Welcome to our guide on writing a group project on network security. This is our first guide, and it will help you understand how group project tasks are distributed among members involved and exactly what should be done to get the desired results.
This guide has three parts. Our first guide contains 10 facts for a group project on network security which will help you understand the concepts and knowledge behind network security. References are also mentioned at the bottom of this guide to help you verify these facts or collect more information if you want to.
Our second guide, 20 network security project topics, help you select a relevant topic for your group project. All the topics mentioned in the guide are authentic and researchable for the students. We have also written a short sample essay for you. The presence of ready-made topics will give you a path to start.
Our third and final guide, Writing a Group Project on Network Security, explains how a group project should be carried. Furthermore, it will tell you how to divide your work among members keeping individual strengths of every student in mind. This guide will give you a clear vision of planning and proceed with your group project.
A group project is different from an individual project as there are several minds involved and creative conflict is a common problem. We have collected 10 solid facts which you can discuss with your group members and pick a fact you can design your project around.
Let us begin with the facts on network security:
- Network security is a process that helps in securing the network infrastructure of a computer. Certain security policies are applied to protect the assets and resources of an organization or a single user. Securing networks means protecting them against attackers or hackers, who can get access to secure information which is transmitted through a network.
- Data magnets are tools used to fetch personal data. Personal data refers to personal information such as a person’s name, email and financial information. All this information is available on the network when users provide it on websites for different purposes.
- Cryptography is a networking related field which deals with the study of Secret(Crypto) Writing(Graphy). It works on two terminologies namely, encryption and decryption which deals with hiding the content of the given data for privacy purpose (Encrypting) and reverting it back to usage (Decrypting). Many apps on networks use this technology for better protection.
- There is an FBI department looking for cyber criminals who have robbed millions of dollars from around the globe. The list on FBI’s site consists of 19 individuals, each having robbed between $350,000 to $100 million. One of the most wanted criminals is JABBER ZEUS. It is a group of criminals using viruses to hack computers and get access to files and data.
- HTTPS is more secure than HTTP. Every website on the web should follow HTTPS protocol because without HTTPS hackers can easily hack your website. HTTPS even provides you a bit of security from government surveillance applications and keeps all your online activities safe.
- Every time a person requests to access a web page, the user’s IP is saved by the server of that particular website. IPs are useful in tracking a user’s online activity and even track their location. Users use tools to go anonymous on the web to hide their activity and location by using proxy servers and similar apps.
- Trojans are a hacker’s favorite tool. They can be disguised as a useful application, making users install them without worries. Trojans are usually transferred via emails. They don’t spread automatically or by their own will. However, trojans are easy to remove as compared to other malware.
- Cybercrime has been increasing day by day. Suspicious emails, trojans and several other types of network security attacks are committed every hour. To control these crimes, the cyber security market has also expanded regarding budget and resources. The cyber security market is expected to reach $120.1 billion by 2017.
- The United States alone loses $100 billion every year at the hands of cyber crime attacks. A minimum of 556 million cases is recorded in a single year. From strong individuals to giant business tycoons, cyber attacks are used against everyone. The U.S. Navy force has one of the strongest cyber security systems because it receives around 110,000 cyber attacks every hour.
- Network security experts are said to use complex passwords and changing those passwords at least every 3 months. Hackers get a tough time if a password is composed of 4-5 longer strings. This has been proved to be a good strategy to prevent cyber attacks.
These were some of the facts related to network security. We hope they turn out to be useful for your group project and help you out in understanding what Network Security is.
Tired of all the guides and never-ending instructions?
Our next two guides involve having 20 group project topics along with a sample essay and also tips on how to write a group project. But first, let’s have a look at the references below in case you want to gather more information from reliable sources.
- Abdelmounaam Rezgui, Virginia Tech (2003), Privacy on the Web: Facts, Challenges, and Solutions.
- William Stallings (2005), Cryptography and Network Security Principles and Practices, Fourth Edition.
- Rezgui, A. Bouguettaya, and Z. Malik, “A Reputation-Based Approach to Preserving Privacy in Web Services,” Proc. 4th VLDB Workshop on Technologies for E-Services (TES ‘03), Springer-Verlag, 2003
- Axelsson, S. (2000) “The Base-Rate Fallacy and the Difficulty of Intrusion Detection.” ACM Transactions and Information and System Security.
- Bishop M. (2005), Introduction to Computer Security. Boston: Addison-Wesley.
- Xiang-Yang Li, Cryptography and Network Security