CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Application of computer network security system

عنوان مقاله: Application of computer network security system
شناسه ملی مقاله: CMECE03_094
منتشر شده در سومین کنفرانس بین المللی مکانیک،مهندسی برق و کامپیوتر در سال 1399
مشخصات نویسندگان مقاله:

Yoonis Raysee - Department of Computer Sciences, Payame Noor University, IRAN

خلاصه مقاله:
Today’s the network security is more important to personal computer, organizations, and the military users. The world is becoming more interconnected with the advent of the Internet and new networking technology. Due to the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses in the world secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an intranet to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed. Flourishing in today’s economy, service providers should provide open and easily accessible communications services, which will enable their end users to contact anyone in the world. The same open and freely scalable communication architecture offers limitless communications services to end users and also sets a very attractive target to hackers who would abuse that open communication access for their own financial benefits. A security implementation of an organization, irrespective of its size, should consider all forms of access and intrusion on network hardware both physically and remotely, such as environmental monitoring, using video surveillance and IP, securing remote access using AAA (TACACS+) and deploying of firewalls and demilitarized zone. Because security is a long-term issue, service providers need a security strategy and staff that is well educated in that strategy. To that end, this article discussed the tools and practices that are indispensable to network operators in securing their networks against denial of service (DoS) attacks and other common security threats. Finally, service providers can turn those necessary security protections into profitable managed security services for their enterprise customers.

کلمات کلیدی:
Network, Security system, Computers

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1162910/