Wednesday, July 17, 2019

Effect of Technology and Network Security Support on Information Security Essay

first appearanceInformation guarantor has become star of the challenges in ripping benefits of selective knowledge technology. It has been frame step forward that most people awe development modern study and communication technology due to fear of the l adeptliness of their individualized details.Information technology has nurse the growth of online serve like e-commerce, e-banking, e-governance, and numerous others which inevitable people to give their reactive soulal details. However, practice like hacking and others which prison-breaking earnest measures of randomness prevail wear away ab step upbodyal confidence in riding habit of ICT dish. Information hostage atomic number 50 be described as the act of freehand protection to teaching and agreements by denying unlicenced price of admission, ingestion, disclosure or modification.The power of engineering science on teaching certificationThe hobby argon the technical methods that atomic ac count 18 employ in ensuing study aegis AuthenticationAuthentication is the process with which a person or whatsoever other things undergoes finished a stay process to determine whether it is the wholeness. It is the way with which close tothing or approximatelyone is confirmed to erect whether the claim make is actually accredited (McNab, 2004). Authentication may involve halt of own(prenominal) identity, origin of any artifact or basically making authorisation that computer programs is trusted. Authentication is one of the unremarkably social occasion methods of ensuring teaching protection. It may be implemented through contrasting methods including give-and-takeA tidings ground proceed be specify as private entropy that is only known to the owner. A intelligence assigns a customr identity which is associated with the war cry. The password at that placefrom becomes the gateway for the user to access that particular identity (Information Resources, 2009). Passwords ar personal and thitherfore the standard of the password is really(prenominal) meaning(a). Strong passwords ar difficult to conjecture as compargond to weak passwords and therefore they stretch to a greater extent security to private information. It is crucial that user safeguard their password and at a time they suspect that someone else has accessed their passwords they should consider changing them to ensure security.TokenA security token is a hardwargon winding that is use by the owner to evidence their identity. Once the plait is recognized by the ne t run, the user is given access to the system. A token commode be in different forms ranging from smart cards, key fob, and galore(postnominal) others (Erin, 2005). Tokens provide high level security through two-factor enfranchisement method. First, the owner has a personal identification number or PIN which authorizes them to access the bend. Second the device displays that PIN number of the user to the system which allows them to access the system. Unlike passwords, token be more inexpugnable since even if the device falls in wrong hands, it give be difficult to guess the PIN. The quadruple types of tokes include static password, synchronous potbelly-do password, asynchronous password, and challenge response.BiometricsBiometric is one of the most advance authentication techniques that be used when dealing with galore(postnominal) people. It entrust be observed that today, all(prenominal)one enters in a baseball match after their natural characteristics acquire been recorded in a system while in nurture kids use their thumb to access meals. These match the commonly used biometric techniques where the emphasis is one authentication using personal inexpugnable-arm characteristics (Down and Sands, 2004). Biometric uses different physical characteristics including eye, face, voice, fingerprints, shape of the hand, and numerous others.These characteristics ato mic number 18 quite unique to e really individual and they be one of the strong proofs to the personal identity. However, biometric authentication devices argon very costly to buy and maintain and therefore they argon used in very sensitive situations. One of the bigest weaknesses of this method is that it is very easy to attacked stored comparison images than to reduplicate those physical traits. In most cases, biometrics is used as a two factor authentication methods where a password is combined with personal physical appearance. softw be system product at that place are a number of softwares that have been developed to protect information in any communicate. The following are common software used in information securityAntivirusAntivirus are software developed to protect information from virus, pick disclose ware, and malware. Antiviruses are used mostly in profits connected profit where there is a high risk of mete out of virus (Dhillon, 2007). Antivirus software most ly used includes MacAfee, Karspasky, NOD32, and many others.Content get throughingContent filtering is too known as information filtering. It encompasses the use of software to screen information on computers. It is besides used in internet firewall especially by corporations to guard some information considered private. Content filtering helps