ING Life Bo Sun CIS 505: Communication Technologies Strayer University Darcel Ford, Ph. D. February 11, 2013 Difficulties and Risks Associated with Internet Originally, Internet was designed for absolute security environment. Therefore, the protocols which are consisting of the infrastructure of Internet have no security concerns. This means Internet is easily to be vulnerable. Although major part of security issues are from inside, Internet does take external threats. When users connect the Internet, the web browsers might contain breaches that permit scripts to access the system and may cause damages potentially.
In addition, when information is transmitting through the public network, the transmission might be captured by someone else. This is known as man-in-the middle attack. (Dean, 2009) Another potential common risk associated with Internet is called reconnaissance threats. Attackers could detect the reachable networks, devices and services through the Internet connection, or even draw an entire network map. Furthermore, DoS attack is another risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to make it shut down. Oppenheimer, 2011) Analyze ING’s Solution The security mechanism existing in the current ING’s network is implemented a fire between the external brokers and the internal servers. Basically, this is not enough to protect the network, especially, the information of ING involves private personal information. The information should be protected carefully. Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection.
Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks have great intimidation to public servers. In this condition, reliable operating system and applications are critical to solve the potential attacks. CGI and other types of scripts also could take care of the servers. Finally, firewall mechanism is efficient when facing Dos attacks.
Firewall technologies, physical security, authentication and authorization mechanisms, auditing, and possibly encryption consist of the security mechanisms utilized on remote access (Oppenheimer, 2011). Besides these normal network security mechanisms, a proper routing protocol is also important to Internet connection. The selected protocol should support route authentication. And static and default routing is an issue need to be concerned because of potential compromised routing updates. Finally, clear police and comprehensive training for the employee is significant.
After all, most security issues are leaded by human errors. Critique the Extranet Solution To support extranet connection for brokers is an excellent decision. It is simply for users to get access to the information which they needed. On the other hand, extranet is easily to be managed from the security aspect. Administrators could implement security mechanisms simply. Remote-access VPN is another way could be Implemented to connect the brokers. According to Oppenheimer, “Reomte-access VPNs permit on-demond access to an organization’s internetwork, via secure, encrypted connections. (Oppenheimer, 2011) This function is suitable for the remote uses which don’t need always connection. Users connect the corporate’s network through service provider’s network, this could decrease the budget of connection and the the work of network administritors. Install redundent mechanism could imprive brokers service. When primary database shut down, the backup devices could guarantee the network connection work normally. References Dean, T. (2009). network+ guide to networks. Mason: Cengage Learning. Oppenheimer, P. (2011). Top-down Network Design. Boston: Pearson Learning Solutions.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more