Tuesday, October 22, 2019
Information Security Essay
Information Security Essay Information Security Essay Network Security Past Present and Future ISSC340: Local Area Network Technologies Smith American Military University Introduction to Network Security Since the development of computer networks there have been weaknesses and those seeking to exploit them. Initially the reasons make have been non malicious and academic in nature, but later became ways to steal valuable data in cyberspace. Those who break into networks aka hackers have many different reasons for their network breaches and could range from stealing corporate secrets and national security information to those just getting a thrill and earning bragging rights to other hackers. Whatever the reason hackers have those seeking to protect themselves from these breaches will need to rely on Information Security professionals to keep network breaches to a minimum and ensure data remains protected. As more and more entities build networks of their own and put more and more data in cyberspace incidents of breaches will continue to increase as will the need to defend from them. Beginning of a Need for Network Security The history of network security can trace its roots to much earlier times and has roots in cryptography. People have used certain types of encryption to secure messages, information, communications and data for as long as opposing militaries and countries have wanted to get that information. During WW2 the famous enigma machine was developed and used to encrypt German communications. Todayââ¬â¢s computers and networks utilize encryption and authentication techniques in order to prevent unauthorized users from accessing the network and stealing information, secrets and other important data. (Marion, 2011) In the late 60s the origins of todayââ¬â¢s internet the Advanced Research Projects Agency Network (ARPANET) was commissioned by the Department of Defense (DOD) for the purpose of researching networking. As we know by the large use of the internet ARPANET was a huge success, although it was originally intended for the sharing of data bet ween scientists and research. An Inter-Networking Working Group was developed to set standards in order to govern the network. Vinton Cerf was elected chairman of that working group. Cerf along with Bob Kahn and a team of others develop TCP/IP so computers using the internet can have a common language. One problem with TCP/IP is there are no security protocols within the communication stack. (Dava) While originally a limited number of computers were on the internet, the mid 80s saw a huge increase in personal computers and network ready servers which allow many companies and users to utilize the internet for the first time. In the 90s the World Wide Web was made available to the public. Before long massive numbers of people across the world are conducting e-business, communication, commerce, shopping, education, research and numerous other uses for the information super highway. Historical Threats to Computer Networks and Demand for Security A few of the more memorable network breaches in history exposed numerous flaws in networks and motivations for why some hackers expound large effort to breach these networks. Below are some of the more notable and show an example of different strategies for the same outcome, which is breaching a network. *In 1978 Gary Thuerk made the first mass email now known as SPAM on ARPANET advertising for a new model of computers. (Messmer, 2008) *On 2 NOV 1988 Cornell graduate student Robert Morris made an experimental self-replicating and self-propagating program and put it on the internet. The damage was much more than intended and computers at universities, military sites, medical facilities and others were infected. (Messmer, 2008) *In 2006 Jeanson James Ancheta who turned numerous computers on the Naval Warfare Center and the Defense Information Systems Agency into botnets to send spam was arrested. (Messmer, 2008) *In Information security Essay Information security Essay No4 Briefing update Regulating the Internet Will the Internet be allowed to develop as a completely unfettered medium, or will telecom and content regulators from government and industry play a major role in overseeing what happens? Opinion is divided. Almost three-quaters of the population would like to see some form of regulation but most people are unsure how it can be done. Whichever way the dust settles on this issue, the tension between free and regulated flow of online information will continue to spark heated debates amongst academics, policymakers, entrepreneurs and activists across the globe. Early in the new year, the Commission is to arrange a seminar to discuss the issue of Internet content regulation, as its contribution to the debate. Within the review of broadcasting regulation in the UK, the rapidly expanding use of the Internet plays a critical part. In its response to the Governmentââ¬â¢s green paper on the regulation of the communications industry, the Broadcasting Standards Commission called the Internet ââ¬Å"a cross between a tribal notice board, an information exchange, a library, a chat line, an entertainment centre, a shopping and banking hall, and a post box..â⬠In the Commissionââ¬â¢s view it would be impractical to seek to apply the same regulatory requirements to what are essentially private applications as opposed to those which are public. With its experience in the regulation of content, the Commission is frequently asked to contribute to conferences and seminars on Internet issues. This edition of Briefing Update seeks to outline some of the issues for both the present and the future. A review written for the Commission by Madan Rao takes a broad view and this is followed by a consideration of regulatory issues with respect to the protection of children. Surfing the issues by Madan Rao National policy Perhaps the biggest challenge for national policymakers dealing with the Internet comes from the convergence it makes possible. Issues relating to the Internet economy necessarily involve inputs from the departments of trade or commerce, broadcast and print media, the telecommunications and electronics industries, education departments, national security and policing, consumer groups, and the private sector. Incorporating and addressing all their concerns within a comprehensive economic framework is a major challenge for many societies, particularly when faced with pressures of investing in more basic citizen and social services. However, free-speech advocates in the US and elsewhere argue that a global ratings system could invite action by governments that goes beyond this harmful or illegal content and would include restrictive laws to force publishers to rate themselves, punishment for those who misrated their content, or indeed censorship. Key decision areas facing policy makers include intellectual property rights on the Net, cyberlaw (eg. Internet taxation, digital certificate authorities, online crime), universal access to the Net, Internet telephony, and online content. This article focuses on three key areas pertaining to online content regulation: concerns for children, national culture, and on-line publishing models. The challenge from abroad Concerns for children Despite the vast educational potential of the Net, fears persist regarding the presence of content which could have a harmful effect on children using the Internet, especially sex, nudity, violence and language. These concerns have led to a number of international initiatives to co-ordinate hotlines for reporting illegal or harmful material. In Europe the Internet Watch Foundation is leading some of this work. Multilateral organisations like the United Nations and Interpol have held numerous international conferences to track and counter the use of the Internet for child pornography and child prostitution. One practical response has been the U.S. based
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.