scholarly journals Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization

10.28945/2857 ◽  
2005 ◽  
Author(s):  
Andrzej Zaliwski

The business organizations currently functioning inside cyberspace are vulnerable to threats and forms of crimes that were unknown prior to the Internet era. New challenges for security have emerged from this situation. It has become increasingly necessary to educate a large number of professionals to be better prepared to maintain the growing number of computer networks. Also, there is a need to place strong emphasis on the security aspects of a network. These goals are impossible to realize without solving the following problems: lack of safe infrastructure, where security experiments can not compromise the organization’s security; and the complexity of existing security auditing methodologies which limits the number of professionals who are able to use them. The complexity makes difficult to obtain a bird-eye view of the whole company’s security system in a way similar to tactical and strategic military map. This hinders the ability to have a single complete status of an organization. This paper describes a tool that can be used to overcome the above problems.

2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Firmansyah Firmansyah ◽  
Rachmat Adi Purnama ◽  
Rachmawati Darma Astuti

The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login


Author(s):  
Inderjeet Singh Sodhi

This chapter highlights the constant increase in the number of attacks on computer network systems, which has pushed governments, researchers, and experts to devise better security policies and strategies. However, the rapid growth of systems, components, and services offered has increased the difficulty of administering them. In many organizations in developed and developing countries, more emphasis is being given on use of Automatic Computing for proper network security. The chapter clarifies how various projects and tools could be relevant for network security. The chapter provides insights about what steps have been taken for network security in a developing country like India. It looks into various strategies adopted for communication data and network security in India. It emphasizes that, with increasing demand for basic/citizen services over the Internet, it has become important to protect data and ensure efficient backup and data recovery. The chapter proposes a need for better and effective policy and strategy for communication data and network security to make the government citizen-oriented in developing countries.


Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


2017 ◽  
Vol 11 (4) ◽  
pp. 1-15 ◽  
Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.


Author(s):  
Bagus Aji Saputro

Computer network users have to spend a lot of money to use the Internet. The Internet has given a very big change in the dissemination of information, so that many people are using data through the Internet. This problem can be solved by MikroTik as a regulator of Internet data traffic and limiting bandwidth that can interfere with computer network activities in accordance with the regulations that have been applied. As a result of not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet. Result from this research is not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet.


Author(s):  
Siti Aisyah

Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.


2011 ◽  
Vol 474-476 ◽  
pp. 75-78
Author(s):  
Kun Zhang ◽  
Hai Feng Wang ◽  
Jian Feng Zhu ◽  
Zhuang Li

With the continuous development of the Internet, it while brings each kind of beneficial information to the people , the hacker, viral as well as the malicious destruction and so on bad factor also multiplies along with it the spread, the network security and the reliability have become the focal point which various countries pay attention together .


Sign in / Sign up

Export Citation Format

Share Document