IP Network Security: Progress, Not Perfection

McPherson, Danny
March 2007
Business Communications Review;Mar2007, Vol. 37 Issue 3, p54
Trade Publication
The article discusses the ways that Internet Service Providers protect their client's data and their own networks. While one of the chief benefits of the Internet is that it allows open connectivity among any two users, this same openness enables much of the most malicious activity that affects computer networks. One of the biggest security risks are botnets, which are automated tools that connect to wide networks in order to use computer user's bandwidth for both illegal and disruptive purposes. INSET: Botnets And The Digital Underground Economy.


Related Articles

  • Bird flu bargains begin to appear. Greene, Tim // Network World;5/22/2006, Vol. 23 Issue 20, p14 

    The article reports on the strategy of remote access vendors in dealing with disasters such as a potential bird flu outbreak. These vendors are making special offers that they describe as insurance policies, giving customers technology and services that can be implemented at a moment's notice....

  • Enterprises Urged To Adopt A More Strategic Approach To Application Delivery.  // Database & Network Journal;Oct2007, Vol. 37 Issue 5, p19 

    The article reports on the importance of providing key applications to remote workers and of extending business processes to distributed locations either through fixed or wireless communication technologies. It discusses the report "Application Delivery, Creating a Flexible, Service-centric...

  • You say you want a security revolution. Rothman, Mike // Network World;5/22/2006, Vol. 23 Issue 20, p22 

    The article comments on the impracticality of a network security revolution. Revolutions tend to be bloody and expensive endeavors involving a lot of carnage. Ultimately, what was accomplished is being wondered at. This is both in the real world and within networks. As the shepherd of...

  • Computer Network Security and Legal Liabilities: Focusing on the More Probable Risks.  // Venulex Legal Summaries;2001 Q4, p1 

    The article discusses computer network security and its legal liabilities in the U.S. in 2001. The protection of businesses against information espionage is explained and information on the contractual obligations of a company is presented. The article also offers information on the...

  • Taming the ever-evolving phish risk. Garretson, Cara // Network World;1/31/2005, Vol. 22 Issue 4, p19 

    This article describes a phishing technique to attack network security in the U.S. Security vendors and anti-phishing organizations report that targeted phishing attacks on enterprise networks, sometimes called spear phishing, are increasing. These attacks target workplaces by spoofing...

  • ZERO-DAY PROTECTION ON TAP. Ohlhorst, Frank J. // CRN;4/25/2005, Issue 1143, p81 

    The article focuses on threats to computer network security that have multiplied due to blended attacks and spyware. The real problem is the unknown, or zero-day, attack. These attacks occur before major vendors have identified a new security threat and before they have updated their products to...

  • Security best practices. Lawson, David // Network World;5/30/2005, Vol. 22 Issue 21, p45 

    This article discusses best network security practices that a company can adopt. Best security practices do not exist. If they did, the company implementing them would be spending too much money trying to secure its information, and worse, more than likely to stop the business from operating....


    This article reports that Computer Associates International Inc. has announced eTrust Security Command Center r8, a powerful solution for managing and responding to security events across the enterprise. eTrust Security Command Center r8 monitors and manages all aspects of enterprise security,...

  • DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING. Singh, Ajit; Gilhotra, Rimple // International Journal of Network Security & Its Applications;May2011, Vol. 3 Issue 3, p58 

    Problem faced by today's communicators is not only security but also the speed of communication and size of content. In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics