Abstract

This chapter focuses on the security issues related to a network. As the use of the Internet, intranets, and extranets has grown, so has the need for security. The TCP/IP protocols and network technologies are inherently designed to be open in order to allow interoperability. Therefore, unless proper precautions are taken, data can readily be intercepted and altered, often without either the sending or the receiving party being aware of the security breach. Dedicated links between the parties in a communication are often not established in advance; therefore it is easy for one party to impersonate another party. Threat experienced by intranets and extranets usually include, unauthorized access by contractors or visitors to a company's computer system; access by authorized users (employees or suppliers) to unauthorized databases; confidential information might be intercepted as it is being sent to an authorized user; electronic mail can be intercepted in transit; or hackers can break into the mail server. This chapter elaborates the security considerations for a network and also defines the ways of controlling access to a network.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.