Term Paper on "Routers as Security Mechanisms"

Term Paper 4 pages (1414 words) Sources: 4

[EXCERPT] . . . .

Router Security

Understanding Network Security

In this day and age, sending confidential data over the Internet is becoming more commonplace. Some people and organizations, e.g. commercial banks, are completely dependent on electronic transmission of confidential data. Hackers mostly target networks as their primary point of infiltration, whether it is internal or external from a private network. Attacks have evolved over the years. There are two main reasons why security is an important item for every company. They are, personal protection of information and social responsibility. In regards to the personal protection, if you store any data that you would not like to be publically broadcasted to the world it is in your responsibility to provide a level of security to protect that information. As for your social responsibility goes, nowadays being part of multiple network (though one you can choose to not fulfill) is to protect those groups well being. A good reason for an intruder to gain access to an end unit is to use it as a launching platform to attack other machines. It is very common for network intruders to take control of sever machines like this and route their traffic through them in order to make a trace back more difficult. In securing a company, a strong background in network security is essential to ensure business effectiveness and confidentiality (Bradley, 2010).

Most average users believe that their data is only valuable to them. There are three issues with this way of thinking. First, attackers often take control of your PC itself, so they can employ a compromised PC to host malware or distribute spam. Second, an attacker may be able
Continue scrolling to

download full paper
to use seemingly trivial information such as your name, address, and birth date to steal your identity. Third, most attacks are automated and seek out and compromise vulnerable systems.

Basic attacks that have progressed over the years. Ranging from, code replication and password guessing in the 80's, password cracking and war dialing and Viruses; including Love Bug, Nimba, and Code Red in the 90's, and also Trojan horses such as Back Orifice, and Worms; including Blaster, MyDoom, and Slammer. This has grown to include inside abuse of the network access, viruses, device theft, phishing, Instant-message misuse, denial of service, unauthorized access to information, Bots, theft of employee or customer data, abuse of a wireless network, system penetration, financial fraud, password sniffing, key logging, website defacement, misuse of a public web application, theft of proprietary information, exploiting an organization's DNS server, Telecom fraud, and the last one in is sabotage.

In recent years, there have been attacks against IP, IP spoofing, and IP session hijacking. Attacks against IP can happen in many different ways. Normally this is done by exploiting the fact that IP does not perform a high standard for authentication. IP spoofing is where a host claims to have another IP address. Because many systems like ACLs define who can and cannot get through, this attack becomes very handy. Also another attack that users can implement is IP session hijacking. This is a sophisticated attack. It is an attack where a user's session is taken over by the attacker.

Network security continues to face a variety of threats. Still however, these threats grow every single day. The first and probably the nastiest, was the DoS, denial-of-service. These attacks can be pretty easy to execute, at the same time being very difficult to track, and it isn't easy to deny requests from an attacker and not a legitimate user. Unauthorized access is a term that refers to a number of different sorts of attacks. The purpose behind these types of attacks is to access some resource that your machine should not typically provide. Executing commands illicitly is another type of attack. This is done in two classifications: normal user access or administrator access. Another type of attack is confidentiality breeches. There is certain information that can be hurtful by falling into the wrong hands. Destructive Behavior is another type; there are two major categories that define these types of attacks, being Data diddling and data destruction. Data diddling is when someone decides to change data in spreadsheets, projections, plans. They can change pretty much anything they like, and it might not be noticed… READ MORE

Quoted Instructions for "Routers as Security Mechanisms" Assignment:

You are an administrator for a rapidly growing medium-sized company that recently purchased a new building (B2) located 500 yards away. The company*****s president has asked you to determine and recommend the best solution for the second buildings (B2), to have full access to the network resources in the main building as well as having full access to the Internet. This building is going to be used for Research and Development, so they do not want the employees from building 1 to have full access to B2 resources. Currently, the company*****s first building is using a Cisco router as a firewall/router to access the Internet.

Outline your recommendations to the president, including any security concern or any other considerations.

The assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student*****s name, the professor*****s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Also at the end of the paper there should be a conclusion to end the paper properly.

How to Reference "Routers as Security Mechanisms" Term Paper in a Bibliography

Routers as Security Mechanisms.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/router-security-understanding-network/9273843. Accessed 4 Oct 2024.

Routers as Security Mechanisms (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/router-security-understanding-network/9273843
A1-TermPaper.com. (2012). Routers as Security Mechanisms. [online] Available at: https://www.a1-termpaper.com/topics/essay/router-security-understanding-network/9273843 [Accessed 4 Oct, 2024].
”Routers as Security Mechanisms” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/router-security-understanding-network/9273843.
”Routers as Security Mechanisms” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/router-security-understanding-network/9273843.
[1] ”Routers as Security Mechanisms”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/router-security-understanding-network/9273843. [Accessed: 4-Oct-2024].
1. Routers as Security Mechanisms [Internet]. A1-TermPaper.com. 2012 [cited 4 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/router-security-understanding-network/9273843
1. Routers as Security Mechanisms. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/router-security-understanding-network/9273843. Published 2012. Accessed October 4, 2024.

Related Term Papers:

System Security Thesis

Paper Icon

System Security

Every organization which is dependent on computer systems for its vital activities needs to have a certain degree of system security, the level depending on the nature of… read more

Thesis 9 pages (2884 words) Sources: 9 Style: APA Topic: Computers / IT / Internet


Database Security Design of an Online Membership Term Paper

Paper Icon

Database Security

Design of an online membership and payment management system for the web using a Microsoft SQL Server database and a front end built in Microsoft Visual Stuido C#.net… read more

Term Paper 11 pages (2976 words) Sources: 1+ Topic: Computers / IT / Internet


Enterprise Technical Infrastructure Security Plan Research Paper

Paper Icon

Enterprise Technical Infrastructure Security Plan

for ABBA Corporation

Information Technology Security: Implementation

The wrong it security plan can cause an enterprise millions of dollars of damages if breached by a… read more

Research Paper 6 pages (2249 words) Sources: 6 Topic: Computers / IT / Internet


Security Issues in IEEE Wlan's 802.11 Term Paper

Paper Icon

Security Issues in IEEE WLAN 802.11

In geek speak, the IEEE 802.11b standard is the family of specifications created by the Institute of Electrical and Electronics Engineers Inc. For wireless,… read more

Term Paper 20 pages (6613 words) Sources: 1+ Topic: Physics / Quantum Theory


Security Analysis Mobile Ad Hoc Networks MANET Research Proposal

Paper Icon

Mobile Adhoc Networks (manet)

The work of Corson and Macker (1999) entitled: "Mobile Ad Hoc Networking (MANET)" reports that advancements in computer and wireless communications technologies in recent years expectations… read more

Research Proposal 13 pages (3549 words) Sources: 5 Style: Harvard Topic: Computers / IT / Internet


Fri, Oct 4, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!