Реферат

Реферат на тему Information Security Essay Research Paper Emerging Opportunities

Работа добавлена на сайт bukvasha.net: 2015-06-12

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 17.4.2025


Information Security Essay, Research Paper

Emerging Opportunities and The Internet – Information Security

by Margaret Headley

“Using encryption on the Internet is the equivalent of arranging an armoured car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.” Gene Spafford, computer security researcher, Purdue University.

This quote serves to mock the current level of technical solutions applied to Internet based transactions. An armoured car is an inappropriate method of delivery if the recipient lives on a park bench and a cardboard box will not deter a determined thief! If the security of the transport is significantly stronger than the security of the end user system, the end user system becomes an obvious target for ‘hackers’ and ‘crackers’.

This paper discusses how the Department of Justice, the CIA, NASA, the Department of Commerce and even Microsoft have publicly fallen victim to electronic sabotage due to the lack of security in their systems. In 1997, CERT (Computer Emergency Response Team) handled more than 39,000 reported incidents. That number is expected to have quadrupled by the end of 2001.

The immense security risks of large networks such as the Internet are examined in full along with the security of firewalls linking private databases to the Internet. Because the Internet is considered to be in its ‘embryonic’ stages, advancements in security should also be seen as such.

With Trojan, virus & worm infections, becoming harder to detect and more catastrophic in the damage they cause, this paper also examines the new generation of malicious viruses, frequently delivered through email and why added security is imperative. To provide the required level of protection, security policies are needed which prevent unauthorised users from accessing resources on private databases, exporting private information and causing malicious damage.


1. Контрольная работа на тему Переработка древесной зелени
2. Реферат на тему Dealing With AntiSemitism Essay Research Paper Lorretta
3. Реферат на тему College Essay Research Paper Why is it
4. Реферат на тему Punk Music Essay Research Paper Punk is
5. Контрольная работа Влияние потребностей на формирование человеческой личности
6. Курсовая Развитие основ логического мышления у старших дошкольников на занятиях математикой
7. Реферат Электротехника и основы электроники
8. Реферат Безданское ограбление
9. Реферат на тему El Ninos Essay Research Paper What Are
10. Методичка на тему Пищевые отравления классификация клиника методика расследования профилактика Часть 1