Sign In
Not register? Register Now!
You are here: HomeTerm PaperIT & Computer Science
Pages:
9 pages/≈2475 words
Sources:
6 Sources
Level:
Harvard
Subject:
IT & Computer Science
Type:
Term Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Internet Security The Management Of The Resources And Access (Term Paper Sample)

Instructions:

TERM PAPER ON FIREWALLS IN IT

source..
Content:

Firewalls
Name
Course
Instructor
Institution
Date
Firewalls
Introduction
Internet security incorporates the management of the resources especially the data management and access. The standard network security involves design and planning of the organization in the information technology department. The security infrastructures are a vital part of the system plans and execution in the organization. In the recent past, the reports of the computer threats have especially in the financial institutions have increased.
The researchers and developers have designed firewalls security solution in the development of internet security. The advance in technology in some instance negatively influence the financial institutions leading to millions of losses in the businesses. Computer threats in the modern day range from hackers, virus, and worms that try to access the computer software or hardware without the user’s knowledge. The internet form of threats has increased in the recent past leading to malicious damages. A stable network security system is required for the management of the growing number and complexity of computer threats.
The increased reliance on the electronic communication and monetary transactions has grown the probabilities of network threats through different methods. The increasing dependency on the use of the internet risks the users from common threats such as the computer viruses. Investments in the network security are of beneficially for the confidentiality and importance of information stored electronically. Different organizations depend on the electronic storage of information. Ranging from banks, schools and hospital institutions rely on the cloud storage of crucial information hence the importance of internet security is essential. The computer virus, for instance, is commonly used to alter information from the original data stored hence making them some of the malicious threats in the network security.
Case Study
In January 2013, the U.S government sentenced three men to jail as result of creating and distributing of the computer virus. The three got charged with the computer virus attacks on bank accounts that led to the loss of millions from the banks. The development and distribution of the Gozi virus occurred to one of the most destructive computer viruses in the history of financial history. The Trojan virus enabled the access of bank data and transaction of millions of dollars online illegally stealing from the banks. The virus that created by three middle-aged men named, Kuzmin, 25, Mihai Ionut Paunescu, 28 and Deniss Calovskis, 27 created and used the destructive software to cause the financial damages. The Gozi Trojan virus case was classified under the computer hacking and fraud cases leading to one of the most devastating financial computer threats to be prosecuted in the United States.
Banking Trojans are characterized under the cyber-criminal cases that evolved with the introduction of the internet business and reliance on the web for the banking services. Different from the traditional methods of banking burglary, the banking Trojans are used for the online business. The unauthorized access to the bank accounts leads to high risks of losing more finances through the criminal act compared to the traditional methods of robbing the banks. The computer virus effect in the recent banking threats especially for the online transactions and banking services has been on the rise following the lack of measures in the network security.
The Gozi Trojan that affected more than forty thousand computers leads to millions of losses in dollars, part of which included the NASA. The threat changed more than hundred computers of the NASA in different locations across the world. The affected countries included the United Kingdoms, Germany, Poland, France, Finland, Turkey and Italy due to the spread and distribution of the Gozi virus. The complexity of the hacking intellectuals in executing these crimes led to a longer period in the investigation and evaluation of the damages caused. The study involved different government interventions clearly expressed the significant difference between the traditional banking burglary and the new technology crimes in the banking system.
According to the designers and distributors charged with the computer virus, Gozi claimed that the designing and writing of the virus code began around six years before executing the criminal activities. The design and writing of the source code were done in secret to avoid the effect of the government intelligence. The co-conspirators in the financial crime were later sold at a price of fifty thousand dollars and the shares to the illegal profits according to the prosecutor. The virus was subsequently sent as spam emails with attached files that secretly installed the virus in the backend after the download of the pdf documents.
The Gozi Trojan was specifically designed to collect the data from the computers upon the installation hence providing the passwords and the security information threat. The process led to the access of the security information concerning the bank accounts hence facilitating the access of the online banking system and the illegal transfers. The software that resulted in the access and illegal shipments of the online cash affected the majority of the online banking system through the hiding of the internet protocols addresses and servers. The internet protocol cache addresses and servers enabled the criminals in evading the detection of the illegal transfers. The banking websites are among the most affected online transfer avenues that are affected by the growing effect of cyber-crimes in Trojans and computer worms.
