Information security in computer networks with dynamic topology

Author(s):  
Alexander Minin ◽  
Maxim Kalinin
2011 ◽  
pp. 1393-1399
Author(s):  
Huayin Si ◽  
Chang-Tsun Li

Traditional government structures are sometimes regarded as overly bulky. However, with the rapid expansion of interconnected computer networks and the progressive development of information technology (IT), it is now possible to exchange massive amounts of data at light speed over great distances. These infrastructures and technologies provide the opportunity for governments to transform themselves from huge monsters to compact and efficient organizations. Realizing the potential benefits of IT, as of summer 2004, 198 governments had started their e-government plans to construct digital government based on the Internet (West, 2004). One of the essential features of e-government is the transmission of confidential information via computer networks. Depending on the sensitivity of the information, the security of some information should be treated at the same level as national security. Although each e-government has its own networks, no government can say no to the Internet, because it would be a waste of resource. However, the Internet is an open environment; therefore, protecting data flowing on the Internet from attacks is a pressing e-government issue. All governments with such strategies have sought help from cryptographers and devoted huge amounts of both money and time to the development of specially designed information systems and advanced cryptosystems to strengthen information security. Unfortunately, cryptography is not adequate in some applications. As computing power keeps increasing and the techniques of cryptanalysis keep advancing, contemporary cryptosystems cannot and will not work forever. At the 24th Annual International Cryptology Conference (CRYPTO’04), MD5 and a series of related cryptosystems, which are currently in widespread use, were proved unreliable (Wang, Feng, Lai, & Yu, 2004). From the last decade, steganology—the technique for digitally hiding and detecting information – is attracting more attention. It is already regarded as a powerful complement to cryptology and a promising technique for ensuring e-national security. Unlike cryptology, which renders the encrypted information completely meaningless, steganology keeps the host media perceptually unchanged after hiding the secret information. This article will provide an in-depth explanation of the two components of steganology, namely steganography and steganalysis, and discuss their potential applications in the realm of e-national security.


Author(s):  
Miguel Jose Hernandez y Lopez ◽  
Carlos Francisco Lerma Resendez

This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and implementation in educational environments, providing the reader with the most important points regarding the main characteristics of Honeypots and Honeynets. Honeypots are defined as “closely monitored network decoys” that can be set by network administrators to deal with a wide variety of attacks and interact with users in different levels (Provos, 2004). The implementation of Honeypots provides an answer to a common question posted by the field of information security and forensics: How to dissect the elements that make up an attack against a computer system. The chapter will summarizes the different features and capabilities of Honeypots once they are set up in a production environment to clarify the elements that are needed to be configured in order for a Honeypot to accomplish its main tasks and in order for it to be considered an effective tool. The end of the chapter will shift towards the analysis of virtualization as an important tool that maximizes the practical use of Honeypots in controlled environments that are focused towards the study of attacks, responses and analysis methods.


2014 ◽  
Vol 484-485 ◽  
pp. 493-496 ◽  
Author(s):  
Xin Ju Mo

with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.


Author(s):  
V A Gasimov ◽  
Y A Amashov ◽  
F P Aliyeva ◽  
E A Mustafayeva ◽  
D I Mutin ◽  
...  

Author(s):  
H. Si

Traditional government structures are sometimes regarded as overly bulky. However, with the rapid expansion of interconnected computer networks and the progressive development of information technology (IT), it is now possible to exchange massive amounts of data at light speed over great distances. These infrastructures and technologies provide the opportunity for governments to transform themselves from huge monsters to compact and efficient organizations. Realizing the potential benefits of IT, as of summer 2004, 198 governments had started their e-government plans to construct digital government based on the Internet (West, 2004). One of the essential features of e-government is the transmission of confidential information via computer networks. Depending on the sensitivity of the information, the security of some information should be treated at the same level as national security. Although each e-government has its own networks, no government can say no to the Internet, because it would be a waste of resource. However, the Internet is an open environment; therefore, protecting data flowing on the Internet from attacks is a pressing e-government issue. All governments with such strategies have sought help from cryptographers and devoted huge amounts of both money and time to the development of specially designed information systems and advanced cryptosystems to strengthen information security. Unfortunately, cryptography is not adequate in some applications. As computing power keeps increasing and the techniques of cryptanalysis keep advancing, contemporary cryptosystems cannot and will not work forever. At the 24th Annual International Cryptology Conference (CRYPTO’04), MD5 and a series of related cryptosystems, which are currently in widespread use, were proved unreliable (Wang, Feng, Lai, & Yu, 2004). From the last decade, steganology—the technique for digitally hiding and detecting information – is attracting more attention. It is already regarded as a powerful complement to cryptology and a promising technique for ensuring e-national security. Unlike cryptology, which renders the encrypted information completely meaningless, steganology keeps the host media perceptually unchanged after hiding the secret information. This article will provide an in-depth explanation of the two components of steganology, namely steganography and steganalysis, and discuss their potential applications in the realm of e-national security.


2014 ◽  
Vol 1079-1080 ◽  
pp. 598-600
Author(s):  
Ying Zhao

With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.


10.28945/3186 ◽  
2008 ◽  
Author(s):  
Miguel Hernandez y Lopez ◽  
Carlos Francisco Lerma Reséndez

This paper deals with the basic aspects of Honeypots, their use in modem computer networks and their implementation in educational environments. Initially, the implementation of Honeypots solves a common problem of Information Security and Forensics: The dissection of the elements that make up an attack against a computer system. Next, the paper explains the different types and functions of Honeypots once they are implemented in a network in order to make a distinction in terms of what is needed for the Honeypot to do. Finally, the use of Honeypots in educational environments, its benefits and the use of virtualization technologies is discussed.


2017 ◽  
Vol 2 (4) ◽  
Author(s):  
Chu Ba Quyet ◽  
Hoang Cao Cuong

E-Commerce is the purchase and sale of goods, services and exchange of information based on communications networks and the Internet. Information, information systems, computers, computer networks, and other electronic means play an especially important role. These objects are valuable assets and targeted attacks by cybercriminals. E-commerce risk management is to protect the development of e-commerce. It includes setting information security objectives, assessing vulnerabilities, threats and attacks, and selecting countermeasures. The paper presents the theory of e-commerce risk management, analysing the Vietnam Airlines e-commerce risk management case, using the DREAD model. The paper provides the discussions and short recommendations to other enterprises in e-commerce risk management nowadays.


Sign in / Sign up

Export Citation Format

Share Document