Sample Essay on:
Network Security and Subverting the ARP Protocol

Here is the synopsis of our sample research paper on Network Security and Subverting the ARP Protocol. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 9 page report discusses how an intruder can compromise network security by subverting the ARP protocol. The address resolution protocol or "arp" is a protocol used by the "IP" or Internet Protocol to plot the pathways for IP network addresses to the hardware addresses being used by a data link protocol. Bibliography lists 5 sources.

Page Count:

9 pages (~225 words per page)

File: D0_BWARPpro.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

society, an even more enormous responsibility has developed to assure that such electronic information and the processes of data transfer are protected. Organizations of all types have taken the initiative to protect their information technology infrastructure and see the ways in which intruders can exploit certain weaknesses within the IT infrastructure. As both networks and intrusion attacks become more sophisticated, security has quickly become a matter of assuring that there are no holes in the system through which it is possible for an authorized source to gain access. The many security issues related to computer networks occur in a number of ways. For example, one disgruntled employee with the right passwords and access can wreak havoc in an organizations database or any other component of the IT system. Spanbauer (2003) explains that security threats occur when: ".... someone exploits a combination of your PCs unique IP (Internet protocol) address and one or more of the thousands of TCP (transmission control protocol) and UDP (universal datagram protocol) ports that serve as the door to your system" (p. 188). That fact is true for computers networked together as surely as it is for an individual machine. Spanbauer also explains that whenever a person uses an Internet browser, some type of an email program, or other kinds of programs that can gather information from a particular Internet site or remote serve, "...the data flows through one or more of these ports" (p. 188). He then adds that it does not matter if the threat comes from a teenager trying to prove his or her hacking skills, some companys pop-up spam, there is always one primary objective, finding that open port that can allow access into the unprotected computer or system or find a way to trick the system into opening a port (p. ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now