Project Security
Project Security
Network Security
Introduction
Today, computer crime and network security are among the major problems facing organizations. That’s
why every year since 1995, the Computer Security Institute (CSI) and the Federal Bureau of Investigation’s (FBI)
Computer Intrusion Squad conduct surveys on the issue. The 2005 CSI/FBI survey based on the responses of 700
computer security practitioners in U.S. corporations, government agencies, financial institutions, medical institutions
and universities. Figure 16 from the 2005 CSI/FBI survey report shows that Virus attacks, Unauthorized access, Theft
of proprietary info, and Denial of service are among the security issues that cost the most money to the 639 U.S.
corporations that participate in the survey. Get your copy of the report at
http://www.eiu.edu/~a_illia/cis3200/FBI2005SecuritySurvey.pdf
Figure 17 form the same report shows that Firewalls, Intrusion Detection Systems (including protocols analyzers),
Encryption techniques for data transmission are among the tools used to protect U.S. corporations against computer
crime and network security attacks.
1
Your assignment
You should use course material, web-based references, and textbooks related to the project topic in order to
discuss some key issues of network security. The discussion in a comprehensive document (10 pages or less)
must include the following:
1) A general introduction to network security (what is network security, how big is the treat for U.S.
corporations, importance for organizations to address the issue).
2) A detailed description of network security attacks including denial of service attacks, intercepting
messages, and malware attacks
3) A detailed description of systems and techniques that provide protection against the kind of attacks
described in 2).
4) A detailed discussion of (1) different kinds of downtimes or disasters that could affect companies
critical data, and (2) some of the remote mirroring techniques that could be used to protect business-
critical data, and enable companies to quickly restore their business operations in the event of
disasters. See reference below.
Evaluation Criteria
- Form (clear, concise, easy to follow, logically arranged)
- Content (logical, use and understanding of references and course material)
- Proper indication of your sources (references)
- Use of Web-based as well as textbook references.
Note 1: References must be indicated at appropriate places in your document in the form (Author,
Year:Page). Also, an alphabetical bibliography including all references used must appear on
the last page. (See next page for examples of acceptable references formats)
Ashish Ray, The Right Choice For Disaster Recovery: Data Guard, Stretch Clusters, Or Remote Mirroring,
http://www.oracle.com/technology/deploy/availability/pdf/1126_Ray_WP.pdf visited on September 17th,
2005.
Goodman, Jerry, How To Secure Your Small To Medium Size Microsoft Based Network,
http://www.sans.org/rr/whitepapers/basics/1189.php, visited on September 17, 2005.
Panko Raymond, Corporate Computer and Network Security, Prentice Hall, New Jersey, 2004.
White, Curt, Business Data Communications and Computer Networks, Course Technology, 2nd edition, 2004.
White, Curt, (2004) Business Data Communications and Computer Networks, Course Technology, 2nd
edition.
Cisco, The OSI Model explained, www.cisco.com/training/osi.htm visited on January 3rd 2006.