TCP/IP Protocol and Information Security Annotated Bibliography

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

The value of the article

The article by Natale (2001) dwells upon TCP/IP protocol and information security. The security issues have become of primary concern of numerous companies and organizations. Admittedly, Internet environment in the end of the twentieth century was “more benign” than at present (Natale, 2001, p.206). The article reveals useful information concerning effective security software applications which can be used in workplace and for private communication.

Brief summary

The article opens up with detailed description of TCP/IP protocol. It is pointed out that the protocol is divided into four layers fulfilling certain tasks. One layer is “responsible for communicating with the actual network hardware”, the second layer is “responsible for determining how to get data to its destination”, the next layer is responsible for providing “data flows to the application layer”, and the fourth layer is the one where “users typically interact with the network” (Natale, 2001, p.205). This protocol transmits data in most precise way, i.e. no data is missing or distorted.

However, it is also noted that critique concerning the lack of security is valid, since the protocol was designed in times when the issues of security were insignificant. Natale (2001, p.208) reported about the survey implemented to check effectiveness of several security software applications: ZoneAlarm Pro 2.1 – version 2.1.25, Norton Internet Security 2000 – version 1.0.147.0, LockDown 2000 – version 7.0.0.3, BlackIce Defender – version 2.1.cn.

Reportedly, all four applications failed to reveal “the highest and medium security level settings” since they did not “afford any protection” to ICQ messaging, HTML and e-mail with attachment, but it was also noted that ZoneAlarm Pro 2.1 – version 2.1.25 was still superior in detecting threats (Natale, 2001, p.209). As far as the lowest level is concerned it was reported that the four applications were equal. Thus, Natale (2001) concludes that none of these applications can provide an appropriate level of security, so users should be very attentive when choosing an effective application.

Managerial implications

The article is a valuable source of knowledge for many employees working in a real life company. In the first place, they will become aware of potential threats which the Internet has (in case someone did not pay much attention to information security). They will see that such activities as ICQ messaging or sending/receiving HTML or other files via e-mails can be dangerous in terms of information security. Thus, employees will be more careful when using their e-mails. Notably, the author of the article used Trojan to check the level of protection. Trojan is a notorious threat which many people are aware of.

Employees can also imagine possible threats of Trojan “activity” on their computer. Personnel will also acknowledge what security software applications are proved to be ineffective. They obtain empirical evidence of these applications ineffectiveness, which is much more valuable than an opinion of IT-specialists. Thus, they will not use them, and instead they will choose some more effective applications. Besides, the article can be interesting for all Internet users since it opens up the mystery: how it is working.

Conclusion

The article provides detailed information about TCP/IP protocol and security software applications which are proved to be ineffective. The article is quite valuable since it touches upon the issues of information security which has become a burning problem to be solved.

Reference

Natale, W. (2001). TCP/IP and Security Software Applications. Journal of Computing Sciences in Colleges, 16(3), 205-211.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 26). TCP/IP Protocol and Information Security. https://ivypanda.com/essays/tcpip-protocol-and-information-security/

Work Cited

"TCP/IP Protocol and Information Security." IvyPanda, 26 Mar. 2022, ivypanda.com/essays/tcpip-protocol-and-information-security/.

References

IvyPanda. (2022) 'TCP/IP Protocol and Information Security'. 26 March.

References

IvyPanda. 2022. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.

1. IvyPanda. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.


Bibliography


IvyPanda. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
1 / 1