Essays /

Security On The Internet Term Paper Essay

Essay preview

Security on the Internet: Problems and Solutions
Annotated Outline and Bibliography
Louis O. Rollins
Excelsior College- Albany, NY
BUS 570- Information Technology
14 November 2014
Dr. Wayne Brown

Businesses now need to connect and stay connected to partners and prospective partners to achieve the desired effects that will make all their transactions successful. LAN, (Local Area Networks), VPN (virtual private networks) and of course the new trending wireless networks are some of the principle ways that businesses are communicating with their customers, vendors and partners. The security problems with the internet (LAN, VPN and wireless) with regards to viruses, spyware, malware, and worms are a significant problem for employers, business owners and individuals. There have been attacks on networks all over the world and this had and will continue to impact businesses everywhere. Employers and employees need to know how to implement safety measures against these attacks.

The internet has become a significant factor in the business world as all aspects of doing business have migrated to the internet. Where did the internet come from and who created it? The internet was first introduced to the world circa August 1991; the World Wide Web was made available to the general public by Tim Berners-Lee. Use of the internet grew exponentially from there giving everyone access to information across the globe. Access to the internet opened up many lucrative business ventures across the world. Unfortunately the web was not a perfect creation and soon there were people who realized that they could secretly access other users’ information and cause substantial damage to the system or the individual. This paper will examine some of the threats that are encountered by the Raldally Corporation during their business transactions on the internet and examine possible security solutions for the company. We will look at the viewpoints from the user to the supervisors as they use and deal with potential problems with security on all nets. We have to keep in mind that these issues are related to all information technology that drives the company revenue and daily operations. Company summary: The Raldally Corporation

The Raldally Corporation is an American technology company that specializes in the sale of services and merchandise to acquire and manage private sector and government contracts. Founded in 1989 in Clarksville, Tennessee, the services include but are not limited to: 1. OCONUS (Outside the Continental United States) and CONUS (Continental United States) training and advisory service missions that are focused on training organizations on newly purchased equipment from the company or another source. 2. Advisory services that assist the customers on applications of new equipment to include certain other applications that require active participation by the customer in numerous scenarios that replicate real-world incidences. 3. Merchandise, which includes non-prescription preventative medicines and the containers for storage and use in urban and rural austere environments, commercial-grade survival, military-law enforcement style uniforms and accessories. These include flashlights, equipment containers, tents, backpacks, equipment belts, navigation aids, and training software. The corporation has had numerous problems with viruses and other malware programs in the network servers. One attack stopped business operations for six hours. The network IT department had briefed everyone on the use of the LAN system and they had even held initial briefings on the new trend of BYOD (Bring your own device) that involves doing some tasks on the employees’ smartphones. This concept was introduced in response to employee input that indicated that they could be more efficient, doing simple company transactions, on their personal smartphones. Advent of the Internet and the start of cyber-attacks:

We know that the internet or the World Wide Web became publicly available on 6 August 1991. This started a new technology that would fundamentally change the world as we know it. Tim Berners-Lee is credited with the creation of the World Wide Web. Berners-Lee proposed that the internet be used for a variety of purposes such as online help, news schemes, and project documentation to name a few. This proposal went through various editions and then on 6 August 1991 the World Wide Web went public to not a lot of news coverage and fanfare because people didn’t know what the internet was and what it could do for them. There is a quote from Berners-Lee about the internet that is still posted on Google Groups. “The World Wide web (WWW) project merges the techniques of information retrieval and hypertext to make an easy but powerful global information system. The project started with the philosophy that much academic information should be freely available to anyone. It aims to allow information sharing within internationally dispersed teams and the dissemination of information by support groups.” From here the internet began developing very quickly, the first image was uploaded in 1992 and in 1993 the WWW was announced to be free for everyone to use with no fees payable. This was the key factor that would allow the internet to take off in exponential leaps and bounds. The advent of the internet wasn’t without a downside in the form of cyber-attacks. Cyber-attacks are defined as the deliberate breaching of an entity’s computer system with the intent of stealing intellectual property or financial resources; disabling or manipulating a computer or network, or causing other damage or disruption to a computer driven system. These attacks are real and have been a part of the internet since its inception. The following is a short timeline of incidents of cyber-attacks that happened throughout the history of the internet. This is just a highlight of some of the cyber-attacks there are many more not listed here: 1. 1988: An internet worm shuts down about 10% of the world’s internet servers; it is the first occurrence of an internet worm. Robert Tappan Morris, a student at Cornell University released the worm. Morris is arrested and convicted under the computer fraud and abuse act, he is the first person to be tried and convicted under the act. 2. 1994: Computers at the Rome air department Center at Griffiss Air Force Base in New York are attacked 150 times by anonymous hackers using “sniffer” programs to steal login credentials and sensitive information from a lab that conducts research on artificial intelligence. 3. 1998: The Air Force Computer Emergency Response Team in San Antonio, Texas noticed intrusions into their computer networks from several academic institutions including Harvard University. The hackers were three teenagers; th...

