StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security: A Vital Element in Todays Booming Commerce - Coursework Example

Cite this document
Summary
The author of the present paper "Network Security: A Vital Element in Todays Booming Commerce" brings out that as humanity progresses to the 21st century, the internet has become the pathway for modern technology. However, internet connection can never be achieved without proper networking…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Network Security: A Vital Element in Todays Booming Commerce
Read Text Preview

Extract of sample "Network Security: A Vital Element in Todays Booming Commerce"

Network Security: a vital element in today’s booming commerce As humanity progresses to 21st century, internet has become the pathway for modern technology. However, internet connection can never be achieved without proper networking. Virtual Private Network also known as VPN, are one of the most popular and secured networks that are utilized by organizations. A Virtual Private Network is an innovative concept since it allows clients to securely communicate over an insecure medium. A VPN enables enterprises to maintain connection between private networks in a secured manner (Ransome 284). In addition, the use of a VPN is extremely crucial since effective internet communication is impossible to achieve without proper networks (Ransome 285). Therefore, this paper will discuss some important aspects regarding maintaining a secured network connection via virtual private networks. In essence, virtual private networks can be classified into two categories that are known as remote access and site-to-site. A remote access enables the user to access internet from a distant location (Hancock 30). A site-to-site VPN connection connects two sides of a private network. A good VPN must provide authentication, integrity, confidentiality, and anti-reply (Maiward 23). Authentication is vital security concern, and takes place at two levels known as machine-level and user-level (Hancock 243). Machine-level authentication is used for VPN connections during the establishment of IP-sec connection. User-level authentication takes place before data can be transferred through tunnel (Mairward 28). VPN Security is critical in many aspects because it has dramatically changed the way people conduct business. If an organization has users that are utilizing remote access, the risk of running into hackers poses a serious threat for a client. In order to remove this threat, using an application such as MacAfee helps clients avoid malicious infiltration (Mairward 28). The traffic between Web browser and the VPN device is encrypted with SSL. Two types of main SSL VPNS are portal and tunnel. A SSL portal VPN secures multiple network services while a SSL tunnel VPN allows clients to access one or more VPN devices via the Web browser (“SSL VPN Security”). How do VPNs work? A standard VPN might have a main LAN at the head headquarters of an organization while the others LANs can be located at remote offices (“SSL VPN Security”). A VPN uses a public network, which is internet in most cases, and is necessary in order to connect to distant sites instead of using “leased lines”(“Virtual Private Networking”). The VPN router also plays a fundamental role of adding an authentication header when it receives a packet from a client. That data in turns gets encrypted and then is sent to a VPN router (Hancock 11). Next, the VPN router decrypts the data, and transfers it to the proper destination (Hancock 13). VPN security is a major element in achieving a proper, secured, and efficient connection. A secured VPN connection is equipped with firewalls, encryption, IP-secs, and AAA servers (“SSL VPN Security”). A secured firewall provides strong protection between networks and the internet. Implementing a firewall to restrict the number of open ports, which restricts what types of packets pass through a firewall. IP-secs play an essential role in VPN security because they authenticate and encrypt packets of a data stream (SSL VPN security). IP-secs establish protocols for mutual a authentication between clients, and also protects data layers in an efficient manner. Identifying the need for cyber security is only a minor step towards achieving the overall goal. Governments are well-aware of the threats can potentially cause chaos in their systems. Thus, government agencies in the recent decades have relied on smart programmers to test their systems through series of hacking attempts in order to find any loophole that exists. These so-called “hackers” are referred as White Hat hackers, because of their supreme ability to breach the system and alert companies and government about inadequate network security(Germaine). These hackers use proxy which in essence allows the hacker to connect to a computer first and then control the computer (Germaine). In that process, the IP of the hacker is hidden, which enables them to mask their identity? This situation can be perfectly displaying in this example, where Thomas Patterson, a chief executive for Deloitte and Touché Security Services, has adapted the practice of hiring hackers to really test the company’s network. Since Deloitte is a major firm that handles high confidential information about the financials of several companies, it is highly critical that all information is secured (Germaine). While this example shows the employment of white hat crackers at a micro-level, consider this. The Israeli government has also contracted certified hackers to test their national defense system, which is clearly no small feat. Numerous incidents of attacks have been reported according to government officials (Germaine). In 2006 alone, around 5000 of cases have been reported and that number alarming increased to around 13,000 in 2007. Clearly this has a rippled effect on the nation, who is constantly under pressure to protect itself from threats such as these (Germaine). The Israeli government along with the Swiss government has actually employed small hacking organizations that work closely with the police (Germaine). In addition, these hackers according to experts can be under the budget that the payroll department implements. So far, they have been impressive and even have caught the attention of the US government itself. The work mainly involves around attacking the network systems via different methods. Patterson beliefs that this is a strong route to take as he states, “We believe we can achieve the same level of success without sacrificing the trust of our own clients…It’s a fine line. We hire the good guys.”