A report on Network Security based on the text: Ahuja, V. (1996). Network & Internet Security. Massachusetts: Academic Press Inc.

Essay by redlineUniversity, Master'sA+, August 2002

download word file, 5 pages 3.6

Downloaded 388 times

A secure network is critical for the survival and success of many businesses. The rapid evolution of client/server networks, the phenomenal increase in the number of networks attached to the Internet, the widespread use of web browsers, and the growing commerce on the internet each require that communication networks are secure. Security concerns for private networks as well as for the Internet range from exposures to computer viruses to break-ins by an intruder on the Internet.

The purpose of this book was to present the concepts in security and describe approaches to securing the networks. It introduced the risks to networks, followed by a review of basic security concepts such as passwords and encryption. For each concept, the book also provided an overview of the existing and emerging technologies. In particular, it focused on various security aspects of attaching to and communication over the Internet.

This book serves the growing need to understand and enhance the security of networks.

The audience for this book is the computing professional who has the need or desire to understand the risks to networks and the approaches to addressing them.

As networks grow in size, so do their risks. Network growth has vastly exceeded the corresponding improvements to ensure network security. Info processing entered the business world in the 1950s. However, the third-generation computers, such as the IBM System/360, became the turning point in our transformation to the current age of information technology. The first signs of networking appeared in what was then called "time-shared systems." Some of the early operating systems that also supported time sharing were IBM's System/360 Model 65 and IBM and Honeywell's GECOS. By the end of the 1960s, keyboard terminals and peripheral equipment had taken hold in numerous data processing installations. Next, the users on different time-shared systems wanted...