Study Galaxy

Dear friends we are happy to inform you that we launched our new website for you, this website have complete study materials like Notes, Project Reports and PPTs for every subject and student, so please visit us at www.studygalaxy.com.
Thanks

Sunday, April 24, 2011

Project Report On Networking

Report On Networking

Download

Description:
INTRODUCTION

Although the history of the Internet is relatively short, its growth has been dynamically explosive. The number of Internet users worldwide has grown from 95 million to 130 million in 1998, and it is projected that there will be 350 million users in the year 2003 (eMarketer, 1998). The Internet is a worldwide collection of networks that links together millions of computers by various means, such as modems, fiber optic lines, routers, and servers. It provides connections to businesses, the government, industries, educational institutions, and individuals.

Each of these organizations has become increasingly dependent on networks and distributed computing and processing systems. Furthermore, because they possess a critical and integral asset of information, inter networking security and what measures to protect this information has become a major area of concern. In this report we will address the key concepts of network security, common network vulnerabilities, network security threats and attacks, security measures and tools, and the development of a network security policy and proper violation response plan.

A breach in network security could cost your company a great deal in lost productivity, lost data, repair work, and loss of confidence among customers, partners, and employees. But these damages are preventable. You just need a solid security strategy and a well-planned implementation. With the explosion of the public Internet and e-commerce, private computers and computer networks are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees, and even human error all represent clear and present dangers to networks. And all computer users, from

The most casual Internet surfers to large enterprises could be affected by network security breaches.

With the rapid explosion of e-commerce and the Internet as a serious business tool, a lot of attention has been given to “information security.” Helping businesses securely manage information has become a multi-billion dollar industry. Companies such as Verisign®, Microsoft®, Cisco®, Oracle® and SUN Microsystems®, to name a few, all spend a significant amount of time and money developing their services with security in mind.

For purposes of this document, rather than describe what security is, we’ll discuss the needs that security should fill. We’ll address the need for physical security, back-ground checks, firewalls, access codes, to-kens and other methods all designed to protect one’s information. In general, the need for security can be summed up as follows

1 comment:

  1. your blog is fantastic
    lets know something about : Reliable information provided by Alarm System Report is very useful for choosing top alarm systems.

    ReplyDelete

Related Posts Plugin for WordPress, Blogger...