Effects of Cyber-Crimes in the Society
Cyber-crime cases are among the rising cases of the computer crimes associated with the advancement in the technology. The effect of the crimes committed through the creation and distribution of the virus affects the milestones made in the technology. The impact of the computer threats increases in the society has led to the development of different mechanisms in tackling the malicious threats. The increasing need for legitimate traffic and transactions within the banking system have called for the elaboration of the devices such as a firewall. The firewall component improves the network security through blocking and allowing the legitimate traffic especially for the delicate transfers such as the banking system.
The development of firewall enables the safety of the scheme through the restriction and filtering of the data transferred through the traffic. The deployment of the firewalls allows the protection of the system in running the applications installed in delivering the quality services. Corporate enforcement of the information security policy has been implemented with the rising number of computer-related threats on the data and finances and the growth of the online money transfer. The development of the firewalls has become increasingly complex evolving from the offering traditional firewalls to protect networks to the application-aware processing of the Internet protocols.
Firewall Security
Firewalls are the front line defense mechanisms that are used against the illegal intruders into the network security. The firewalls network security operates in seven layers of the protection against the malicious and unauthorized access of the computer. The firewall technology involves the hardware and software application in ensuring the Internet security mechanisms are employed and implemented. The standard layers used in the firewall security device, however, include; the network, data link, network and the application layer. The complexity of the internet security and application of different functions depend on the risks and data involved in a particular system. Among the healthy controls employed by the technology is the IP address controls that block the access of unauthorized network.
The development and implementation of the OSI layer in computer protection enable the security of data and online communication preventing the hacking of the system and the use of a virus. The technology that has been researched by different technology companies such as the technology giants, Cisco Networks works in various rules and applications. The use of packets in the transfer of data examines the different port numbers of the sources and destination of packets hence allowing the traffic. Data is transferred in small packets to the respective ports ensuring the secure filtering of data within the network.
Additionally, the incoming and outgoing network protection against the untrusted network traffic can be performed in different methods. The types of firewall include the packet firewalls, stateful firewalls, proxy firewalls and the standard application layer firewall used on the web servers. Various types of firewalls are used depending on the type of data utilized by the organization. The complexity of the firewall depends on the information importance by the society.
The commonly implemented types of firewalls are the application layer firewalls used for the protection of the web servers against the threats. The technology emerged in 1999 allowing the network security on the servers in the inspection and protection of the packets across the network. The application allows the filtering and blocking of the malicious packets across the network. The technique uses the home computer operating system in passing the information between the systems. The hardware-based firewalls provide additional functionalities like routing of the internal network to provide protection of the scheme.
The proxy firewalls technique among the types of firewalls used by various organizations currently involves the use of the proxy in preventing the direct links on the opposite side of the fi...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Intellectual Property And Cloud Computing Assignment
    Description: How organizations and individuals usually use cloud computing services and how this usage increases the risks to intellectual property....
    1 page/≈550 words| 4 Sources | Harvard | IT & Computer Science | Term Paper |
  • Online Student Attendance Management System Term Paper
    Description: The user clicks ‘Log In’ on interface of the OASMS. The OSMS shows a screen with username and password text fields along with submit button....
    1 page/≈275 words| 6 Sources | Harvard | IT & Computer Science | Term Paper |
  • Database Management IT & Computer Science Term Paper
    Description: The DBMS also referred as a tool which can access the data itself, format according to the system along with fields name, record structure and the structure of the file. In the present context, it is highlighted primarily on the role of an entity-relationship diagram that shows the proper relationship...
    10 pages/≈2750 words| 8 Sources | Harvard | IT & Computer Science | Term Paper |
Need a Custom Essay Written?
First time 15% Discount!