Bisnis Dahsyat tanpa modal

Saturday, April 10, 2010

Improve Your Network Securyty


Communications traffic data over the Internet using TCP / IP has become a very large telecommunications power. Every hour, minute, until the second, electronic data valuable in the Internet is passing. Surely these things inspire certain people to try to obtain such data. This has become a serious threat to security on the Internet. For that, we must be more vigilant against efforts that threaten the integrity of the data we have. This paper attempts to provide a simple alternative to readers who want to understand the problem of security on the Internet. In the end, there is a short list that contains about the sources and sites on the Internet of documents related to this article and can be used as a reference for deeper security problems on the Internet.

In general, the problem of security on the Internet can be viewed from two sides is important. The first side is the integrity of data transmitted through the Internet (we call it the integrity of data transmission) and the next side is the level of security in computer networks themselves (we call the internal network security). Let's discuss one by one from the sides of it.



Integrity of Data Delivery

At the moment we are sending data through the Internet network, we always want to send the data we arrived at destination safely and do not experience the intervention of other parties. These Conditions become much more mainstream if we send the data were categorized as confidential data.

At the time we send, the data is going through various types of computers, routers, or gateways, and across a wide range of physical media of communication. We are risking the integrity of the data to the diversity of the above. Obviously we can not possibly check the security level at each hop / point through which the data is because the level of distribution and possession hop is very diverse. One solution that can be applied is data encryption. The main objective of this solution is to prevent the stolen-heard (eavesdropping) to the data we send and we receive. If an "eavesdropper" steal action hearing, he will obtain the encrypted data just so it does not reflect the actual data content.

No comments:

Post a Comment