(Germaine) James Harrison, co-chief of Invisus, a company that specializes in internet security beliefs that safer protection does not stem from hackers but from products and programs that possess certifications. This is a huge problem since many online users in America are vulnerable to be hacked four to five times in daily basis. The social impact of information using large databases has constantly been evolving since the invention of the internet. A proper configuration of an IT system enables a database to function. Databases are defined as “an electronic filing system that collects and organizes data into information” (Stair 352). The advent of databases has been a gift for firms because it enables them to become more customer centric (Stair 353). A database allows the company to somewhat forecast the customers wants and needs. A company can use a database to present to research and development, which can collaborate with the marketing and the finance department to design a product that is under a particular budget. Furthermore, databases enable companies to create a “target segment.” A target segment can further facilitate the company’s quest to build and solidify its brand (Macinnis). The data that a company obtains can even lead to online promotions by advertising in a social network website. When a company utilizes any sort of social media, it gives customers full control of its particular brand name and products (Macinnis). The customer feedback at this point becomes extremely essential even if it is criticism as it gives the company a benchmark to improve upon (Macinnis). Nonetheless, this boosts the firm’s brand along with sales as customers continue to compare and contrast in a highly competitive market(Macinnis). The advent of technology has no doubt revolutionized commerce internationally, which has increased the demand of smart cards. Smart cards are necessary to facilitate all people that make up society(Noonan). A smart card is any sort of a card that resembles a credit card and varies in all different sizes and shapes. Unlike conventional credit cards that use a magnetic device, smart cards utilize a chip with memory that retains and processes information along with an electronic signature that is verified at a point-of-sale (Noonan). Interestingly enough, smart cards have tremendously helped businesses to make transactions faster, smoother, and more efficient(“information system”). In addition, smart cards have some sort of technical support backing, which does them an advantage over cash. For instance, a person using a smart card is fully able to track down their finances using the bank’s online services without keeping a log on their everyday transactions(Noonan). Moreover, smart cards have been extremely beneficial in Australia, where the new technology is been used to assist the disabled in numerous ways. One way that smart cards help the disable is by replacing all the paperwork and adding all the essential medical data into a smart card. In addition, it will enable enabled the disable to be efficient in everyday transactions (Noonan). Contactless smart cards could help the disable navigate and distinguish landmarks and facilitate them in every day basis(Noonan). However, officials worry about the privacy of these smartcards. This technology is able to store confidential information and if fallen to wrong hands, can lead to major consequences. Nonetheless, the adaption of smart cards continues to be popular in this society. Cleary, the social impact of internet technology have reached new dimensions as science advances(“information system”).. The internet is the gateway that leads to technological advancement and drives the economy because it does not create any limits towards information. However, there are critics of the internet technology(“information system”).. There is no doubt that that the internet does enhance or diminish involvement but one cannot be blind towards the consequences of the internet technology. In a very interesting article, one of the key researchers known as Putnam argues that the internet technology can be blamed for the diminishing civic involvement. Undoubtedly, society votes less and has overall been more inclined to surround themselves with technology rather than be more passive socially (Liffick). Hence, this becomes a social problem as disengagement from society is detrimental to an individual’s life. It allows society to be corrupt with less-quality of education provided when citizens are within their spheres instead of being engaged at a social level (Liffick). Social contact allows individuals to be healthy both physically and psychologically. Even if people used internet for leisure and information, Putnam insists that it causes the same harmful effects that are seen in television. Internet no doubt does contain violence, educational content, nudity, gender and racial stereotypes and is not regulated by any organization (Liffick). This deregulation of the content displayed in the internet can be its worst and its best point. One must not forget the fact that if users use technology too much for fulfilling their everyday purposes, these activities become pointless and can result in solitude. Some research even indicates that home computers will eventually replace television in the future, which will be the ultimate downfall as families will spend less time with each other. Undoubtedly, internet is a very useful innovation that has both advantages and disadvantages. The demand of technology and the allocation of is an important concept that poses serious