Introduction
Introduction to networking is an article that was written in 1997 by Matt Curtin. The rights of reproduction of the article lay with the Kent information services Inc. that has been in the forefront providing information services to different client. This article is explained in technical terms aimed for the consumption of professionals who have been in the computer field for quite some time. Going through it, it is realized that computer novices / nonprofessionals would find it difficult to understand what is presented. However, this paper gives a simplified version of the article.
Network
In order to understand network security, it is important to understand the underlying principles of networks. A network is a set of numerous interlinking lines representing a network of roads or alliances, therefore in computer networking the same can be defined as a system of interconnected computers. Any network is based on some fundamental principles. Some of these principles include the OSI model .
OSI model
The OSI model stands for open systems interconnect. This model is used to define the logical levels, seven in number, through which communication passes in a network. Each layer depends on the subsequent layer for services; therefore, if one logical layer is damaged or malfunctions, then communication between machines would not take place . The seven layers of the OSI model are application, presentation, session, transport, network, data link and physical.
The advancement in network has led to the development of the internet. The internet is the largest network of networks ever to exist in the world. Internet facilitates the resource location in the network by allowing users to access the network that contains the resources that are sought. When one connects to access a resource form the internet, all he/she does is to connect to a network that will eventually connect to the internet backbone. The difference between the internet and the common networks is that, the internet is comprised of network of networks while a normal network is comprised of networked hosts
Network security
Networks are exposed to several risks at all times in their use. There are a number of threats that can be identified as posing the greatest risks to networks. Some of these include:
Denial of service
Denial of service occurs when the system is unable to offer service to the users. In most cases, this is experienced when attackers use sophisticated software to manipulate the system functioning. However, there are methods of preventing the same, which include keeping up-to-date security-related patches of the host’s operating system. Some physical hardware can also be used to cause denial of service to users . Example is using Electromagnetic wave to jam the network signal, which could lead to a wrong or no signal at all is received at the intended destination.
Unauthorized access
This arises when someone with no authority accesses the system. It is possible if a stolen password and user ID is used or if a hacker hacks in to the system. The problem associated with it is that sensitive information could be lost . This problem can be solved by safe guarding ones authorization credentials or by using firewalls to prevent a hacker form hacking in to the system.
Reference
Matt, C. (1997). Introduction to Network security. New York: Wiley.