Nt1330 Unit 3 Assignment 1 Summary

Words: 1988
Pages: 8

This paper is developed based on the book “Data and Computer Communications 10th Edition”, written by William Stallings and published in 2013. The book provides data communication principles and introduces the most recent network technologies. We focus on and explore details of four main topics from the book: Wireless Network, Local Area Network, Internet Protocol, and Computer and the Internet. We then connect each topic to Cybersecurity by first demonstrating its vulnerability, and next giving a solution to it. Also, the definition and development history of Cybersecurity will be presented at the beginning of this paper, so that readers can understand it more thoroughly. Key words: Cybersecurity, Wireless Network, LAN, IP, Computer and the Internet
Background
Cybersecurity is generally recognized as
…show more content…
It means some attackers can easily receive the profiles sent from other computers simultaneously if they were in the same LAN. Secondly, the Ethernet protocol itself can’t verify the message integrity. Therefore, any attackers can insert their own message in the transmitting data process easily. Those issues can cause all kinds of security issues such as stealing private information or crashing the whole LAN by inserting some virus.
The traditional way to solve this kind of problem is to divide the Ethernet LAN into sub-LAN by bridges. As mentioned above, bridges can connect different small LAN and they can filter the network traffic. Hence, if the file is exchanged only in the small LAN area, it will not go across the bridge and then go into other LANs. By doing that, the damage of attacking by Hackers will be controlled only in the small LAN area. Nowadays, some new methods have come out. For example, each node or computer can only receive and interpret the message sent to them without further complication of the existing network structure.
Internet Protocol and Its