Реферат

Реферат на тему Information Security Essay Research Paper Emerging Opportunities

Работа добавлена на сайт bukvasha.net: 2015-06-12

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 27.12.2024


Information Security Essay, Research Paper

Emerging Opportunities and The Internet – Information Security

by Margaret Headley

“Using encryption on the Internet is the equivalent of arranging an armoured car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.” Gene Spafford, computer security researcher, Purdue University.

This quote serves to mock the current level of technical solutions applied to Internet based transactions. An armoured car is an inappropriate method of delivery if the recipient lives on a park bench and a cardboard box will not deter a determined thief! If the security of the transport is significantly stronger than the security of the end user system, the end user system becomes an obvious target for ‘hackers’ and ‘crackers’.

This paper discusses how the Department of Justice, the CIA, NASA, the Department of Commerce and even Microsoft have publicly fallen victim to electronic sabotage due to the lack of security in their systems. In 1997, CERT (Computer Emergency Response Team) handled more than 39,000 reported incidents. That number is expected to have quadrupled by the end of 2001.

The immense security risks of large networks such as the Internet are examined in full along with the security of firewalls linking private databases to the Internet. Because the Internet is considered to be in its ‘embryonic’ stages, advancements in security should also be seen as such.

With Trojan, virus & worm infections, becoming harder to detect and more catastrophic in the damage they cause, this paper also examines the new generation of malicious viruses, frequently delivered through email and why added security is imperative. To provide the required level of protection, security policies are needed which prevent unauthorised users from accessing resources on private databases, exporting private information and causing malicious damage.


1. Лекция Литература - Терапия Ревматоидный артрит
2. Реферат Анализ мотивации на примере ОАО Молоко Бурятии
3. Реферат на тему Muhammad Ali Aka Cassius Clay Essay Research
4. Контрольная_работа на тему Документальное обеспечение безопасности труда
5. Контрольная работа Расчет себестоимости ремонтных работ СТО
6. Реферат Россия в эпоху Петра I 1682-1725 гг
7. Реферат Цены на нефть - снижение неизбежно, но не скоро
8. Реферат на тему Critical Essay On The Pedestrian Used A
9. Сочинение на тему Природа и человек в романтической лирике В А Жуковского
10. Сочинение Авторская позиция в романе Гончарова Обломов