Open Access Open Access  Restricted Access Subscription Access

Networking and Data Security


Affiliations
1 BMS College for Women, Basavanagudi, Bengaluru-04, India
 

For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem.

The requirements of information security within an organization have undergone two major changes in the last several decades before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means. With the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident this is especially the case for a shared system, such as time sharing system and the need is even more acute for systems that can be accessed for a public telephone or a data network. The generic name for the collection of tools to protect data and to thwart hackers is "computer security".


Keywords

Authentication, Integrity, Secrecy, Hacker, Non-Repudiation.
User
Notifications
Font Size

  • Network Security: History, Importance, and Future University of Florida Department of Electrical and Computer Engineering Bhavya Daya
  • Cisco IBSG, 2011.
  • U.S. Census Bureau, 2010; Forrester Research, 2003.
  • Wikipedia, 2010. 5. Sources: Cisco IBSG, 2010; U.S. Census Bureau, 2010. 6. While no one can predict the exact number of devices connected to the Internet at any given time, the methodology of applying a constant (Internet doubling in size every 5.32 years) to a generally agreed-upon number of connected devices at a point in time (500 million in 2003) provides an estimate that is appropriate for the purposes of this paper.
  • “Planetary Skin: A Global Platform for a New Era of Collaboration,” Juan Carlos Castilla-Rubio and Simon Willis, Cisco IBSG, March2009,http://www.cisco.com/ web/about/ac79/docs/pov/Planetary_Skin _POV_vFINAL_spw _jc_2.pdf
  • World Internet Stats: Usage and Population Statistics, June 30, 2010. 9. Sources: Cisco, 2010; HP, 2010.
  • ‘Challenges in Management education- A teacher’s perception’published in MSRIM JournalVol.III, Issue 2. July-Dec.2011. international refereed journal 'M S Ramaiah Management Review'

Abstract Views: 346

PDF Views: 210




  • Networking and Data Security

Abstract Views: 346  |  PDF Views: 210

Authors

L. Nalini
BMS College for Women, Basavanagudi, Bengaluru-04, India

Abstract


For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem.

The requirements of information security within an organization have undergone two major changes in the last several decades before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means. With the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident this is especially the case for a shared system, such as time sharing system and the need is even more acute for systems that can be accessed for a public telephone or a data network. The generic name for the collection of tools to protect data and to thwart hackers is "computer security".


Keywords


Authentication, Integrity, Secrecy, Hacker, Non-Repudiation.

References