Preview

Ing Life

Good Essays
Open Document
Open Document
572 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ing Life
ING Life
Bo Sun

CIS 505: Communication Technologies
Strayer University

Darcel Ford, Ph.D.
February 11, 2013

Difficulties and Risks Associated with Internet
Originally, Internet was designed for absolute security environment. Therefore, the protocols which are consisting of the infrastructure of Internet have no security concerns. This means Internet is easily to be vulnerable.

Although major part of security issues are from inside, Internet does take external threats. When users connect the Internet, the web browsers might contain breaches that permit scripts to access the system and may cause damages potentially. In addition, when information is transmitting through the public network, the transmission might be captured by someone else. This is known as man-in-the middle attack. (Dean, 2009) Another potential common risk associated with Internet is called reconnaissance threats. Attackers could detect the reachable networks, devices and services through the Internet connection, or even draw an entire network map. Furthermore, DoS attack is another risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to make it shut down. (Oppenheimer, 2011)
Analyze ING’s Solution
The security mechanism existing in the current ING’s network is implemented a fire between the external brokers and the internal servers. Basically, this is not enough to protect the network, especially, the information of ING involves private personal information. The information should be protected carefully.

Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks



References: Dean, T. (2009). network+ guide to networks. Mason: Cengage Learning. Oppenheimer, P. (2011). Top-down Network Design. Boston: Pearson Learning Solutions.

You May Also Find These Documents Helpful

  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The private-public network edge is considered particularly vulnerable to intrusions, because the Internet is a publicly accessible network and falls under the management purview of multiple network operators. For these reasons, the Internet is considered an untrusted network. So are wireless LANs, which-without the proper security measures in place-can be hijacked from outside the corporation when radio signals penetrate interior walls and spill outdoors.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    iLab 6

    • 403 Words
    • 2 Pages

    What are the three primary methods for implementing security on this network, as well as the…

    • 403 Words
    • 2 Pages
    Good Essays
  • Better Essays

    stayin alive

    • 1337 Words
    • 6 Pages

    In the book Stayin’ Alive historian Jefferson Cowie writes a very engaging explanation of the political and cultural aspects that effected white workers’ economic individuality and what damaged a “vibrant, multi-cultural, and gender conscious conceptualization of class” (Stayin Alive, Cowie. 72). A single portion of the narrative touches on the rise of the New Right while another tracks the breakdown of working-class cultural idols. New Deal liberalism and the growth of a New Right founded upon a white working-class cultural conservatism are both not a new story. In Stayin’ Alive, the essential catastrophe of the 1970s was not only the Watergate incident, stagflation, racial conflict, and the local scuffles over the Vietnam War, however; In Jefferson Cowie’s Stayin’ Alive, the 1970s essential catastrophe was the social condensation that had brought poverty to American workers which was seen evidently in a class-based disaster caused by “the collapse of the bargain based on consumption in exchange for soul-killing work – that is, the crumbling of an entire paradigm upon its own vacuity” (p. 305). In this reading of 1970s history, white workers were not just perpetrators of racist and sexist reaction. They were also victims of capitalism, of the limits of New Deal liberalism, and of Republicans’ sophisticated reading of white working-class cultural concerns.…

    • 1337 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The measures could be to use firewalls; a firewall is either a software application or a hardware device. It acts as a shield between your computer/s and the rest of the Internet. The purpose of this is to control and keep safe of all the incoming and outgoing network traffic by carefully checking the data packets and…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Enjoying Life

    • 476 Words
    • 2 Pages

    Having a good healthy life style is amazing, so you enjoy your life. Some people says that healthy life is style require too many difficult staff like you can’t eat everything you like, or some says doing sports is a mission to do… ; however, they are wrong because exercising every day, eating healthy food, and having good sleep are the ways that helps us to succeed in life with enjoying it.…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Overview of Firewalls

    • 1576 Words
    • 7 Pages

    • By prohibiting connections between specific Internet sources and internal computers, a single rule in packet filtering can help protect an entire network…

    • 1576 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    • If you have questions, put up your hand in the lecture. • I will try to hang around at the end of lectures for individual longer questions. • Contact me by e-mail for questions that occur to you later. • I have a wiki you can interact on. • I have an open door policy. If my office door is open come in. If it is shut, it is a subtle hint that I don’t want to be disturbed.…

    • 20988 Words
    • 84 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internet Replacement Book

    • 277 Words
    • 2 Pages

    Internet is a global network system and prevalent in many households, company. Internet help us search informations, get in touch with people through email and chat on the internet.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    use abuse of leisure

    • 546 Words
    • 3 Pages

    Today, it is a public accessible feature for billions of people worldwide. The internet is used for multiple tasks like chatting, communicating and web browsing. The most popular is receiving email. It is very helpful in getting constructive information about absolutely anything. The internet only requires a portion of total resources of current public telecommunication networks. The Internet is one of the mankind's greatest inventions of the last century. The internet has brought a transformation in many aspects of life. Use of internet has grown tremendously since it was introduced. It is mostly because of its flexibility. Nowadays one can access the internet very easily and cheaply.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nowadays, the word “internet” is widespread all over the world. It is pretty funny if someone says that what is the meaning of internet. Internet really have big impacts on the world and the human mind. And from my point of view, it adversely affects to people, to the society by creating problems which we have to look directly at and find the solutions.…

    • 603 Words
    • 3 Pages
    Good Essays