Web O Norton Anti Virus example essay topic
These flood attacks are relatively easy to carry out with software such as Stacheldaht or Tribal Flood, which are publicly made available on the Internet ("E-Commerce Sites", 2000, p. 106). Once a hacker has one of these programs in his possession, he simply installs the software on several computers connected to the Internet and triggers the flooding from a central computer. Since the flooding comes from a variety of different sources, it is nearly impossible to identify the origin of the attack ("E-Commerce Sites", 2000, p. 106). THE DAMAGE A joint survey, conducted in 1999 by the computer Security Institute and the FBI, of major US companies, revealed that tampering with company's online operations is becoming a mundane occurrence (Courtney, 2000, p. 84).
The survey polled 640 corporations, banks, and government organizations on the conditions of their computer systems (Courtney, 2000, p. 84). o Of the responding companies, 90% had detected security breaches (Courtney, 2000, p. 84). o 70% of the companies reported serious security breaches (Blotzer, 2000, p 99). These included theft of proprietary information, financial fraud, system penetration by outsiders, data or network sabotage, and denial of service attacks (Courtney, 2000, p. 84). o Quantifiable losses totaled $265 million, 115% higher than in 1999 (Courtney, 2000, p. 84). o The most serious breach resulted in a loss of $66 million, 55% higher than the most serious loss of 1999 (Courtney, 2000, p. 84). o 59% of the companies cited their Internet connection as a frequent point of attack (Courtney, 2000, p. 84). o The total cost to these companies was $266 million (Blotzer, 2000, p 99). This survey illustrates the seriousness of attacks and the importance of proper security to defend against those attacks. THE SOLUTION For every company doing business on the Internet, security should be a top priority. Gibson Research Corporation has a website where computers can be checked for vulnerability against hackers. The site is web (Blotzer, 2000, p 99).
There are also certain programs designed to safeguard servers from attack or malicious activity. Without these programs, companies become vulnerable to attack and millions of dollars in losses. Anti-Virus Software At the bare minimum every company should have anti-virus software. Anti-virus software protects against viruses, worms, and trojan horses. These are "computer programs designed to enter a computer without knowledge or permission of the user" (Blotzer, 2000, p 99). They perform "undesired, useless, or malicious functions", which can take up memory thus slowing down the computer or destroying its files (Blotzer, 2000, p 99).
Popular anti-virus software include: o Inoculate IT Personal Edition, which is free for download from web (Blotzer, 2000, p 99). o McAfee Virus Scan, which can be purchased at web (Blotzer, 2000, p 99). o Norton Anti-Virus, which can be purchased from web (Blotzer, 2000, p 99). Firewalls firewall is a "system designed to restrict access to a computer or a local area network (LAN) (Blotzer, 2000, p 99). "The firewall monitors network traffic, blocking any suspicious attempts to access a system" (Blotzer, 2000, p 99). Some firewalls to be considered are: o Black ICE Defender by Network ICE. This firewall program can be purchased at web (Blotzer, 2000, p 99). o Zone Alarm 2.0 from Zone Labs.
This program can be freely downloaded at web (Blotzer, 2000, p 99). o Real Secure Server Sensor, produced by Internet Security Systems (ISS) is a program, which acts as a firewall and server monitor. It allows businesses to "more proactively protect their mission critical servers by not only detecting attacks, but also preventing system misuse and malicious activity ("Internet Security Systems", 2000). To best secure e-tailing sites and transactions, a combination of anti-virus software and one or two different firewalls would work best to ensure e-mail encryption and web-based privacy concerns, since most programs do not offer both these features (Rudich, 1999, p. 6).
Bibliography
Blotzer, M.J. (2000, May).
Computer security. Occupational Hazards, 62 (5), 99-101. (Electronic copy: ABI Inform, 4 pages.) Courtney, A. (2000, July).
Countering net crime. The Banker, 150 (893), p. 84. (Electronic copy: Business Index, 5 pages.) E-commerce sites. (2000, Mar.
The Banker, 150 (889), p. 106 (Electronic copy: Business Index, 1 page.) Internet security systems expands protection of e business infrastructure, ships real secure server sensor; first to deliver groundbreaking hybrid intrusion detection solution. (2000, Oct.
11). PR Newswire. (Electronic copy: Lexis-Nexis Academic Universe, 3 pages.) Rudich, J. (1999, Nov.