Preview

Internet Protocol Journal

Powerful Essays
Open Document
Open Document
17243 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Protocol Journal
June 1999

Volume 2, Number 2

A Quarterly Technical Publication for Internet and Intranet Professionals

F r o m

T h e

E d i t o r

In This Issue
From the Editor .......................1 Peering and Settlements ...........2 Firewalls and Internet Security ..................................24 Was the Melissa Virus So Different? ..........................33 Book Review..........................36 Call for Papers .......................38 Fragments ..............................39

In this issue, Geoff Huston concludes his two-part article on Interconnection, Peering, and Settlements. Last time Geoff discussed the technical aspects for Internet Service Provider (ISP) interconnection. This time he examines the associated business relationships that arise out of ISP peering arrangements. He also looks at some future directions for the ISP interconnection environment, particularly with respect to Quality-of-Service considerations. A recurring theme in this journal has been the traditional lack of security in Internet technologies and systems. We have examined several ways in which security has been added at all levels of the protocol stack. This time we look at firewalls, a popular way to segregate internal corporate intranet traffic from Internet traffic while still maintaining Internet connectivity. Fred Avolio gives the history of firewalls, their current state, and future directions. Computer viruses have probably existed for as long as we have had computers. However, the ease with which viruses can be distributed as Internet e-mail attachments has made the problem more prevalent. Recently, the Melissa virus achieved some notoriety because of its “selfreplication” properties. Barbara Fraser, Lawrence Rogers, and Linda Pesante of the Software Engineering Institute at Carnegie Mellon University examines some of the issues raised by this kind of virus. This issue is the first anniversary issue of The Internet Protocol Journal (IPJ). You can find all of our back issues in

You May Also Find These Documents Helpful

  • Better Essays

    The owner of Kudler Fine Foods has interest in integrating technology into its business operations and needs some help. The company has asked the accounting firm to prepare a brief that details how computer systems can help meet the needs of the business and improve the accounting operations. Included in this brief is the business and accounting information needs of the company. The brief will also detail the strengths and weaknesses of the company’s current system, opportunities of technology to improve operations, and threats the current system may pose to the company. Last, the brief will offer suggestions…

    • 1170 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Bagranoff, N. A. (2008). Core concepts of accounting information system. John Wiley & Sons, Inc.…

    • 1050 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9

    • 698 Words
    • 3 Pages

    The Internet-the global network formed by interconnection most of the network on the planet with each home and company network connecting to an internet service provider which in turn connects to other ISP.…

    • 698 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    On September 10, 2003, Hugh McCauley, Chief Operations Officer of Riordan manufacturing sent out two memos with regards their China relocation and the IT Special Project. The persons contacted were Charles Williamson, VP of International Operations; Dale Edgel, Chief Financial Officer; Lowell Bradford, Chief Legal Counsel; Clyde Cousins, VP of Transportation; Maria Trinh, Chief Information Officer; Robert Lord, Director of Plant Operations who lives in China; and the company’s namesake, President, and CEO Michael Riordan. Persons in all levels of the organization have been made aware of needed changes that have taken place and problems that must be solved in order to maintain growth and continue with satisfactory customer service.…

    • 841 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    |Cyber Security Industry Alliance. "The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime. "Opposing Viewpoints: Cyber |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Internet Protocol (IP) sits in the middle of the five-layer TCP/IP model. IT provides service to the layers above it and receives services from the layers below it. Almost every computing device on the planet communicates in some way, and most of those use IP. IP exists as an Internet standard protocol, also called ipv4, although it is mostly just referred to as IP. IP was created in the 1970s, but did not reach standard status as the IPv4 RFC until the 1980s.…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    protocol paper 1

    • 831 Words
    • 4 Pages

    Recall: In "The problem of evil," James Rachels and Stuart Rachels provider some important point: 1) Pain is not body’s warning system needed, because newborn babies did not deserve inexorable pain; 2) Even If we need evil to appreciate the good, but it is does not explain why there is such an extraordinary amount of evil in this world; 3) The doctrine of original sin was absurd. According to authors, it would be come to a conclusion that a newborn baby did deserve terrible disease. 4) The idea that Free Will Defense is in apparent contradiction to the natural evil in the world. 5) Based on the idea that a world without suffering would be void of the virtues necessary for good moral development. It does not explain the reason that God allowed the Holocaust or isolated cases of extreme cruelty to happen. 6) The theory of moral development does not explain the reason why animals suffering.…

    • 831 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Comer, D. E. (2009, 2009,2004,2001,1999,1997). Computer Networks And Internets (5th ed.). Upper Saddle River, New Jersey: Pearson Education, Inc.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The Kazaa Overlay

    • 8801 Words
    • 36 Pages

    On a typical day, KaZaA has more than 3 million active users sharing over 5,000…

    • 8801 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    References: Ralph M. Stair, George W. Reynolds. (2006). Fundamentals of Information Systems, (3rd ed.). Copyright 2006 Thompson Course Technology…

    • 592 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Humanities Course Paper

    • 1596 Words
    • 7 Pages

    Through the past several decades the advancement of technology has evolved. Among one of the advancements was the Internet. The Internet is a worldwide of networks connecting millions of computers. Through the Internet countries are able to exchange data, news and opinions. It started in the 1960’s when the internet was originally being used for government which later evolved to the world (Computer history museum, 2006). Over the past forty years the internet has changed technology of computers and how the world communicates, online banking, social networking, and online shopping. The Internet we know today grew from seeds planted by the U.S. Government. The Department of Defense issued a twenty thousand dollar contract on December 6, 1967 for the purpose of studying the design and specification of a computer network (Internet History from ARPANET to Broadband, 2007). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet (Computer history museum, 2006). The ARPA laid the groundwork which later became the internet. By 1992 the Internet has one million hosts (Ganna, 2006). Through the years the Internet has changed the way people live and run businesses. My project will walk through the discovery and evolution of the Internet.…

    • 1596 Words
    • 7 Pages
    Powerful Essays