Information Security Essay, Research Paper
Emerging Opportunities and The Internet – Information Security
by Margaret Headley
“Using encryption on the Internet is the equivalent of arranging an armoured car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.” Gene Spafford, computer security researcher, Purdue University.
This quote serves to mock the current level of technical solutions applied to Internet based transactions. An armoured car is an inappropriate method of delivery if the recipient lives on a park bench and a cardboard box will not deter a determined thief! If the security of the transport is significantly stronger than the security of the end user system, the end user system becomes an obvious target for ‘hackers’ and ‘crackers’.
This paper discusses how the Department of Justice, the CIA, NASA, the Department of Commerce and even Microsoft have publicly fallen victim to electronic sabotage due to the lack of security in their systems. In 1997, CERT (Computer Emergency Response Team) handled more than 39,000 reported incidents. That number is expected to have quadrupled by the end of 2001.
The immense security risks of large networks such as the Internet are examined in full along with the security of firewalls linking private databases to the Internet. Because the Internet is considered to be in its ‘embryonic’ stages, advancements in security should also be seen as such.
With Trojan, virus & worm infections, becoming harder to detect and more catastrophic in the damage they cause, this paper also examines the new generation of malicious viruses, frequently delivered through email and why added security is imperative. To provide the required level of protection, security policies are needed which prevent unauthorised users from accessing resources on private databases, exporting private information and causing malicious damage.
! |
Как писать рефераты Практические рекомендации по написанию студенческих рефератов. |
! | План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом. |
! | Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач. |
! | Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты. |
! | Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ. |
→ | Виды рефератов Какими бывают рефераты по своему назначению и структуре. |
Реферат | Роль геохимических циклов в биосфере |
Реферат | «О поэме Н. В. Гоголя «Мертвые души» |
Реферат | Понятие и природа власти |
Реферат | Суд присяжных 2 |
Реферат | Судебная власть Российской Федерации |
Реферат | Конвеер Р4 |
Реферат | Задачи юриста на предприятии |
Реферат | Влияние структуры и состава кадров на эффективность работы предприятия |
Реферат | Соловей и роза |
Реферат | Suicide Essay Research Paper Teenage years are |
Реферат | Сочинение-описание местности |
Реферат | Соловьиный сад |
Реферат | Наука конца 19 века |
Реферат | Система складирования как основа рентабольности работы склада |
Реферат | Инженерное оборудование пунктов управления |