Computer Networking Company in Business Area

Author(s):  
Siti Aisyah

Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.

2021 ◽  
Vol 5 (3) ◽  
pp. 848
Author(s):  
Haeruddin Haeruddin

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.


Author(s):  
Grzegorz Mazurek

For the last two decades, virtuality and virtualization processes have been considered as developing phenomena in management studies, particularly within the context of the creation of inter- and intra-organizational networks, establishing strong relationships with customers and the appreciation of intangible assets in marketing. The purpose of this chapter is to identify the main directions of virtualized marketing and present the detailed changes that occur in marketing due to extensive and intensive Internet usage and the directions of network technology development and its impact on prospective marketing activities. The proposed analyses help to understand the multifaceted impact of the Internet on marketing—its concept, activities, and organization—going much beyond simple “e-marketing” perspective. The presented conclusions can be of significant value for both researchers and marketers. It can particularly influence further research on the relationship between the marketing virtualization and the company’s performance, showing the real impact of such processes on the effectiveness and efficiency of a company. The final conclusions will be interesting to marketing managers, who in the cybermarketing era have to deal with new challenges of collaboration, customers’ engagement, and value network creation.


2001 ◽  
Vol 95 (1) ◽  
pp. 200-201
Author(s):  
Ted Becker

This is a welcome and provocative addition to the growing literature on the politics of the Internet. In addition to its rich intellectual texture and mother-lode of information about computer hard- and software, it is a quick read because the author has a sharp tongue and makes excellent points. It is a unique blend of political philosophy, political economic theory, and computer network technology in support of a political F-5 tornado warning.


1997 ◽  
Vol 11 (3) ◽  
pp. 75-94 ◽  
Author(s):  
William L Goffe ◽  
Robert P Parks

This paper is a first look at how the information infrastructure for economists will change with the arrival of the Internet. While paper has long been used for the flow of information in the profession, computer networks are starting to supplement it and, in the not-to-distant future, will replace paper. The authors examine the myriad ways in which a networked world will benefit the profession. The most exciting is the easy access to the material that lies at the heart of their profession: journals, working papers, data, and teaching.


Author(s):  
Muhammad Syaeful Bahry ◽  
Bambang Sugiantoro

The development of technology today is very fast one only with the existence of the use of the computer network. This can be seen in the increasing number of organizations or companies that use the computer network to facilitate the flow of information within the organization or the company. But with the abundance of the use of network technology is only advancing network progressed only, but not maximize resource so that sometimes allows for the problem or traffic network. For that can be needed by network development solution made VLAN topology using NDLC method (Network Development Life Cycle). Vlans are able to improve the capabilities of the network and can reduce the amount of data that is sent to a destination that does not need to be so that the traffic in the network will be reduced by itself. In addition there is another reason why requires a VLAN is to reduce the possibility of the misuse of access rights. It can use the Mode Access. With the Mode will divide each Host into the VLAN each. With the existence of a VLAN shows can increase network ability as much as 13.4 %. With the data shows that a VLAN successful and able to make the network more efficient. In the VLAN network security aspect is able to optimize network security with the existence of access mode, so that the new host are not capable of entering it into the existing network topology.


2020 ◽  
Vol 8 (2) ◽  
pp. 53-60
Author(s):  
Mostafijur Rahman ◽  
Ruhul Amin

When writing about the history of the internet, it is important to note that aerospace was among the significant pioneers in computer networking computer network for private was used in first airline reservation system “SABRE” in 1960 for American airlines. While sage was the first computer system in the world, its deficiencies led to the development of ARPANET. These systems formed the foundations for the internet and the development of other computer programs in aerospace, any deficiency led to the invention of a new program, giving birth to programming, CAD, and CAM that brought about simulations. Aerospace computing has evolved over the years and is now carrying the whole weight of the aerospace industry. Before the launch of any space vehicle or satellite, simulation has become a necessary step, checking for weaknesses for corrections to be done on the ground. Besides, computer simulation has been essential in training, facilitating the training of pilots worldwide. This article presents more information regarding the application of AI in aerospace computing, flight simulations, and their advantages in the aerospace industry.  


2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Long Chen

With the development of society, we have entered the information age.Computer network technology is widely used in people’s life and production, and has played an important role in promoting social progress. However, due to its own nature and characteristics, some security risks have appeared in the process of application in the development of computer network technology, which interferes with the safe use of computer networks. This article combines the information security risk of computer network, making an analysis of the information security architecture of computer network based on WPDRRC model, and the strategy of how to prevent computer network security risk.


2015 ◽  
pp. 2024-2043
Author(s):  
Grzegorz Mazurek

For the last two decades, virtuality and virtualization processes have been considered as developing phenomena in management studies, particularly within the context of the creation of inter- and intra-organizational networks, establishing strong relationships with customers and the appreciation of intangible assets in marketing. The purpose of this chapter is to identify the main directions of virtualized marketing and present the detailed changes that occur in marketing due to extensive and intensive Internet usage and the directions of network technology development and its impact on prospective marketing activities. The proposed analyses help to understand the multifaceted impact of the Internet on marketing—its concept, activities, and organization—going much beyond simple “e-marketing” perspective. The presented conclusions can be of significant value for both researchers and marketers. It can particularly influence further research on the relationship between the marketing virtualization and the company's performance, showing the real impact of such processes on the effectiveness and efficiency of a company. The final conclusions will be interesting to marketing managers, who in the cybermarketing era have to deal with new challenges of collaboration, customers' engagement, and value network creation.


Author(s):  
Peter Murphy

Since the development of the Internet—and the emergence of computer networking as a mass medium in the mid-1990s—many organizations and institutions have experimented with Internet protocol (IP)-based communications to coordinate work and activities across geographical distance. This has been in response to growing needs to coordinate business and projects between different offices, firms, regions, and states. Rather than organizations flying people to meet face-to-face, network technology presents opportunities for persons located apart to work together. It offers the potential for cheap and efficient collaborations across distance. Yet, while economic pragmatics drive organizations to adopt virtual work methods, virtual working is difficult to implement. This is because it strains many conventional assumptions about work behaviour and the cognitive and emotional foundations of collaboration.


Author(s):  
Noor Kadhim Ayoob ◽  
Asraa Abdullah Hussein ◽  
Rusul Mohammed Neamah

One of the important issues in the era of computer networks and multimedia technology development is to find ways to maintain the reliability, credibility, copyright and non-duplication of digital content transmitted over the internet. For the purpose of protecting images from illegal usage, a watermark is used. A hidden digital watermark is the process of concealing information on a host to prove that this image is owned by a specific person or organization. In this paper, a new method has been proposed to use an RGB logo to protect color images from unlicensed trading. The method depends on retrieving logo data from specific locations in the host to form a logo when the owner claims the rights to those images. These positions are chosen because their pixels match the logo data. The locations of matching pixels are stored in a table that goes through two stages of treatment to ensure confidentiality: First, table compression, second, encoding positions in the compressed table through El-Gamal algorithm. Because the method depends on the idea of keeping host pixels without change, PSNR will always be infinity. After subjecting the host to five types of attack, the results demonstrate that the method can effectively protect the image and hidden logo is retrieved clearly even after the attacks.


Sign in / Sign up

Export Citation Format

Share Document