The value of the article
The article by Natale (2001) dwells upon TCP/IP protocol and information security. The security issues have become of primary concern of numerous companies and organizations. Admittedly, Internet environment in the end of the twentieth century was “more benign” than at present (Natale, 2001, p.206). The article reveals useful information concerning effective security software applications which can be used in workplace and for private communication.
Brief summary
The article opens up with detailed description of TCP/IP protocol. It is pointed out that the protocol is divided into four layers fulfilling certain tasks. One layer is “responsible for communicating with the actual network hardware”, the second layer is “responsible for determining how to get data to its destination”, the next layer is responsible for providing “data flows to the application layer”, and the fourth layer is the one where “users typically interact with the network” (Natale, 2001, p.205). This protocol transmits data in most precise way, i.e. no data is missing or distorted.
However, it is also noted that critique concerning the lack of security is valid, since the protocol was designed in times when the issues of security were insignificant. Natale (2001, p.208) reported about the survey implemented to check effectiveness of several security software applications: ZoneAlarm Pro 2.1 – version 2.1.25, Norton Internet Security 2000 – version 1.0.147.0, LockDown 2000 – version 7.0.0.3, BlackIce Defender – version 2.1.cn.
Reportedly, all four applications failed to reveal “the highest and medium security level settings” since they did not “afford any protection” to ICQ messaging, HTML and e-mail with attachment, but it was also noted that ZoneAlarm Pro 2.1 – version 2.1.25 was still superior in detecting threats (Natale, 2001, p.209). As far as the lowest level is concerned it was reported that the four applications were equal. Thus, Natale (2001) concludes that none of these applications can provide an appropriate level of security, so users should be very attentive when choosing an effective application.
Managerial implications
The article is a valuable source of knowledge for many employees working in a real life company. In the first place, they will become aware of potential threats which the Internet has (in case someone did not pay much attention to information security). They will see that such activities as ICQ messaging or sending/receiving HTML or other files via e-mails can be dangerous in terms of information security. Thus, employees will be more careful when using their e-mails. Notably, the author of the article used Trojan to check the level of protection. Trojan is a notorious threat which many people are aware of.
Employees can also imagine possible threats of Trojan “activity” on their computer. Personnel will also acknowledge what security software applications are proved to be ineffective. They obtain empirical evidence of these applications ineffectiveness, which is much more valuable than an opinion of IT-specialists. Thus, they will not use them, and instead they will choose some more effective applications. Besides, the article can be interesting for all Internet users since it opens up the mystery: how it is working.
Conclusion
The article provides detailed information about TCP/IP protocol and security software applications which are proved to be ineffective. The article is quite valuable since it touches upon the issues of information security which has become a burning problem to be solved.
Reference
Natale, W. (2001). TCP/IP and Security Software Applications. Journal of Computing Sciences in Colleges, 16(3), 205-211.