challenges for both commerce and state sectors in information technology. State sectors undoubtedly layout guidelines for firms in a very detailed manner on what is permissible or not. E-government is an idea where users can utilize the technology to share information, reduce paper-work, and create strong relationships between citizens, firms and the government (Gitman 42). Firms can use government applications to submit taxes, release important financial statements, renew licenses, etc. However, that does not diminish the fact that both sectors are dependent of each other (Elaine). Most experts argue that the relationship is linear and that government agencies without the help of firm’s technology will falter. Research indicates that in the modern era, the local state governments are inadequate in collaboration domestically(Elaine). The State of California has more than 2500 IT projects underway that cost around for $1 trillion (Elaine). For that reason, an organization known as the DOIT was created. DOIT took many responsibilities such as protecting the state’s IT system, and evaluate its needs through various means (Barnett). Moreover, state sectors need strong leadership, and this is where the commerce assistance comes in. Most state sectors use companies such as IBM, Microsoft, and Google products and services on daily basis (Elaine) . A perfect example of this situation can be seen in this scenario where Berkeley Labs, part of the Department of Energy, launched a program that required it to use Google Applications. This project consisted of 4000 employees using Google docs and other Gmail services to coordinate. Consequently, Larimer County located in Colorado has also started using Google applications to fulfill government services(. Clearly, this has been a critical element was has raised the demand for information systems. Even the federal government has taken the initiative to adopt to new innovations as the Obama administration has adopted to cloud computing (Samson). Jeffery Zients discusses this issue as he states, “Government agencies too often rely on proprietary, custom IT solutions. We need to fundamentally shift this mindset from building custom systems to adopting lighter technologies and shared solutions.” Furthermore, the White house will launch an online program for commercial businesses to display their technological skills called Apps.gov (Samson). With the competition looming around the corner, companies have no doubt have taken the challenge to win in the business of the government sectors. The emergence of the information systems have no doubt given a boom to all aspects of technology and have played a dramatic role socially, politically, and economically. Information systems have played a vital role in enhancing the function ability of international economies. First, it has enabled information to be effectively allocated in markets where both consumers and competitors can distinguish the strengths and weaknesses of the market(Gitman 45). Nonetheless, this is important for an economy to grow not only domestically but internationally. Hence, all aspects of the economy become information-centric, which leads to re-designing of commerce and state functionality (Gitman 47). In addition, this information is essential because it helps create barrier towards asymmetric information (Gitman 48). Asymmetric information leads to unemployment, misuse of credit, and economic downfall in a market where legislature mistakes are created. In addition, information systems is the core foundation of input for technological advancement, and is necessary for a flourishing economy (“information systems”). Information systems allow firms to invest heavily in research and development, which is the primary cause of modernization. From an economical aspect, companies that invest heavily information systems are able to enjoy long-term profits. This example could be perfectly seen by two of the most popular business sites, which are Amazon and EBay (Standifird 167). Amazon is designed on a system based on Linux that utilizes graphics user interface along with spreadsheets that quickly add the needed data for the assurance of customer service. Interestingly enough, Amazon.com is trying to market itself within the company by innovating a platform that enables other companies to market themselves (Standifird 167). Furthermore, Amazon.com has greatly adapted to a “one-click purchasing system” The company will continue to innovate and the release a “beta” system for the demand that it faces every day. Consequently, EBay runs on a similar model that enables customers to fulfill transactions without binding to a contract (Standifird 167). With all these factors accumulated, the international economy has gotten a huge boost with a $1.2 trillion net worth. Hence, the improvisation of information systems technology has without a doubt dramatically affected the prosperity of economic growth internationally. The era of modern century is truly dominated by a social perspective as media and communication services have boomed from the emergence of information systems. From the social perspective, society has adapted very quickly to what information systems have to offer. For example, 31% of the internet users have accessed dating websites, and in the year 2008 alone, around 120,000 marriages were conducted through online services (Garg). Another great example of how information systems have given rise to networking can be seen through Facebook, Myspace, and Twitter (Garg). These social networks have enabled more than millions of users to connect, share, advertise, and recruit themselves through via a large network. A study conducted by eMarketer observed that 41% of the online community in US visit a social network on daily basis (Garg). From a social perspective, information systems influence people to be motivated by public behaviour. For instance, if a person sees their colleague or their friend using a social network, they are also more incline to be engaged in this activity since it becomes “norm.” However, experts argue about the privacy