Network Security Essay

1561 Words 7 Pages
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers INTRODUCTION

Over the past few years, Internet-enabled business, or e-business, has drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access allow companies to streamline processes, lower operating costs, and increase customer satisfaction. Such applications require mission-critical networks that accommodate voice, video, and data traffic, and these networks must be scalable to
…show more content…
Using buffer overflows, trojan horses, and other common techniques, hackers gain control of hosts that can be used as platforms for launching other attacks. These practices can lead to serious financial losses or legal liabilities.

Cost of Intrusions

Network attacks cause organizations several hours or days of downtime and serious breaches in data confidentiality and integrity. Depending on the level of the attack and the type of information that has been compromised, the consequences of network attacks vary in degree from mildly annoying to completely debilitating, and the cost of recovery from attacks can range from hundreds to millions of dollars.

Designing the Security Infrastructure

The objective of network security is to protect networks and their applications against attacks, ensuring information availability, confidentiality and integrity. When network security architectures has to be designed we must consider a number of factors. Not all networks and their associated applications have the same risks of attacks or possible costs of repairing attack damages. Therefore, we must perform cost-benefit analysis to evaluate the potential returns on investment for various network security technologies and components versus the opportunity costs of not implementing those items

Security Architecture

The access and

Related Documents