Make your own free website on Tripod.com
 
Home | Question 1 | Question 2 | Question 3 | Question 4 | Question 5 | Question 6 | Question 7 | Question 8 | Question 9

UCCS2113 - Communication Network Assignment

9. Discuss the importance of Network Security and or legitimacy in Computer

What is Netowork Security

 

[1] Netowork Security defined as consist of provision made in underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessibility resources from unauthorized access and the effectiveness (or lack) of these measure combined together. [1]

 

Why Important?

 

1.        Unauthorized Access

Basically, it can refer to a various sort of attacks. The main purpose of these attacks is to access the recourse that your computer should not allow to be visited. For example, a web server, the web master / administrator should not simply give the power of authorization to the unknown person the control the web server. Once the person steal the data or modify the data inside the web server, it may cause some unexpected consequence.

 

2.        Executing Commands Illicitly

It does refer to an unknown or un-trusted person to execute some illegal commands thought the server machines. Two main classification of the severity of this problem are normal user access and administrator access. The normal user only able to do some limited thing on a system such as read files or enquiry the information only. But the attackers wish that they can make the configuration through insides the server machines as similar as an administrator like changing IP address or putting some unknown script inside the website to cause the machine shut down automatically.

 

3.        Confidentiality Breaches

Initially we must examine what kind of treat model that we face: what is it that you're trying to protect yourself against? These is quite damaging if some vital information fell into the hand of a competitor, an enemy or the public. For example, if your business confidential information is stolen by another company, then your company will lose the oppoturnity to survive in the market since the competitor knows all the operation and action about yours. Besides that, the new innovation product will be copied by the competitor at the same time, then your company will lose all the profit margin and aslo the competition in the market.

 

4.        Destructive Behavior

Among the destructive sorts of break-ins and attacks, there are two major categories.

 

l        Data Diddling.

The attackers try to hack in the database server and modify the data / information inside the machine. The wrong information will be generated to the user and provide a wrong message to the high level management to do wrong decision. For example, the profit amount of daily / monthly sales report is reduced with Zero from 100, 000, 00 to 10, 000, 00 can cause a lot of consequence inside the company.

 

l        Data Destruction.

The attacker will destroy some vital information or system file inside the machine to cause the machine can not function very well. Or the wrong message will be provided when using the system server. For example, the attackers delete the hardware driver to make the certain hardware lose the function like storage, which use to store the transaction every day.

 

Legitimacy in Computer Network

 

The Computer Law & Security Report is a journal published 6 issues a year. In-depth articles, case reports with analysis and a briefing column that highlights international trends and the latest news is delivered by the journal from around the world. Intellectual Property, Information Technology and Telecommunications law are monitored by a regular European Union features. The Computer Law and Security Report regularly cover:

 

  1. Data protection and privacy
  2. Data and software protection
  3. European community developments in IT, IP and telecoms law
  4. IT contracts
  5. Telecommunications law and online liability
  6. Internet law and security policy
  7. Electronic commerce
  8. Internet fraud and misuse
  9. Systems security and risk management 

More than 80 specialists are included by the forum in computer law and security - between them specializing in every aspect of computer and communications law - spotting trends, highlighting practical concerns, monitoring new problems, and outlining key developments.

 

Each issue contains well-researched reliable and thought provoking articles, case studies, detailed features and news reports - ensuring that you do not miss out on the impact of legislation worldwide and that you understand the problems of managing the legal and security requirements of computer use.

 

Special Features:

 

  1. Contact details of authors and features
  2. Web site references for further information including document access guidance on where to obtain further information
  3. Detailed appendices after articles
  4. Header summaries on each feature for easy scanning
  5. Product and people news
  6. Regular IT case law analysis and recent legislation
  7. Clear and easy to read
  8. Worldwide panel of expert correspondents
  9. Thorough index of each volume