Here is the synopsis of our sample research paper on Computer Network Security: Security Devices. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 6 page paper discusses some of the devices used to enhance the security of computer networks, including keys, firewalls and digital certificates among others. Bibliography lists 6 sources.
Page Count:
6 pages (~225 words per page)
File: D0_HVSecDev.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
true whether or not the system is a vast computer network or a standalone system in someones den; any time a computer is networked with other machines or connected to
the Internet, it is vulnerable to attack. This paper discusses some of the terminology associated with computers and its meaning. Discussion Its proven surprisingly difficult to find information on these
terms; most of them are from security company web sites. That presents a further difficulty, because most companies that deal in computer network security assume the people considering using their
services already know the terminology. This illustrates one weakness of the Web: theres too much out there, and its not basic enough. That said, heres what weve got. Logging is
a practice familiar to anyone whos been in the military, stood watches, and had to keep a log of everything that occurred during that watch. The same principle applies here:
historical and statistical logging are methods to keep track of things that occur on the system. The most familiar form of statistical logging is probably the counter we see on
web sites, keeping track of the number of visitors. It is literally compiling statistics, recording "who has accessed their site and which of the pages on their server have been
visited the most" (Surfing the Internet on-board the Web, 1995). Having this information allows these companies to create a target market for "follow up contacts" (Surfing the Internet on-board the
Web, 1995). Statistical logging keeps track of only certain specified data as determined by the people collecting it. Historical logging, however, keeps track of everything. Sun Microsystems tells us that
historical logging is an "extension of MIS [management information system] logging in the sense that every log record will be kept in a historical log, and there is no log
...