Title of the Article : Issues in High-Speed Internet Security
Author: Peder Jungck and Simon S.Y. Shim
Publisher: IEEE Computer Society
URL: Jungck, P. & Sim, S. S.Y. (2004). Issues in High-Speed Internet Security. Computer. 36-42.
Abstract of the article:
Over the past decade, the threat of computer worms and viruses has grown from a nuisance to perhaps the greatest obstacle to the Internet's growth and reliability. Trends in worm and virus delivery mechanisms and infection speed have also changed. Today, too often the first sign of a virus is that a part of the network goes down. Flash worms such as SQL Slammer have paved the way for future worms to carry payloads that directly target their victims and wreak havoc on government, business, and societal structures. To address both the threats facing networks today and future scalability demands, we need new security methodologies, deployment strategies, systems, and architectures. New breeds of systems based on innovative processing components will help achieve flexible line rate high-speed security over time.
Three things I learned from my Reading Assignment:
- How the information in the internet is being transmitted from one point to another, and on what phase/stage they are prone to virus/worms attack
- That there are different ways being undertaken to secure the internet from hackers, worms, and viruses, and it comprises careful studies
- That the SQL Slammer is a worm that infected many computers and networks, and it served as a case to study on how to improve internet/network security
Application / Implication of the new things I learned to my work / to me as a person:
I should not take for granted the importance of internet security, therefore I will be more careful when searching the internet and as much as possible install softwares that will give security to my computer. I will also read more about internet security. Being familiar with the different viruses, worms, malicious attacks, and how to prevent them from entering the computer, network or system would be a great help to prevent further attacks on my computer and our network
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.