Read more


-2014 /5-network-security-issues-and-solutions/ /content/dam/lockheed/data/corporate/documents/white-papers/cyber-security-and-transformational-technologies.pdf /insider/2011/08/06/20-years-ago-today-the-world-wide-web-opened-to-the-public /security/resources/botnet-whatis.aspx) 000 1 10 100 11 11/28/14 12 123 128 14 150 18 1988 1989 1991 1992 1993 1994 1998 2 20 2001 2003 2007 2010 2011 2012 2013 2014 3 300 4 40 5 570 6 7 700 8 9 9th abil abl abstract abus academ access accessori accident accomplish accord account achiev acquiesc acquir acrobat across act action activ activist ad adapt address adher administr adob advanc advantag advent advic advisori affect age ago aid aim air airport al al-assad al-qassam albani alleg allianc allow almost alreadi also alway amazon american amount analyz android angel annot announc anonym anoth answer antivirus antonio anybodi anyon anyth app appli applic approv april apt area aren argument armi around arrest articl artifici ask aspect assad assault assist attach attack attempt attent attract august auster autom avail avoid await awar b babi back backpack backup backward bank base bashar basic becam becom began believ belt berner berners-le better bibliographi big bill birthday bit blackberri blame blank block bot botnet bottom bound breach brief bring bring-your-own-devic broadcast brown browser bryant bus busi byod c cafe call candi capabl capit card care carri case catastroph caus censorship center certain challeng chang charact china chines circa clarksvill class clean clearanc client clinton clip close cloud code collect colleg combin come commerc commerci commercial-grad commit common communic communiti compani compar competit complex comprehens compromis comput concentr concept concern conclus conduct connect consist constant consum contact contain continent continu contract control conus convict cooki cornel corpor cost could counter cours cover coverag crash creat creation credenti credit crime crimin critic crucial crush custom cyber cyber-attack cycl d daili damag danger darkleech data date day deal decid decreas dedic default defens defin degre delet deliber deliv demand demonstr deni denial denial-of-servic depart depend depot describ design desir desk detect detriment develop devic didn differ difficult din disabl disastr discov discredit discuss disgruntl disguis disk dispers display disrupt dissemin distribut document doesn domain door dormant doubt download downsid dr drawer drive drive-bi driven e earli easi easili edit effect effici efraim either electron els email embarrass emerg employ employe enabl encount encrypt enforc engin ensur entir entiti environ epic equip error especi espionag estim etc evalu even ever everi everybodi everyon everyth everywher evolut evolv examin exampl excelsior except execut exist expand expect expens expert expir exploit exponenti extern eye f facebook facet fact factor factori famili fanfar far faster fbi februari fee fi fight fighter file filter final financi find firewal first flash flashlight flexibl focus follow forc form forward found fraud free freeli frequent friend frontier fundament futur g gain game gas gate gather general generat get ginmast give given global globe goe good googl gotten govern grade grant greater gregori grew griffiss group guess h ha hack hacker hacktivist hama hand hand-in handl happen hard harder harm harvard hasn headach held help hide highest highlight histori hit hoboken home homeland homepag horizon hors hotel hour hous hr html human hypertext identifi imag immedi impact implement import in-th inadvert inappropri inc incept incid includ increas independ indic individu infanc infect infiltr inform infrastructur initi inject innocu innov input insid instead institut instruct intact integr intellectu intellig intent intern internet intranet introduc introduct intrus invas involv ip iphon islam isn issu izz java john juri keep key kind know knowledg known lab lan landscap laptop larg larger latest launch law leak leap least leav lee left legitim less let letter level liber like limit linda line link list load local lockhe login long look los lose lot loui lucrat made maintain mainten make maker malici malwar manag mani manipul manual market martin materi matter may mayb mean measur medicin member mention merchandis merg merit messag method microsoft might migrat militari military-law million mind minim mission mistak misus mobil money monitor month morri move much multi multi-facet music must myspac name navig near need net network never new newer newli news next nine ninth nj non non-prescript note notic novemb number numer ny nymaim o obfusc obstacl occur occurr oconus off-sit offic offici often one onlin onsit onto open oper opposit optimum option order organ origin other outlin outsid overal own owner packet page paper part parti particip partner pass password past payabl payment pc penetr peopl perfect perform permiss permit persist person personnel pet philosophi phish phisher phone physic pierc pipelin place plan play player plus point polici polit pop pop-up popular portal possibl post potenti power precaut predict prepar prescript present presid prevent principl print prioriti privaci privat problem process profession profil program project prolif promot prompt proof properti propos prospect protect protest protocol prove provid psn public purchas purpos qassam question quick quot rain rais raldal random rang ransom rapid reach read reader readili real real-world realiz reason record recov red reduc redund refer regard regular relat releas religi remain rememb remind remot remov replic report reput requir research resili resist resourc respect respons restaur restrict result retriev reus revenu revers risk robert robot rollin rome room rout run rural russian s3 sacrif safe safeguard safeti said salari sale san save say scan scanner scenario schedul scheme seagat search secret secretari section sector secur see seek seem seen sega segment sell send sensit sent septemb serious server servic set seven sever share short shut side sign signatur signific simpl simpli sinc site six slow smart smartphon sniffer social softwar solut somebodi someth son soni soon sourc spam spamhaus spear spear-phish special specif sponsor spot spread spywar ssid stack start state state-sponsor stay steal stealthier step still stolen stop storag store strang stream strict stride student studi style substanti subtl success suggest summari supervisor support sure surf surviv suspect syrian system tab tablet tactic take tappan target task team techniqu technolog teenag temp tennesse tent term termin texa textbook thing think third third-parti thousand threat three throughout thus tim time timelin titan today togeth token touch toughest train transact transform travel trend tri trojan true trust turban turn twitter two type typic u.s unauthor understand unfortun uniform uninfect uniqu unit univers unknown unmonitor unnot unsecur unsur unsuspect up up-to-d updat upload urban url use user usual varieti various ve vector vendor ventur version veteran victim video view viewpoint vigil virtual virus vish visit visual volonino vpn vpns vulner wake wake-up want ware wari warn wasn way wayn weak web web-bas web-filt web-play webcam websit well went wep white whole wi wi-fi wide wiley window wing wire wireless wit within without wlan wood word work workgroup workplac world worm would write www year york zeus zombi