Ing Life

Only available on StudyMode
  • Download(s) : 160
  • Published : April 23, 2013
Open Document
Text Preview
ING Life
Bo Sun

CIS 505: Communication Technologies
Strayer University

Darcel Ford, Ph.D.
February 11, 2013

Difficulties and Risks Associated with Internet
Originally, Internet was designed for absolute security environment. Therefore, the protocols which are consisting of the infrastructure of Internet have no security concerns. This means Internet is easily to be vulnerable.

Although major part of security issues are from inside, Internet does take external threats. When users connect the Internet, the web browsers might contain breaches that permit scripts to access the system and may cause damages potentially. In addition, when information is transmitting through the public network, the transmission might be captured by someone else. This is known as man-in-the middle attack. (Dean, 2009) Another potential common risk associated with Internet is called reconnaissance threats. Attackers could detect the reachable networks, devices and services through the Internet connection, or even draw an entire network map. Furthermore, DoS attack is another risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to make it shut down. (Oppenheimer, 2011) Analyze ING’s Solution

The security mechanism existing in the current ING’s network is implemented a fire between the external brokers and the internal servers. Basically, this is not enough to protect the network, especially, the information of ING involves private personal information. The information should be protected carefully.

Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks...
tracking img