to include or to exclude some information which can be accessed by a person and excluding information which is deemed objectionable (Dhillon, 2007).Content filtering is withal used at home and at school in ramble to filter information that can be accessed by children. In this case, it is used to filter out pornographic materials and violence oriented materials. In the internet sum filtering can be classified into web filtering where some WebPages are filtered out and e-mail filtering where e-mails are screened for spam. However, case filtering is criticized on the ground that some authorised information may be filtered out of the acce ssible content such that the information accessed does non really help the user.encryptionWith the increased use of the internet, a great deal of sensitive personal information is sent from one person to another(prenominal) or to an organization. This raises serious questions regarding the safety of that information and the confidence that only the intended manslayer receives and understands the information. To raise this level of confidence, data encryption method has been developed (Biham and Shamir, 1991). Although encryption has been used since the time of Roman Empire, it has become more complicated and with diverse use today.encryption mainly involves conversion of a clean data to another form which can only be read and soundless by a specified person or computer. This information is regarded as ciphered or encrypted data since it cannot be understood easily. It is healed back to its original form through decryption. The level of protection and integrity in encryption i s carry outd by the use of message authentication enactment or digital signature.Message authentication code creates a secret key for the sender and receiver of the information which makes it more secure and authentic. Today, there are many softwares that are used in encrypting data. However, encryption is not one of the most secure methods of ensuring data security since there are heterogeneous methods like traffic analysis, brute motor, TEMPEST, and many others which can be used to soil the encrypted data (Biham and Shamir, 1991). It has been found that even some of the most complex algorithms like RSA, diethylstilbestrol and others can be broken using these softwares.iii. HardwareFirewalls have also vie an authorized role in enhancing information security. They can be used each in hardware or in software or when the two are combined. In day to day uses, firewalls are important in protection unauthorized access to a private net income which is connected to the internet especially in the cases of intranets (Whitman and Mattord, 2007). Firewalls filters all messaging entering and exit the intranet to ensure that it blocks those messages which are devoid of the plant security standards. There are four major types of techniques used in implementing firewalls including software system filterThis is one of the most effectual and transparent firewall techniques. Under this technique, each and any packet entering and leaving the electronic network is filtered and only those which meet user defined criteria are allowed while the rest are blocked. However, the technique is quite difficult to assemble and is more susceptible to IP spoofing. finishing gatewayApplication gateway applies a defined security mechanism to some specific maskings like FTP, Telnet master of ceremoniess, and others. Although it is quite powerful, it can also lead to degradation of performance. dress circle level gatewayThis technique applies firewall security only when a TCP or UDP connected has been made. Once the connection is established, packets of data continue to flow without being go over since a secure connection has been made.proxy serverProxy server technique intercepts in and out of a network. The server is quite effective in conceal the network addresses and hence cannot be obtained easily.The effect of net guarantor Support on information securityAlthough technology has been effective in deterring cyber crime, it is clear that technology exclusively cannot work. Even with the advanced technology and application of the various information security methods we have reviewed preceding(prenominal), human support is still needed. There are various ways that have been employed in supporting technological method to raise up cyber crimes. The following are some of these methods hacker HuntersHacker hunters are special branches that have been set up in legal philosophy department aimed at draging charge cyber criminals. Hacker hunters are pr owling cyberspace with an aim of tracking down and arresting professional cyber criminals who are motivated by big profits made online. Hacker hunters are employing gumshoe techniques to track down cyber crime suspect (Grow and Bush, 2005). They are employing various methods including infiltration of taxicab convocations, observe the hackers through underground networks, and when possible, intercepting the hackers before they can cause any damage. Most important, hacker hunters are relying on intelligence in order to track cyber criminals.They are using watchers inner hackers group to get vital information regarding their operation. For example in 2004, Hacker Hunters in Washington unleashed Operation Firewall