh, Mehiar, Bechir Hamdaoui, Mohsen Guizani, and Ammar Rayes. "Software-defined
networking security: pros and cons." IEEE Communications Magazine 53, no. 6 (2015): 73-79.
[2] Fernandes, Diogo AB, Liliana FB Soares, João V. Gomes, Mário M. Freire, and Pedro RM
Inácio. "Security issues in cloud environments: a survey." International Journal of Information
Security 13, no. 2 (2014): 113-170.
[3] Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. "Towards an analysis of security
issues, challenges, and open problems in the internet of things." In Services (SERVICES), 2015
IEEE World Congress on, pp. 21-28. IEEE, 2015.
[4] Kumar, Abhishek, Subham Kumar Gupta, Animesh Kumar Rai, and Sapna Sinha. "Social
networking sites and their security issues." International Journal of Scientific and Research
Publications 3, no. 4 (2013): 3.
[5] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press, 2016.
[6] Shu, Zhaogang, Jiafu Wan, Di Li, Jiaxiang Lin, Athanasios V. Vasilakos, and Muhammad
Imran. "Security in software-defined networking: Threats and countermeasures." Mobile
Networks and Applications 21, no. 5 (2016): 764-776.
[7] Stojmenovic, Ivan, and Sheng Wen. "The fog computing paradigm: Scenarios and security
issues." In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference
on, pp. 1-8. IEEE, 2014.
[8] So, Kuyoro. "Cloud computing security issues and challenges." International Journal of
Computer Networks 3, no. 5 (2011): 247-55.
[9] Xylomenos, George, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos
Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. "A survey
of information-centric networking research." IEEE Communications Surveys & Tutorials 16, no.
2 (2014): 1024-1049.
[10] Yan, Zheng, Peng Zhang, and Athanasios V. Vasilakos. "A security and trust framework for
virtualized networks and softwaredefined networking." Security and communication networks 9,
no. 16 (2016): 3059-3069.
[11] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. "Physical layer
security issues in interference-alignment-based wireless networks." IEEE Communications
Magazine 54, no. 8 (2016): 162-168.
[12] Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing cloud computing security issues."
Future Generation computer systems 28, no. 3 (2012): 583-592.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]