Inexpensive Connection To An Internet Access Provider example essay topic

3,301 words
Business and the Internet Thesis: The Internet is a safe and profitable environment for companies to do business. I. History of the Internet. A. The beginning of the Advanced Research Projects Agency. B. The Advanced Research Projects Agency mission. C. Converting the Advanced Research Projects Agency's network into the Internet. D. The introduction to the World Wide Web. II. Security Issues on the Internet A. Realizing the threat of computer hackers. B. Considerations for security systems.. Securing financial transactions. A. Information flowing on the Internet can be susceptible to security problems. B. Larger corporations have endorsed Secure Sockets Layer as a secure means of transmitting financial transactions. C. Secure Courier is another alternative for securing financial transactions. D. Firewalls can be used to help with security within a businesses network.

IV. Conducting business over the Internet. A. The Internet offers an abundance of possibilities for businesses. B. Considerations for businesses conducting business on the Internet. V. Connecting a business to the Internet. A. Connecting to the Internet using a dial-up account with a provider. B. Connecting to the Internet using SLIP / . C. Connecting to the Internet using a leased-line connection. Business and the Internet What is the Information Superhighway Is this some kind of road with an abundance of signs and billboards telling of important information Actually, when people refer to the Information Superhighway, they are really talking about the Internet. TheInternet is a massive web of computers that are connected together.

This web of computers covers the entire world. Many businesses are intimidated by the Internet fearing that the reis not enough security. These types of businesses will find that by following simple security rules and picking the correct type of connection, the Internet is a safe and profitable environment for companies t do business. President Dwight D. Eisenhower saw the need for the Advanced Research Projects Agency (ARPA) after the Soviet Union's 1957 launch of Sputnik (Baker 15). The organization united some of America's most brilliant people, who developed the UnitedStates' first successful satellite in 18 months. Several years later ARPA began to focus on computer networking and communications technology.

In 1962, Dr. J.C.R. Licklider was chosen to head ARPA's research in improving the military's use of computer technology (Baker 17). Licklider was a visionary who sought to make the government's use of computers more interactive. To quickly expand technology, Licklider saw the need to move ARPA's contracts from the private sector to universities and laid the foundations for what would become the ARPANET (Baker 15). ARPA (now DARPA) is still one of the primary sources of research forthe Department of Defense (Baker 18).

Its mission statement reflects the commitment to technological advancement. The Advanced Research Projects Agency (ARPA) is the central research and development organization for the Department of Defense (DoD). It manages and directs selected basic and applied research and development projects for DoD, and pursues research and technology where risk and payoff are both very high and where success may provide dramatic advances for traditional military roles and missions and dual-use applications (Budget 10). Consequently, the ARPA mission is to develop imaginative, innovative and often high risk research ideas offering a significant technological impact that will go well beyond the normal evolutionary developmental approaches; and, to pursue these ideas from the demonstration of technical feasibility through the development of prototype system.

In 1969, the United States Department of Defense assigned ARPA to experiment with the linkage between Department of Defense and military research contractors. The Department of Defense directed ARPA to develop a system of communication that could resist interruptions caused by enemy attacks. In the early 1970's, ARPA directed Stanford University to begin experimentation in multiple network packet-switching technology (Baker 16). Packet-switching technology was very effective when network connections were unreliable. An experiment in 1977 among four government networks demonstrated the feasibility of the technology. This research resulted in the development of the TCP / IP protocol suite.

By January, 1983, the TCP / IP protocol had become the standard communications protocol. The National Science Foundation established the NSFNET program in 1985. TheFoundation's interest in computer connectivity resulted from the inception of the Supercomputer Center's program. The Supercomputer Center program required the use ofa high speed transmission backbone to connect researchers to the supercomputer centers.

A variety of reasons prevented the ARPANET from serving in this capacity. Therefore, theNational Science Foundation developed its own backbone with the help of the MERIT program (University of Michigan), MCI and IBM. The backbone included a large number smaller regional networks that connected many of the nation's research institutions. By 1990, the NSFNET had become the dominant network, leading to the downfall of the ARPANET. The regional networks using the NSFNET backbone created the foundation for the Internet as we know it today. The primary focus of the NSFNET was not-for- profit research and development.

The NSFNET had an " acceptable use" policy that restricted the use of the Internet to non-commercial activities. In fact, until October of 1990, Internet identifiers were only granted to organizations that had a U.S. government agency as a sponsor. However, during the 1980's theNational Science Foundation advised the regional networks that they would have to become self sustaining. In 1991 this pressure culminated in the creation of the first commercial Internet providers. The largest Internet service provider in the U.S. today, Performance Systems (PSI Net), spun off from the New York Educational Research Network. In March, 1991, PSI Net along with two other independent providers, UUNet Technologies (AlterNet) and General Atomics (CERF net), started the Commercial Internet Exchange (COX) (Bad gett 14).

The CIXallowed access to the Internet without the NSFNet's restrictions for the first time. Commercial use of the Internet was finally possible. The next significant development for the Internet occurred on April 30, 1993, when CERN placed the software for the in the public domain. Tim Berners-Lee developed the software at the European Laboratory for Particle Physics (Browne 10).

