Vous êtes sur la page 1sur 3

Austin Beeler Annotated Bibliography Source 1: Gassman, B.; , "Internet security, and firewalls protection on the internet.

" ELECTRO '96. Professional Program (30 Apr-2 May 1996). Proceedings. IEEE. PDF file. Without security protocols, a cracker attempting to break into a networked system can easily gain access to sensitive information, including but not limited to passwords, user accounts, credit cards, company secrets and designs. Within a business, there are three possible areas where information is vulnerable: the local intranet, inter-company transactions, and internet communication. Using firewall and network tunneling systems, it becomes easy to prevent such threats. Firewalls help keep information private and control who accesses what using authentication and logging systems. Tunnels help designate exactly where information is being sent and what can receive it over the internet. They use encryption methods to keep data secret while in transit, and can only be decrypted by authenticated software and users. Internet security needs are diverse. - page 99, fig. 14 Trusted system placed between two networks. - pg. 97, fig. 9 This source was pretty decent in that it was based off a presentation, so it was concise and had accompanying graphics to help explain the concepts. It was a bit short, however, and didnt go into great depth, but was a good starting point. Id rate it about a 6/10. I would say that it was slightly biased in that it seemed like a business presentation or sales pitch to convince others to buy firewalls, rather than simply explain their purpose.

Source 2: Zittrain, Jonathan. "Protecting The Internet Without Wrecking It: How To Meet The Security Threat." Boston Review 33.2 (2008): 7-13. Literary Reference Center Plus. Web. 5 Nov. 2012. The PC (personal computer) was originally created for the purpose of allowing others to utilize it to create something. Anything that the hardware could conceivably handle. The only thing stopping a user of a PC was the actual writing of the necessary code. When the Internet arrived, such code could be shared easily and quickly. However, the issue of security soon became real. With viruses and malware proliferating between networked computers, a solution had to be found. Recently, these solutions tend to work only at the cost of the openness of the software that was originally its function. An example of this is Apples Apple II and iPhone. The Apple II was a success because of its accessibility. The iPhone was successful due to its functionality, but at the cost of the user having complete control over a device they themselves owned.

During the 1990s... three types of controls seemed adequate to address emerging dangers.... Today, each of these controls has weakened. - pg 7, p. 10 Many technologically savvy people think that bad code is simply a Microsoft Windows issue. pg 8, p.8 This source was extremely good. It provided evidence and compared the points it was making back to real world events. It gives multiple counterpoints to any argument that could be made against it. I would rate it as a 9/10, only because it seems to drag out its point for longer than necessary.

Source 3: "Security Of The Internet And The Known Unknowns." Communications Of The ACM 55.6 (2012): 35-37. Business Source Complete. Web. 1 Nov. 2012. The Internet is dependent on a system of information routing known as Border Gate Protocol, or BGP. This system has managed to maintain its effectiveness through the explosive growth of the Internet despite having not been updated in the past seventeen years. It also works despite minor errors or hardware failures, the impacts of which are virtually nonexistent when placed next to the scale of the entire Internet. For us to truly understand what failures can be handled and which will be catastrophic, data from the Internet must be gathered and examined. The issue at hand is what should be gathered, how will the gathering be paid for, and who will try to resist such efforts? This source explained itself thoroughly, cited evidence and events, and reached its conclusion in a concise manner. I would rate it an 8/10 with the last few points being due to certain complex topics being used to explain but never explained themselves.

Source 4: Rhee, Man Young. Internet Security : Cryptographic Principles, Algorithms, And Protocols. n.p.: J. Wiley, 2003. eBook Collection (EBSCOhost). Web. 3 Nov. 2012. What is bit shifting? What is a parity bit? What is a known plaintext attack? While several algorithms for computational data encryption have been created, the Data Encryption Standard has remained one of the most practical. Having been used for over two decades, it still shows its worth. Its methods of encryption ensure that a would be cracker would have to run a program that processed each possible key for over a one thousand years if said program could reliably check one million keys every second. The DES is used as the standard for non-classified US government use. It operates on a block cipher method, with a block of 64-

bit text being input alongside a 64-bit key, with 8 of those bits being stripped off for identification as the initial key. This article was extensive, but the jargon used made it clear it was intended for a more knowledgeable audience than myself. Ill still rate it as a 7/10, as it allows me to see what information I need to learn more about to familiarize myself with the Internet security culture.

Source 5: Fisher, Marshall Jon. "Moldovascam.Com." Atlantic Monthly (10727825) 280.3 (1997): 19-22. Literary Reference Center Plus. Web. 5 Nov. 2012. A Trojan Horse is a form of malicious code that acts just as its name implies. It operates under the guise of doing what it says, and often does work exactly as the user expects it to. The only problem is that underneath that intended function is a subroutine, a singular section of code, that works to steal information on the computer and entered on websites. A very good example is a photo viewing application that did allow the user to view photos, but often only one and of poor quality. What the applications true intention was involved redialing the number the modem normally connected to and instead dialing to a foreign country known as Moldova, where exorbitant international call rates were charged. The user had no clue they were making the phone call in the first place. This source was effective in that it explained how a trojan horse worked, then went in to the main subject which was a singular trojan horse and its exact mechanisms. It was slightly biased however, though it seemed to attack both sides of the security argument. Id still rate it a 9/10 for its deep explanations and for its view of the Internet from 15 years ago, which is outdated only in ideas, not practice.

Vous aimerez peut-être aussi