of intellectual property that can be easily acquired
through the internet.
There are currently two fundamentally different
networks, data networks and synchronous network
comprised of switches. The internet is considered a
data network. Since the current data network
consists of computer‐based routers, information
can be obtained by special programs, such as
“Trojan horses,” planted in the routers. The
synchronous network that consists of switches
does not buffer data and therefore are not
threatened by attackers. That is why security is
emphasized in data networks, such as the internet,
and other networks that link to the internet.
The vast topic of network security is analyzed by
researching the following:
1. History of security in networks
2. Internet architecture and vulnerable
security aspects of the Internet
3. Types of internet attacks and security
methods
4. Security for networks with internet access
5. Current development in network security
hardware and software
Based on this research, the future of network
security is forecasted. New trends that are
emerging will also be considered to understand
where network security is heading.