0% found this document useful (0 votes)
52 views

Project Security

This document outlines a research project on network security due on April 24th, 2007. Students are asked to write a 10 page paper discussing: 1) An introduction to network security, threats to US corporations, and importance for organizations; 2) A description of network security attacks like denial of service, intercepting messages, and malware; 3) Systems and techniques for protection against these attacks; and 4) Types of downtime/disasters affecting critical data and remote mirroring techniques for protecting and restoring business operations. The paper should use course materials, web references, and textbooks, and properly cite all sources.

Uploaded by

Bui Dang Khoa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Project Security

This document outlines a research project on network security due on April 24th, 2007. Students are asked to write a 10 page paper discussing: 1) An introduction to network security, threats to US corporations, and importance for organizations; 2) A description of network security attacks like denial of service, intercepting messages, and malware; 3) Systems and techniques for protection against these attacks; and 4) Types of downtime/disasters affecting critical data and remote mirroring techniques for protecting and restoring business operations. The paper should use course materials, web references, and textbooks, and properly cite all sources.

Uploaded by

Bui Dang Khoa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Research Project Due date: April 24th 2007

Network Security

Introduction

Today, computer crime and network security are among the major problems facing organizations. That’s
why every year since 1995, the Computer Security Institute (CSI) and the Federal Bureau of Investigation’s (FBI)
Computer Intrusion Squad conduct surveys on the issue. The 2005 CSI/FBI survey based on the responses of 700
computer security practitioners in U.S. corporations, government agencies, financial institutions, medical institutions
and universities. Figure 16 from the 2005 CSI/FBI survey report shows that Virus attacks, Unauthorized access, Theft
of proprietary info, and Denial of service are among the security issues that cost the most money to the 639 U.S.
corporations that participate in the survey. Get your copy of the report at
http://www.eiu.edu/~a_illia/cis3200/FBI2005SecuritySurvey.pdf

Figure 17 form the same report shows that Firewalls, Intrusion Detection Systems (including protocols analyzers),
Encryption techniques for data transmission are among the tools used to protect U.S. corporations against computer
crime and network security attacks.

1
Your assignment

You should use course material, web-based references, and textbooks related to the project topic in order to
discuss some key issues of network security. The discussion in a comprehensive document (10 pages or less)
must include the following:

1) A general introduction to network security (what is network security, how big is the treat for U.S.
corporations, importance for organizations to address the issue).
2) A detailed description of network security attacks including denial of service attacks, intercepting
messages, and malware attacks
3) A detailed description of systems and techniques that provide protection against the kind of attacks
described in 2).
4) A detailed discussion of (1) different kinds of downtimes or disasters that could affect companies
critical data, and (2) some of the remote mirroring techniques that could be used to protect business-
critical data, and enable companies to quickly restore their business operations in the event of
disasters. See reference below.

Evaluation Criteria
- Form (clear, concise, easy to follow, logically arranged)
- Content (logical, use and understanding of references and course material)
- Proper indication of your sources (references)
- Use of Web-based as well as textbook references.

Note 1: References must be indicated at appropriate places in your document in the form (Author,
Year:Page). Also, an alphabetical bibliography including all references used must appear on
the last page. (See next page for examples of acceptable references formats)

Note 2: No Email submission accepted.


2
Some references:

Ashish Ray, The Right Choice For Disaster Recovery: Data Guard, Stretch Clusters, Or Remote Mirroring,
http://www.oracle.com/technology/deploy/availability/pdf/1126_Ray_WP.pdf visited on September 17th,
2005.

CSI/FBI, 2005Computer Crime and security survey, http://www.gocsi.com/forms/fbi/fbi_thanks.jhtml?


_DARGS=/forms/fbi/csi_fbi_survey.jhtml.1, visited on September 5, 2005.

Goodman, Jerry, How To Secure Your Small To Medium Size Microsoft Based Network,
http://www.sans.org/rr/whitepapers/basics/1189.php, visited on September 17, 2005.

Panko Raymond, Corporate Computer and Network Security, Prentice Hall, New Jersey, 2004.

Examples of acceptable Textbooks’ reference formats

White, Curt, Business Data Communications and Computer Networks, Course Technology, 2nd edition, 2004.

White, Curt, (2004) Business Data Communications and Computer Networks, Course Technology, 2nd
edition.

Examples of acceptable Websites’ reference formats

Cisco, The OSI Model explained, www.cisco.com/training/osi.htm visited on January 3rd 2006.

Buchanan William J., Introduction to Networks, http://www.dcs.napier.ac.uk/~bill/cnds2002_03/unit01.pdf


visited on June 18th, 2006.

You might also like