For more discuss and ask question
join this group
Solved By : Tahir
Siddiqui(Mani)
CS610 - Computer Network GDB No. 1 Solution Spring 2016 Due Date August 16, 2016
GDB of CS610 will open on 15th of August 2016 and end up on 16th of August 2016. The topic for GDB is given below:
GDB Topic:
In computer network environment, security issues include network
integrity, unauthorized access to steal sensitive information, and
different attacks like network denial of service attacks etc. These
issues get significant with the increase in a network size. Large
networks are more vulnerable to these issues because they have a higher
probability of vulnerable points at which intruders can gain access.
More users, more passwords, and more hardware mean more places a hacker
can try to get in. Organization takes different measures to cope with
these issues in wired environment where computational resources and
power is not a major hurdle. Smart devices are being adopted by
organizations at a rapid growth. Smart devices have the issue of
computational resources and power and thus conventional measures cannot
be adopted. With the adoption of 3G, 4G and in future 5G (for smart
devices), these issues will be more escalated. Keeping in view the above
facts, would you like to suggest the organizations to adopt new
technology or not? Support your point with a brief logical reasoning in
either case.
Idea SOlution :
Computer security means to protect information. It deals with the prevention and detection of unauthorized actions by users of a computer. Lately it has been extended to include privacy, confidentiality, and integrity. For example:
This definition implies that you have to know the information and the value of that information in order to develop protective measures. You also need to know to which individuals need unique identities and how much information may be divulged to the outside world. A rough classification of protective measures in computer security is as follows:
-
Prevention—Take measures that prevent your information
from being damaged, altered, or stolen. Preventive measures can range
from locking the server room door to setting up high-level security
policies.
-
Detection—Take measures that allow you to detect when
information has been damaged, altered, or stolen, how it has been
damaged, altered, or stolen, and who has caused the damage. Various
tools are available to help detect intrusions, damage or alterations,
and viruses.
-
Reaction—Take measures that allow recovery of information, even if information is lost or damaged.
Comments
Post a Comment