Internet Mitigation

Submitted by: Submitted by

Views: 106

Words: 881

Pages: 4

Category: Science and Technology

Date Submitted: 12/01/2013 04:22 PM

Report This Essay

Introduction

The internet; a global network of interconnected TCP/IP networks (Gregory 2010). First used in 1962 by J.C.R. Licklider of MIT. Licklider recorded description of the social interactions that could be enabled through networking as a series of memos; discussing his "Galactic Network" concept. His vision was to globally interconnect a set of computers in which everyone could quickly access data and programs from any site. Licklider convinced others of the importance of this networking concept (Howe 2013). The Internet was based on the idea that there would be multiple independent networks of arbitrary design, beginning with the ARPANET as the pioneering packet switching network, but soon included packet satellite networks, ground-based packet radio networks and other networks. The internet has come a long way since 1962, today we have millions of people accessing the web for various reasons, which can cause a significant threat to users (Howe 2013).

Web Application Vulnerabilities and Attacks

Often spread by attachments in email messages, a computer virus is a program designed to perform malicious acts and cause disruption to your operating system or applications. A Trojan virus resembles a file or software program except that there is malicious code contained inside that appears to be a harmless (Meier, Mackman, Dunner, Vaireddy, Escamilla, & Murukan, 2006). A worm is much like the Trojan virus except it self-replicates from one server to another. Worms spread from computer to computer without any human action. Although these three threats are actually attacks, together they pose a significant threat to Web applications. In order to eliminate the spread of such attacks organizations should stay current on the latest operating system service packs; harden weak, default configuration settings and block all unnecessary ports at the fireware host (Meier, Mackman, Dunner, Vaireddy, Escamilla, & Murukan, 2006). In today’s tech world attackers have...