that becomes a critical factor as information technology advances to new level. With so many online users putting up personal information, the effects are no doubt can be harmful. Not only has information systems dramatically impacted the spheres socially and economically, but it has also played a vital role shaping up political roles (Kasse). A recent study indicates that social networks do play a critical role by influencing political behaviour. According to this study, informal networks play a vital role towards political participation. Talking politics through blogs, websites, and radio stations enable people to converse and share information with little cost (Kasse). The author of this study insists that these conversations without a doubt enhance public knowledge about candidates, political biasness, and electoral races (Kasse). Furthermore, daily political conversation amongst civilians is one of the core fundamental principle of civic life. Hence, the availability of information systems allows citizens to access informal network which not only enhances participation but allows individuals to comprehend the content that is displayed in their news channels. Another great example of how information systems can be utilized is perfectly portrayed in this example (Kasse). A new interface known as Geographic Interface System is assisting the government in determining the needs of the local community (Barnett). For instance, the U.S Census Bureau uses this software to determine the median income, quality of education, and local employment to allocate funds to a given community. In addition, the government uses GIS to conduct market research, epidemiology, and classroom behaviour (Barnett). GIS enables the government to enhance policy by gathering data that utilizes demographic variables, statistics, health and political indicators (Barnett). In essence, GIS influences administrators to allocate funds and influence decision making (Barnett). This is without a doubt one of the best examples of information systems plays a vital role towards politics. If a local economy flourishes under a candidate, it facilitates his quest to win the re-election. No doubt GIS plays a crucial role in shaping policies and politics itself. Clearly, technology has revolutionized the world socially, politically, and economically. The advent of smart cards, databases and internet itself have become the core fundamentals of commerce that power the world. The dependence of this technology is linear as both state and commerce sectors rely on it heavily. Without the investment in research and development, technology cannot advance to new heights. Although the internet is a powerful tool, one cannot ignore some detrimental effects of it. Nonetheless, the internet will be a powerful tool that will continue to pave the way for advancement in science, technology and commerce. Works Cited Barnett, Nathan. “Utilizing Geographic Information Systems (GIS) to Influence State Policy: A new descriptive, diagnostic, and analytical tool for higher education research.” 2005. State of Philadelphia public conference. Print. 20 December, 2010 Germain, Jack. “Hackers for hire.” 2004. Web. 15 December 2010 Hancock, Bill. “Networking explained.” Massachusetts: Butterworth Publications. 2005. Print Howe, Elaine. “Information Technology: The State Needs to Improve the leadership and Management of its technology system.” California State Auditor. 2000-2001. State of California. 2000. Print. "information system." Encyclopædia Britannica. 2010. Encyclopædia Britannica Online. 24 Dec.2010 Liffick, Blaise. “Social Impact Characteristics of Computer Technology” 1995. Web. 17 December 2010.< http://cs.millersville.edu/~liffick/compchar.html> Maiward, Eric. “Fundamentals of network security” USA: Corel Ventura Publisher.2004.Print Garg, Rajiv. “The Role of Peer Influence in Marketing on Online Social Networks.” 2002. Web. 16 December 2010< http://www.iabc.com/student/library/feature/NovDec_RST.htm> Gitman, Tim. “The Future of Business: The essentials” 4th Edition. Ohio: Cengage Publishing.2010. 16 December 2010. Political Science and the Internet Max Kaase International Political Science Review / Revue internationale de science politique  Vol. 21, No. 3, CyberPolitics in International Relations. CyberPolitique et relations internationales (Jul., 2000), pp. 265-282 Published by: Sage Publications, Ltd. Stable URL: http://www.jstor.org/stable/1601236 Ransom, James. “VoIP Security” New York: Elsevier Digital Press. 2005. Print Stair, Ralph. “Principles of Information Systems.” 9th Edition. Boston: Cengage Publishing, 2010. Web. 13 December 2010. “The Impact of Smart Cards in Australia.” Noonan, Tim. 2000. Web. 13 December, 2010. < http://www.timnoonan.com.au/screp10.txt> Samson, Ted. “Feds take cloud-first approach to IT.” 2008. Web. 15 December 2010 “SSL VPN security”f5IT.com. 2009. Web. May 29, 2010 < http://www.f5.com/about/corporate-information/> “ Virtual Private Networking”Netgear.com. 2010. Web. May 21, 2010. The Impact of eBays Buy-It-Now Function on Bidder Behavior Stephen S. Standifird, Matthew R. Roelofs and Yvonne Durham International Journal of Electronic Commerce Vol. 9, No. 2 (Winter, 2004/2005), pp. 167-176 Published by: M.E. Sharpe, Inc. Article Stable URL: http://www.jstor.org/stable/27751146 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Security: A Vital Element in Todays Booming Commerce Coursework, n.d.)
Network Security: A Vital Element in Todays Booming Commerce Coursework. Retrieved from https://studentshare.org/information-technology/1574697-social-implications-of-ict
(Network Security: A Vital Element in Todays Booming Commerce Coursework)
Network Security: A Vital Element in Todays Booming Commerce Coursework. https://studentshare.org/information-technology/1574697-social-implications-of-ict.
“Network Security: A Vital Element in Todays Booming Commerce Coursework”, n.d. https://studentshare.org/information-technology/1574697-social-implications-of-ict.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security: A Vital Element in Todays Booming Commerce

