Discuss about the Security Issues In Networking.
Security issues in networking relates to the requirements which are required for business or even the network supervisor which help in safeguarding of the network , the computer systems in addition to the resources that are reliable by the networks [11]. The network needs to be safeguarded from any specific not authorized entrance, malicious elements as well as tracking consistently.
Networking safety is a significant issue to each business that has a computer which is linked to the coverage. The networking security that has been jeopardized signifies that the rival or even the hacker might gain an entry to the susceptible or maybe the crucial information which they might remove or even render off with the data that could lead to loss in data or perhaps the complete system devastation [2]. The networking security is much more taken as the specification protection from the outside invaders in the program. With the increase in the number of people getting linked to the networks, the security threats that causes the massive harm is increasing [11]. The networking security is the primary section of the network which must be managed given that the information is transferred between the computer systems which could be vulnerable to attack [12]. Over the past five years individuals who manages the network security have seen the massive increase of the attackers as well as the criminals creating of malicious attacks which are pumped into the networks globally. In this report, it will highlight the background and the related areas of networking security, it will also explain on this topic, the technical details and the advantages and the disadvantages of the networking security. Additionally, the report will show some improvements that have been done about the networking security over the years.
The security issues in networking have led to the widespread of the identity theft as well as financial fraud. Spam, viruses as well as the spyware have caused problems to the clients along with the businesses. A breach in security could irreparably damage on the brand of the organization [3]. An example in the USA, the security concerns threaten to slow on the federal adoption of the electronic medical records. In the EU it is an equivalent issue whenever the consumers’ confidence which refers to the security and data protection is the barrier to a lot faster growth of the e-commerce across the member state borders .Today it has been observed that the information attacks has become a profitable business organization and it is more often been controlled by the organized crime syndicates [5]. The growth in the sosphicated cybercrime business models, which may include the appearance of the criminal businesses, tend to be more often developed on selling the tools and services for the starting of the networking attacks , as opposed to offering the information that has already been gained from the attacks . The security technology has continued to progress , that has changed from the passive , the point to point product dependent to active , which is the end to end methods to the security recognition , and quarantine [9]. Moreover, the internet service providers are contending on the safety in addition to the consumers ISPS provided security that is section of their services. The security concerns in the networking continues to be a significant topic of issue by the policy makers around the globe who are concentrating on the state of the data system. The policy makers intend to make certain that the users of the networks employs the ideal technology as well as the process practices in order to make the networks more secure [4]. Other related topic on the subject is on the networking issues in the internet of things that has highlighted on the networking issues In the IOT. There are many vulnerabilities, attacks and the mitigation with regards to the internet of things.
This topic explores on the security issues or concern in networking. In any network it can encounter various threats which may lead to the compromise of the data for the clients or the business. The security issues in networking exists and organization can be prone to attack if they do not have appropriate mechanism in place to protect themselves against the vulnerabilities and the attacks[3]. Some of the security issues are virus and the worms, Trojan, SPAM, phishing and the packet sniffers. These are the methods which are used by the attackers to exploits on the network. The virus and the worms are the programs which has been loaded onto the system without the knowledge of the user and runs against the wishes of the owner [8]. The viruses could cause huge amount of damage to the networks. In case the virus are downloaded and then the computer systems in the networks might be impacted because they could make copies of on its own and spread across the networks. This is a problem to the networking administrator since attackers are able to steal data from the business. On the Trojans these are programs which are malicious and when installed in the networks it can tamper with the allocation of the files and cause a massive damage to the system in a given network [7]. This is a security issue since individuals or the business may lose important information which they did not have a backup for and store. Another security concern that is highlighted is the spam. This is the flooding of the internet with many different replicates of the same message, to try to forcing the information on individuals that do not otherwise could not want to obtain it. Phishing is an email fraudulence method and is one of the biggest security issues when it comes to networking [10]. This method is the worst security threats since there are many individuals who uses the computers which are linked to the networks and they may be amateurs and who be vulnerable in giving their data that causes situations such as theft of money and the identity theft.
The process of security issues in networking begin with the authentication of the user who logs to the appropriate passwords as well as the users name which are the one factor authentication [11]. When the authentication becomes known the two factor authentication could be used. Networking aspect is all about constructing, design and the use of the network that may include the physical, the selection along with the use of the telecommunication protocol as well as the computer software for the use and managing on the network.
