Реферат

Реферат на тему Information Security Essay Research Paper Emerging Opportunities

Работа добавлена на сайт bukvasha.net: 2015-06-12

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 22.11.2024


Information Security Essay, Research Paper

Emerging Opportunities and The Internet – Information Security

by Margaret Headley

“Using encryption on the Internet is the equivalent of arranging an armoured car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.” Gene Spafford, computer security researcher, Purdue University.

This quote serves to mock the current level of technical solutions applied to Internet based transactions. An armoured car is an inappropriate method of delivery if the recipient lives on a park bench and a cardboard box will not deter a determined thief! If the security of the transport is significantly stronger than the security of the end user system, the end user system becomes an obvious target for ‘hackers’ and ‘crackers’.

This paper discusses how the Department of Justice, the CIA, NASA, the Department of Commerce and even Microsoft have publicly fallen victim to electronic sabotage due to the lack of security in their systems. In 1997, CERT (Computer Emergency Response Team) handled more than 39,000 reported incidents. That number is expected to have quadrupled by the end of 2001.

The immense security risks of large networks such as the Internet are examined in full along with the security of firewalls linking private databases to the Internet. Because the Internet is considered to be in its ‘embryonic’ stages, advancements in security should also be seen as such.

With Trojan, virus & worm infections, becoming harder to detect and more catastrophic in the damage they cause, this paper also examines the new generation of malicious viruses, frequently delivered through email and why added security is imperative. To provide the required level of protection, security policies are needed which prevent unauthorised users from accessing resources on private databases, exporting private information and causing malicious damage.


1. Лекция Церковне право Церковне право
2. Статья Об утверждении Наставления по работе дорожно-патрульной службы Государственной инспекции безопас
3. Контрольная работа Теория Художественной воли формальный метод А Ригля
4. Реферат на тему Чрезвычайная ситуация сущность структура классификация
5. Курсовая на тему Особенности иерархии семейных ценностей
6. Контрольная работа Аналіз кошторисів Управління з контролю за використанням та охороною земель у Вінницьк
7. Реферат Поняття про анастомози судин і колатеральний кровообіг плода
8. Реферат на тему Social Classes Of The Elizabethan Period Essay
9. Реферат на тему Атлантида в разные времена
10. Реферат на тему Death Penalty Revised Essay Research Paper In