Here is the synopsis of our sample research paper on Network Security and Subverting the ARP Protocol. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 9 page report discusses how an intruder can compromise network security by subverting the ARP protocol. The address resolution protocol or "arp" is a protocol used by the "IP" or Internet Protocol to plot the pathways for IP network addresses to the hardware addresses being used by a data link protocol. Bibliography lists 5 sources.
Page Count:
9 pages (~225 words per page)
File: D0_BWARPpro.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
society, an even more enormous responsibility has developed to assure that such electronic information and the processes of data transfer are protected. Organizations of all types have taken the initiative
to protect their information technology infrastructure and see the ways in which intruders can exploit certain weaknesses within the IT infrastructure. As both networks and intrusion attacks become more sophisticated,
security has quickly become a matter of assuring that there are no holes in the system through which it is possible for an authorized source to gain access. The many
security issues related to computer networks occur in a number of ways. For example, one disgruntled employee with the right passwords and access can wreak havoc in an organizations database
or any other component of the IT system. Spanbauer (2003) explains that security threats occur when: ".... someone exploits a combination of your PCs unique IP (Internet protocol) address and
one or more of the thousands of TCP (transmission control protocol) and UDP (universal datagram protocol) ports that serve as the door to your system" (p. 188). That fact is
true for computers networked together as surely as it is for an individual machine. Spanbauer also explains that whenever a person uses an Internet browser, some type of an email
program, or other kinds of programs that can gather information from a particular Internet site or remote serve, "...the data flows through one or more of these ports" (p. 188).
He then adds that it does not matter if the threat comes from a teenager trying to prove his or her hacking skills, some companys pop-up spam, there is always
one primary objective, finding that open port that can allow access into the unprotected computer or system or find a way to trick the system into opening a port (p.
...