A short-term e-Marketing Plan for a specified company

The world of online retailing, and more importantly e-marketing may well represent a tough challenge to the "newcomer" within the world of internet marketing.... However the ability of specific, and measureable opportunities available to the online marketing initiatives allow for… This is due to the ability to measure online efforts in most cases on a real time basis, something which cannot be said about traditional media advertising....
16 Pages (4000 words) Essay

The Security of Networking

It is essential that firms make a substantial investment in network security in order to safeguard their exclusive information from hackers, as well as other delinquents.... I will address contemporary approaches towards network security, the upsurge in recent criminal activity.... Establishments began to study the use of the internet and what followed was the delivery of e-commerce.... With e-commerce now severely competing with the practice of the brick and mortar capacity, clients are quite comfortable with the convenience of shopping, finance, and otherwise flourishing fully in a virtual world (Cole et al....
12 Pages (3000 words) Essay

Network Security The Past, Present, and Future

hellip; According to the findings, it can, therefore, be said that the aim of ceasing any undesired intrusion in one's system is encapsulated by one of the most vital areas of computer sciences- network security.... These intruders are the reason why network security has gained such a prominent name in our modern age.... Marketing plans and revenue reports can serve to be very useful information for competitors in the market, therefore, companies are well aware of network security now....
13 Pages (3250 words) Research Paper

How Tourism Services Are Being Impacted by Information Technology and Emerging Online Technologies

The author states that tourism has been at the forefront of adopting new technologies.... The study aims to evaluate how tourism services are being impacted by information technology and emerging online technologies and the reasons for e-business adoption in tourism.... nbsp;… The various online technologies are offering huge opportunities for the tourism sector....
11 Pages (2750 words) Term Paper

Issues of Tesco Performance Outcome

The lack of effective controls vis-à-vis malpractices in accounts and auditing, security of confidential information, corrupt practices in the higher hierarchy of management, etc.... It has a huge network in Europe and America.... The essay "Issues of Tesco's Performance Outcome" analyzes five major issues that have significant impact on the performance outcome of Tesco....
8 Pages (2000 words) Essay

Securing the Website and Reducing Liability to Prevent Negative Press

The paper describes the risk of e-commerce security that is a subject of increasing alarm.... hellip; By the passage of time, the issue of internet and e-commerce security has been raised.... Trust among the participants is very much required if anyone wants to use the internet for the purpose of e-commerce.... A companies' security strategy for e-commerce must be a corporate-wide strategy for all Internet and computer use.... There are many reasons behind this like, absence of global regulation, users' lack of awareness, easy access and security laps have made the internet an attractive approach for crimes....
15 Pages (3750 words) Research Paper

Living with the Internet

This paper, Living with the Internet, stresses that the internet is used to conduct various operations, primarily for online shopping, online gaming, and online friendship purposes.... The Internet is as an important component facilitating the development of business sectors for managing and directing operations....
22 Pages (5500 words) Assignment

Access Control System Technology

Here, access control can be considered to be a security element and a solid background used to implement further security measures (Poniszewska-Maranda & Rutkowska, 201).... It is vital to put mechanisms in place that properly authenticates authorized users only to access data through access control by blocking attackers or unwanted guests pretending to be legitimate users.... Access control industry continues to evolve with introduction of adaptable, secure, and open security solutions....
10 Pages (2500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us