A network is a connected collection of devices and end systems, such as computers,
printers and servers which can communicate with each other (Cisco, 2009). Networks
are implemented and used in homes, small businesses, large enterprise and in
government organizations. Network-based systems are the computers, peripherals and
applications installed on a network (Tzeyoung, 2009). A network consists of components
such as personal computers, interconnections, switches, routers and firewalls, and
each of these components perform distinct functions and work as a system, enabling
user to access information faster, reliably, securely, cost-effectively and conveniently
on the intranet or Internet. The network can be local or mobile, connection-oriented
or connectionless (Cisco, 2009).
In recent times, there has been a large increase in the use of Internet in business
enterprise and many organizations because of its great advantage in improving
productivity. This implies that there are a lot of organizations’ data such as business
strategy, product formulae, employee details and other confidential details on the Internet, which means highly sensitive information travels through the network.
The transfer of such sensitive data attracts attackers to steal or destroy information
and interfere with the network connection for fun, fame or money. One common
attacker’s tool to infiltrate such stealthy attack is through computer worm (Tachibana,
2010).
|