The software, developed for use by high-energy physicists, was first used in 1989. In 1993 a group of graduate students from the University of Illinois at Champaign-Urbana developed Mosaic, a software package that used the protocol. Mosaic used a graphical interface, much like Microsoft's Windows, to present the Internet in a unique user-friendly fashion. Mosaic was a major factor in the explosion of business interest on the Internet because it made the Internet accessible to inexperienced users. Many other browsers have evolved sinceMosaic's development. These graphical-type interfaces appear to hold the future of theInternet.

As business grows on the Internet, security is becoming one of the most important considerations businesses must make. Businesses with computers connected to theInternet that contain files full of confidential data certainly would not want the public to have access to these files. At the same time, they might want the public to have access to other parts of their systems. Another concern is hackers breaking into a system. If computers are connected to the Internet, a hacker may be able to find a way into it and do such things as vandalize the system and steal passwords (enabling them to log in as someone else). Businesses that offer services that require payment methods including credit card transactions also should be cautious.

If these transactions are not somehow secured, hackers can access the user's account information. Recently, a hacker named Kevin Mitnick was arrested for stealing 20,000 credit card numbers (Cooper 24). Another example of poor security on the Internet is the United States Government. The Defense Department enlisted a team of hackers to attempt to break into its computer network that is attached to theInternet. The hackers succeeded 88 percent of the time. Of even more concern is the fact that 96 percent of the hackers' attempts were not detected.

Hacking is apparently on the rise. A recent Rand Corporation study revealed that there were three times as many hacking incidents in the first six months of last year than in the entire previous year (Hughes 10). Poor security can discourage potential customers from using the Internet as a source of commerce. Before setting up security systems, businesses should consider the following: Would you be better off offering credit transactions over a more secure medium, like the telephone If you decide to offer online financial transactions, how much security do you want to offer the customer How valuable is the information on the computer system Must the confidential data be accessible through the Internet Who do you want to access the information Who do you not want to access the information The way that information flows through the Internet makes it very susceptible to security problems. The TCP / IP packets flow through many different nodes on the way to their intended destination. Any of these mid-points can be the source of a security breech.

This can cause concerns for both businesses and their customers. A business should take the same precautions for Internet security as it does for any internal control. For example, few businesses would leave customers' credit card slips out in the open. At the same time, abusiness's customers want to make sure that their sensitive information is being handled responsibly.

Mastercard and Visa, as well as many other large corporations, have endorsed Secure Sockets Layer (SSL) for financial transactions (Siyan 7). SSL uses a three-part process. First, information is encrypted, which prevents unauthorized access. Second, the information is authenticated, which makes sure that the information is being sent and received by the correct computers. Finally, SSL provides message integrity, which prevents the information from being altered during interchanges between the two computers. SSL is based on a two-key encryption system.

A customer submits a request to purchase merchandise over the Internet. The company responds with a "public key" thatthe customer's computer uses to encrypt sensitive information. The information is sent tothe company, which then uses a "private key" to decrypt the information. The process is invisible to the customer, so it is very easy to use.

Imagine a locked chest that contains mailbox. Customers are to place checks in the mailbox, but shouldn't be able to remove othercustomer's checks. A business would give customers a "public key" that could open the chests that they could deposit their checks. The company would have the only key that could open the mailbox inside the chest, the "private key".

Netscape Communications Corp., recently developed Secure Courier, which uses SSL to allow financial data to be transmitted in a secure digital "envelope". Information is encrypted from the time it leaves the user's computer until it reaches the financial institution. This ensures that only the financial institution will have access to the inputted financial information. Secure Courier also can verify the authenticity of inputted financial account information.

Before the development of Secure Courier, an unscrupulous business could steal credit information just as easily as a hacker. Customers did not have the confidence that their financial information would fall into the right hands and be used appropriately. Secure Courier is based on a specification that Visa and Mastercard have developed for online commerce. With the newness of the Internet, one of the biggest concerns is making thecustomer feel comfortable using financial information. It is understandable that many potential customers will have reservations about sending sensitive information over an unfamiliar medium. With large corporations such as Visa and Mastercard endorsing Secure Courier, customers now can be more confident that their financial information will be secured.

Financial transaction security is the biggest concern for businesses that offer products or services over the Internet. Firewalls deal with security within anorganization's information network. Firewalls can be thought of as a security guard monitoring all traffic in and out of a network. A firewall allows a business to specify the level of access that will be afforded to network users.

An example of this is "anonymous " FTP. An Internet site can set up an FTP site that allows any outside user to access files atthe site. This FTP site will allow users to access files, but only at the lowest level of security. Anonymous FTP is very useful to companies that wish to place documentation in the public domain.

It also can be used to allow users to download software. The Internet offers a multitude of possibilities for businesses. With its huge and quickly growing audience, the Internet provides a way to offer information, access information and transfer information. While the Internet, in many cases, can be a giant leap for businesses, some important points must be considered: An Internet site must be advertised for people to be able to find it. Users may be concerned with security. Setting up a business on the Internet requires some technical knowledge.

