scholarly journals The Threat from within — An Analysis of Attacks on an Internal Network

Author(s):  
John Haggerty ◽  
Qi Shi ◽  
Madjid Merabti
Keyword(s):  
2014 ◽  
Vol 707 ◽  
pp. 458-461 ◽  
Author(s):  
Dong Ming Zhao ◽  
Kai Feng Zhu

Internet technology as the cutting-edge of the current information technology, it has penetrated into every aspect of human life, more and more government agencies, enterprises are using Internet to improve their office efficiency and to establish new business operation model, in order to improve its reaction ability in fierce competition. Internet has brought convenience for people to work, while the security problem of network also will follow. The internal network not only needs to ensure the security of their data, but also needs to exchange data with the external network, then by adopting network security isolation system which takes gatekeeper technology as its core technology, so that we can ensure that internal network and external network will have physical isolation at any time, meanwhile, according to business needs, it also has multiple forms of information and data’s exchanges.


2018 ◽  
Vol 7 (2) ◽  
pp. 30-33
Author(s):  
Yusera Farooq Khan

Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


2003 ◽  
Vol 3 (1-2) ◽  
pp. 287-294 ◽  
Author(s):  
A. Chapman

This paper explores the opportunities and recent applications of web-based technology, which have benefited water industry operations. Web-based technology can allow broad controlled access to all business data across the internal network (Intranet) of a water authority, by compact disc to mobile or remote stations and the broader internet. These web-based systems have significant advantages over traditional single-purpose databases and paper-based systems.


1999 ◽  
Vol 27 (3) ◽  
pp. 5-6 ◽  
Author(s):  
R. Cáceres ◽  
N. G. Duffield ◽  
J. Horowitz ◽  
F. Lo Presti ◽  
D. Towsley

2016 ◽  
Vol 848 ◽  
pp. 233-236
Author(s):  
Hong Fang Li ◽  
Yi Xia ◽  
Hong Ling Zhao

SiC porous ceramics were prepared by oxidation-bonding technique using SiC powder as main material and carbon black as pore former. The phase composition, surface morphologies, bulk densities, porosities, mass and linear changes of the samples were also investigated. The physical-chemical properties have been analyzed. The results indicate that the oxidation reaction of SiC ceramics was accelerated with the increase of temperatures. It displays undamaged surface after 1400°C treatment, as well as fused surface after 1450°C treatment. The latter is attributed to violent oxidation reaction of SiC. As C contents increase, the porosities of the samples increase and the infiltration of O2 into interior of SiC ceramics was facilitated. The internal network microstructure is controlled by O2 infiltration and SiO2 coating.


2021 ◽  
Vol 2066 (1) ◽  
pp. 012014
Author(s):  
Xiaobin Hong

Abstract With the development of the times, computer technology is booming, so the network is becoming more and more complex, software design is becoming more and more complex, because of the protection against a variety of internal or external risks. The internal risk is that the traffic carried by the system is too large to cause the system to crash or the system to crash caused by the code operation error, and the external threat is that hackers use computer technology to break into the system according to security vulnerabilities, so the purpose of this paper is based on big data technology, the software complexity of complex networks is measured and studied. With the consent of the school, we used the school’s internal network data, and after consulting the literature on the complex construction and analysis of complex networks and software, modeled and analyzed it using the improved particle group algorithm. The experimental results show that there is a certain correlation between complex network and software complexity. Because complex networks determine that software requires complex construction to withstand potential risks to keep the software running properly.


2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.


Author(s):  
Nahla kamaleldeen Mohammed

This study is descriptive, aims to clarify the factors affecting the application of e-government in the Ministry of Education, Khartoum State, Sudan as infrastructure readiness and suitability, and identify the most important obstacles to their application and propose some solutions to those constraints. The study concluded that there is progress in the field of electronic applications that serve the application of e-government in the ministry through the application of many programs. The study concluded that the IT staff in the ministry does not have enough experience to manage the e-government systems, and activating the internal network is one of the most important components of the application of e-government in the ministry. The study concluded that a large number of employees and administrators have no desire to implement e-government systems. The study recommended the need to unify a basic database covering all aspects of education, and the need to establish an electronic training model for workers in the application of e-government in the ministry and the development of a model to re-engineering procedures in the ministry in line with the e-government Runes.


Sign in / Sign up

Export Citation Format

Share Document