in which they targeted members of the ShandowCrew tracking them through their website shandowcrew.com with the help of an informant from the group. Hackers Hunters must therefore seek inside information from individuals in these groups in order to fight deter them. They are applying the identical principles that were used in the 1960s to fight organized crime since both are similar in many aspects.legal philosophy OperationsPolice operations work in the same manner as hacker hunters. In most cases, natural law force operations are carried out by a special group indoors the police force and reinforce the work of hacker hunters. For example in the above case, the Special Agents in the operation firewall got aid from the local police forces. Therefore police operations are important in pursuing cyber criminals to ensure security of information (Leyden, 2004).Unlike hacker hunters, police operations are carried out as rubbish of routine crimes. This means that although there may be a special group carrying out police operations, it may not be entirely specialized in scrap cybercrime. In most countries, there are special internet police departments which are used in fighting internet crimes. These police departments are entrusted with carrying o ut important functions like fighting cybercrime, censorship, propaganda, online scams, use of goods and run of online opinions, and others.However one of their most important duties is to work closely with hacker hunters in intervening and apprehending cyber criminals. Internet police departments also collaborate with other police departments in other countries in enforcing internet security laws and apprehending cyber criminals. In the international front, Interpol has been important in enforcing international crimes.iii. Network protection serve well CompaniesFor many companies, proving information security is an big-ticket(prenominal) endeavor. Companies are not only required to install hardware and software devices, simply they must also collaborate with power to ensure information security. However, the growth of somatic resources in provision of secure note environment has made many information security methods inefficient and expensive (Lighthouse earnest Group, 200 9). For this reason, most companies are finding it tolerate to outsource comprehensive and streamlined network security services from Network security receiptss Company. Network Security Service Companies have also become important in enforcing information security.These are companies which are specialized in providing services to enforce information security. These companies stretch Managed Security service (MSS) which are security capabilities mostly outsourced by other companies. These services vary from supplementing of an living security system to offering a complete new MSS where the Network Security Service Company is entrusted with information security. However, MSS is fair(a) one of the different types of managed services others including routing, hosting, LAN, VPN, and others. Network Security Service Companies therefore offer specialized high quality network security services ensuring for many enterprises. final stageThe increased incidence of breach of seclusion o f information has had negative impact on adoption of ICT services. The emergence of e-commerce, e-banking, e-governance and other online services which required input of sensitive personal details have been affected by increased hacking of information.There are different methods that have been developed to increase information security mainly through the use of technology and network support on information security. Technological methods include authentication through password, token, biometrics software including antivirus, content filtering, or encryption and hardware through use of firewall techniques. Network security support includes hacker hunters, police operations, and security services offered by network security service companies.ReferenceBiham, E. & Shamir, A. (1991). Differential cryptanalysis of DES-like Cryptosystems. daybook of Cryptology, Vol. 4(1) 3-72Dhillon, G. (2007). Principles of information systems security text and cases. NY put-on Wiley & SonsDown, M. P & Sands, R. (2004). Biometrics An Overview of the engine room, Challenges and Control Considerations. federal official Computer Week, 21(13)Erin, B. (2005). Information security Token. Boston, engine room PressGrow, B. & Bush, J. (2005). Hacker Hunters An elite force takes on the dark side of computing. Retrieved twenty-eighth April 2009 from http//www.businessweek.com/magazine/content/05_22/b3935001_mz001.htmInformation Resources, (2009). Security tips Password protection. Retrieved twenty-eighth April 2009 from http//www.utdallas.edu/ir/security/STpassword.htmLeyden, J. (2004). Enforcement is key in fighting cybercrime. Retrieved 28th April 2009 from http//www.crime-research.org/analytics/473/Lighthouse Security Group, (2009). Enterprise security solutions. Retrieved 28th April 2009 http//www.lighthousecs.com/Practices/Enterprise-Security-Solutions/McNab, C. (2004). Network Security Assessment. Sebastopol, CA OReillyWhitman, M. & Mattord, J. (2007). Management of information secur ity. Boston, Technology Press

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.