Businesses must determine their own needs as well as the needs of thecustomer. Simply setting up a site on the Internet does not guarantee success. There are many different ways to connect to the Internet. These include dial-up accounts, Serial Line Interface Protocol (SLIP) or Point to Point Protocol ( ), and direct connections through leased lines. Choosing a connection is like buying a car.

You want something affordable that will accommodate all members of the family. Keep in mind, though, that each family member does not need his or her own stereo controls. Overdoing it can get expensive, and can cut into the value that the Internet can add to a business. Other things to consider are security, reliability, performance and customer support.

The last thing you need is connection that is frequently down with no customer service to help you out. Finally, you might want to make sure the provider has a local dial-up number. If not, long distance charges can add up. By answering the above questions, a business can determine which type of connection best suits it. A dial-up account provides an inexpensive (about $10 a month per account) connection to an Internet access provider (Manager 3). Dial-up accounts, also known as UNIX shell accounts, are not direct connections to the Internet, so speed is sacrificed to an extent.

Also, each connection requires a separate account, so if you have many employees that need to be connected simultaneously, this option can get expensive. Many of these accounts contain many features of the Internet such as telnet, Archie, Usenet, e- mail, gopher, and FTP. An inexperienced user may find this type of connection difficult and confusing because the applications typically must be run through UNIX. Another disadvantage of dial-up accounts is that everything must be done on line.

For example, to compose ane-mail message, a user first must log in to the system. This can become very time consuming and inconvenient. While a little more costly (about $30 a month per account), a SLIP / connection will allow a business's computer to communicate using the TCP / IP protocol (Manager 3). With this connection, many tasks can be performed simultaneously. For example, you can send e-mail while downloading a program from an FTP site. SLIP / also supports World Wide Web browsers such as Netscape and Mosaic.

These interfaces allow point-and-click mouse control and provide pictures, sounds and movies in addition to text. Unlike a dial-up account, the user can perform some tasks off-line, such as composing e-mail messages. Most dial-up SLIP / accounts require that the user actually stay on the computer during the connection. To have a full-time connection, regardless of whether anyone is using the computer, a dedicated SLIP / account may be established.

This option is more expensive (about $300 to set up and $80 per month), and it assigns a certain number of IP addresses for a network. Software such as Trumpet Winsock can be used to establish the SLIP / connection. The user must dial the server's phone number and enter a user name and password. A modem at the server's location picks up the signal and connects to a "black box " that routes the information typed from the user's computer to the Internet by using an IP router. Leased-line connections are the best option for businesses that want to provide large amounts of information and allow many employees to access the Internet. This option also provides a much faster connection with either a 56 kilobyte line, a T 1 line operating at speeds up to 1.5 megabits per second (or about 100 times faster than a 14,400 baud modem) or a T 3 line that goes up to 357 megabits per second (Manager 5).

The more speed, the more expensive it gets. A business should decide what it can afford and what is practical for its purposes. As a rule of thumb, high speed connections are worth it if transmitted data exceeds one gigabyte a day. It is also worthwhile if speed is a major concern, for example the quick transmission of important documents. A dedicated T 1 connection costs anywhere from $1,000 to $6,000 to have it set up, and about $1,000 per month thereafter.

This provides many more IP addresses for a network than a SLIP / connection. Set-up and monthly fees for a 56 K connection are about half as much as a T 1 connection. This option also allows for a greater number of IP addresses. For many businesses today, the Internet is the correct medium to conduct business. With limited cost and world wide exposure, a company can t go wrong. The speed thatthe Internet has to offer will make even the most impatient manger smile with satisfaction.

As long as a business chooses the correct connection as well as sets up some common security stops, the Internet experience should prove to be a rewarding and profitable venture. WorksCitedBadgett, Tom. Welcome to- Internet: From Mystery To Mastery. New York, N.Y. : MIS Press, 1993.

Baker, Steven. The Evolving Internet Backbone; History of the Internet Computer Network, Unix review, September 1993, 15-21. Chiswick, William R., and Steven M. Bel lovin, Firewalls and Internet Security: Repelling the Wily Hacker. Reading, Mass. : Addison-Wesley, c 1994.

Cooper, Fredric J. Implementing Internet Security. Indianapolis, Ind. : New Riders Pub., 1995. Cronin, Mary J. Global Advantage On the Internet: From Corporate Connectivity to International Competitiveness. New York: Van Nostrand Reinhold, 1996. Fisher, Sharon.

Riding the Internet Highway. Carmel, Ind. : New Riders Pub., 1993. Hughes, Larry J. Actually Useful Internet Security Techniques. Kah in, Brian, and James Keller.

Public Access to the Internet. Cambridge, Mass. : MIT Press, 1995. Lent, Max, Government Online. New York: Harper Perennial, 1995. Liu, Cricket.

Managing Internet Information Services. Sebastopol, CA: O'Reilly & Associates, 1994. Manger, Jason J. The Essential Internet Information Guide. New York: McGraw-Hill, 1995. Siyan, Ka ranjit. Internet Firewalls and Network Security.