The security in networking entails securing on the networks. The security involves prevention of any misuse or the authorized access to the networks or the resources. Some of the advantages and the disadvantages of the needs of security in networking is as follows;
Advantages
To protect the data: The security keeps a check on to the unauthorized access. The network usually contain numerous confidential data such as the personal client data [1]. Any person who breaks on the system might impede on sensitive information. The security in the network needs to be there to protect it.
Prevents cyber-attack: most of the attacks in networking usually derives from the World Wide Web. You will discover attackers that are specialists in and then there are viral strain attacks. If negligent, they might perform lots of information obtainable in the network [4]. The networking security could prevent these attacks from harming the system.
The levels of access: The security software offer numerous amounts of access to the various users. The authentication of the users is accompanied by authorization techniques in which could be looked at whether or not the user is certified to gain access to different resource [2].
Disadvantages
Time consuming: The software that are used in networking could be difficult to work with. They may need authentication using two passwords in order to ensure double security that can be entered each time you edit on the document [1].
Requires skilled staff: when it comes to the management of network it is not an easy task. It entails a highly skilled technicians are able to handle on any security issues that may arise [5]. The networking administrator should be employed in order to ensure the smooth working of the network. These individuals should be adequately be trained in meeting on the requirement.
There has been improvement which have been made over the years over the security issues in networking. There has been growth rate of the broadband in regards to the customers and the bandwidth against the growth of the cyber-crime [1]. The network operators have gained ground over the years. It has been seem that there has been strong network authentication as well as authorization which would capitalize on this trend. The value of networking would continue to grow, and individuals are using them in interesting ways. Over the years there has been security issues in networking such as zombie computers and botnets, passwords attacks as well as the maliciously coded websites [7]. These are security concern which have occurred over the years and which have caused the networking issues to arise.
Conclusion
The security issues is a very difficult topic. Each and every idea of what the security level is and the accepted risk. The key for building for carrying secure networking would be to define the security ways to the business enterprise. As soon as this has been undoubtedly defined, everything which happens the network could be examined with regards to the policy.
References
Dabbagh, Mehiar, Bechir Hamdaoui, Mohsen Guizani, and Ammar Rayes. “Software-defined networking security: pros and cons.” IEEE Communications Magazine 53, no. 6 (2015): 73-79.
Fernandes, Diogo AB, Liliana FB Soares, João V. Gomes, Mário M. Freire, and Pedro RM Inácio. “Security issues in cloud environments: a survey.” International Journal of Information Security 13, no. 2 (2014): 113-170.
Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. “Towards an analysis of security issues, challenges, and open problems in the internet of things.” In Services (SERVICES), 2015 IEEE World Congress on, pp. 21-28. IEEE, 2015.
Kumar, Abhishek, Subham Kumar Gupta, Animesh Kumar Rai, and Sapna Sinha. “Social networking sites and their security issues.” International Journal of Scientific and Research Publications 3, no. 4 (2013): 3.
Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.
Shu, Zhaogang, Jiafu Wan, Di Li, Jiaxiang Lin, Athanasios V. Vasilakos, and Muhammad Imran. “Security in software-defined networking: Threats and countermeasures.” Mobile Networks and Applications 21, no. 5 (2016): 764-776.
Stojmenovic, Ivan, and Sheng Wen. “The fog computing paradigm: Scenarios and security issues.” In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on, pp. 1-8. IEEE, 2014.
So, Kuyoro. “Cloud computing security issues and challenges.” International Journal of Computer Networks 3, no. 5 (2011): 247-55.
Xylomenos, George, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. “A survey of information-centric networking research.” IEEE Communications Surveys & Tutorials 16, no. 2 (2014): 1024-1049.
Yan, Zheng, Peng Zhang, and Athanasios V. Vasilakos. “A security and trust framework for virtualized networks and software?defined networking.” Security and communication networks 9, no. 16 (2016): 3059-3069.
Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. “Physical layer security issues in interference-alignment-based wireless networks.” IEEE Communications Magazine 54, no. 8 (2016): 162-168.
Zissis, Dimitrios, and Dimitrios Lekkas. “Addressing cloud computing security issues.” Future Generation computer systems 28, no. 3 (2012): 583-592.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download