Computer Networks: Understanding Internet and Intranet Security Issues
Computer network is an interconnected collection of autonomous computer systems which are able to directly exchange data and information and they are able to communicate with each other by exchanging messages (Oppliger, 2002). Where such a network is internal and restricted to a single organization or user as is the case with the Order Entry application, it is called an intranet. Whereas such a network allows for communication between other networks that are external and independent to each other, then we have the internet. Each has security needs integral to its operations.
Marsanu, Sichitiu & Sichitiu (2010), identify Computer networks security as to incorporate “integrity, availability, reliability and best possible protection of resources and the protection covers all computer and network connected together”, A computer network consists, “of a set of computers and other devices interconnected through communication media, thus ensuring the sharing of a large number of users of all resources and allow for exchange of information”, add Marsanu, Sichitiu & Sichitiu (2010). And according to Oppliger (2002), “computer security is to preserve resources against unauthorized use and abuse, as well as to protect data from damage, disclosure and modification”. A computer security system is secured for data storage and processing in computer systems that may or may not be networked.
Marsanu, Sichitiu & Sichitiu (2010) identify security measures on computer networks as “to protect against unauthorized access to computers in a network using firewalls and secure the network area, authentication and authorization access, creating of secure communication channels and related functions”. All businesses appropriating IT and ICT have need for such computer systems and communication protocols, and their contribution to business cannot be overemphasized.
Business use and exploitation of computer networks through the intranet or the internet is advised by their business model and objectives. An internet connection though opens more access and exposure to users and the remote logging in by customers/clients will offer the business a cost benefit, in most likelihood improving the work environment and customer satisfaction. This solution though opens the computer network to increased risk that come with remote network access.
After creating a computer network that allows remote access, a communication line is opened that is susceptible to attack. It is necessary then to bring in communication security, whose objective is to protect data that encodes information during its transmission in and between computer systems and networks (Oppliger, 2002).
According to Oppliger (2002), there are a variety of reasons that a networked computer system (internet) is more vulnerable than a standalone system (intranet). First, there exist more points from which an attack can be launched. Secondly, the physical perimeter of a system is artificially extended to include the other connected computer network that goes beyond what is controllable to a system administrator. Also, networked computers are built on sophisticated software’s that are inherently more complex and error-prone and thus easily allow access to intruders. And finally and more obvious, the access of internet remotely is unrestricted and uncontrollable in the sense that those accessing the system are not known and cannot be controlled unlike in an intranet.
network security safety encompasses all computers linked to the system and
devices linked to the network. Common attributes that describe security are: confidentiality,
integrity, authentication, non-repudiation. It is important to apply specific
mechanisms based on the physical level (physical protection of transmission
lines), continuing with the procedure that block access to the network (firewalls),
application of techniques to encode data (encryption) , specific method for the
protection of such communication between application processes running on
different computers on the network.
Marsanu, N., Sichitiu, C., & Sichitiu, G. (2010). Considerations About Computer Networks Security under Various Operating Systems. Journal of Applied Quantitative Methods, 5(4), 571-582.
Oppliger, R. (2002). Internet and Intranet security. Boston: Artech House.