The Sad And Increasingly Deplorable State Of Internet Security, Revisited

Phifer, Lisa; Piscitello, David
June 2007
Business Communications Review;Jun2007, Vol. 37 Issue 6, p14
Trade Publication
The article discusses Internet security and how it can be improved. In addition to denial-of-service attacks on Web sites, the Domain Name System, Internet routing protocols, and authentication or source verification applications have become vulnerable to attack from hackers. Improvements are being made in Trusted Platform Modules and operating systems security, as well as regulations for privacy and data security. The Network Access Control, which is based on verification of user identity, is being adopted by makers of corporate network architectures such as Cisco and Microsoft. Topics include DNSSEC testbeds, IETF OPSEC committee, and botnet spoof.


Related Articles

  • Beyond NAC: the internal controls. Dix, John // Network World;7/31/2006, Vol. 23 Issue 29, p32 

    The article offers information about the emergence of internal control methodology in managing network access control (NAC). Brian Nugent, CEO of Applied Identity, refers NAC as an on-ramp security tool which regulates the accessibility of a network. Nugent shares vital information regarding his...

  • Network security investment pays off. Patton, Sean // Wenatchee Business Journal;Feb2004, Vol. 18 Issue 2, pC8 

    Discusses information on computer network security. Importance of network security; Suggestions for creating network security; Installation of firewall; Need to ensure that network security measures are in place.

  • Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model. Mukkapati, Naveen; Bhargavi, Ch. V. // International Journal of Computer Science & Network Security;May2013, Vol. 13 Issue 5, p94 

    Firewalls are crucial elements in the computer networks. Due to lack of tools for analyzing firewall policies, most firewalls on the internet have been plagued with policy anomalies. In this paper, we propose a method; which analyzes the firewall by using Relational Algebra and Raining 2D-Box...

  • Boston College survives a breach. Garretson, Cara // Network World;9/17/2007, Vol. 24 Issue 36, p40 

    The article reports on the prompt response of Boston College in Massachusetts in recovering and managing to regain its customers' trust after the data breach that occurred in 2005 when personal information of 100,000 alumni was potentially put at risk. As part of the effort, the College sent...

  • Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly. Sunghyun Kim; Heejo Lee // KSII Transactions on Internet & Information Systems;Aug2010, Vol. 4 Issue 4, p671 

    The continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in security devices create security holes and prevent the system from determining quickly whether allow or deny a...

  • Detecting and Resolving Firewall Policy Anomalies. Hu, Hongxin; Ahn, Gail-Joon; Kulkarni, Ketan // IEEE Transactions on Dependable & Secure Computing;Jul2012, Vol. 9 Issue 3, p318 

    The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls...

  • An Improved Anomaly Detection Method Based on Entropy Analysis for Large Scale Network using Data Stream Technique. Wang Juan; Chen Aidong; Zhang luqiao; Peng Jing // International Journal of Advancements in Computing Technology;Apr2012, Vol. 4 Issue 6, p272 

    Entropy-based approaches for anomaly detection are appealing since they provide more fine grained insights than traditional traffic volume analysis. While previous work has demonstrated the benefits of entropy-based anomaly detection, there has been little effort to make entropy analysis more...

  • An Efficient Worm Defense System Based Signature Extraction. Tu, Hao; Li, Zhitang; Liu, Bin; Zhang, Yejiang // International Journal of Distributed Sensor Networks;Jan/Feb2009, Vol. 5 Issue 1, p23 

    The fast spread of a worm is a great challenge to Internet security. Most current defense systems use a signature matching approach while most signatures are developed manually. It is difficult to catch a variety of new worms promptly. An efficient worm defense system is designed and implemented...

  • Rootkits aren't doom -- but keen up defenses. Fontana, John // Network World;4/24/2006, Vol. 23 Issue 16, p20 

    The article reports on the use of rootkits, a malware tool that slips into a system and hides indication if the system has been infected, for IT industries in the U.S. According to Rob Murawski, a member of the technical staff of the Computer Emergency Response Team, rootkits are not an...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics