TCP/IP Protocol and Information Security Annotated Bibliography

Exclusively available on Available only on IvyPanda® Made by Human No AI

The value of the article

The article by Natale (2001) dwells upon TCP/IP protocol and information security. The security issues have become of primary concern of numerous companies and organizations. Admittedly, Internet environment in the end of the twentieth century was “more benign” than at present (Natale, 2001, p.206). The article reveals useful information concerning effective security software applications which can be used in workplace and for private communication.

Brief summary

The article opens up with detailed description of TCP/IP protocol. It is pointed out that the protocol is divided into four layers fulfilling certain tasks. One layer is “responsible for communicating with the actual network hardware”, the second layer is “responsible for determining how to get data to its destination”, the next layer is responsible for providing “data flows to the application layer”, and the fourth layer is the one where “users typically interact with the network” (Natale, 2001, p.205). This protocol transmits data in most precise way, i.e. no data is missing or distorted.

However, it is also noted that critique concerning the lack of security is valid, since the protocol was designed in times when the issues of security were insignificant. Natale (2001, p.208) reported about the survey implemented to check effectiveness of several security software applications: ZoneAlarm Pro 2.1 – version 2.1.25, Norton Internet Security 2000 – version 1.0.147.0, LockDown 2000 – version 7.0.0.3, BlackIce Defender – version 2.1.cn.

Reportedly, all four applications failed to reveal “the highest and medium security level settings” since they did not “afford any protection” to ICQ messaging, HTML and e-mail with attachment, but it was also noted that ZoneAlarm Pro 2.1 – version 2.1.25 was still superior in detecting threats (Natale, 2001, p.209). As far as the lowest level is concerned it was reported that the four applications were equal. Thus, Natale (2001) concludes that none of these applications can provide an appropriate level of security, so users should be very attentive when choosing an effective application.

Managerial implications

The article is a valuable source of knowledge for many employees working in a real life company. In the first place, they will become aware of potential threats which the Internet has (in case someone did not pay much attention to information security). They will see that such activities as ICQ messaging or sending/receiving HTML or other files via e-mails can be dangerous in terms of information security. Thus, employees will be more careful when using their e-mails. Notably, the author of the article used Trojan to check the level of protection. Trojan is a notorious threat which many people are aware of.

Employees can also imagine possible threats of Trojan “activity” on their computer. Personnel will also acknowledge what security software applications are proved to be ineffective. They obtain empirical evidence of these applications ineffectiveness, which is much more valuable than an opinion of IT-specialists. Thus, they will not use them, and instead they will choose some more effective applications. Besides, the article can be interesting for all Internet users since it opens up the mystery: how it is working.

Conclusion

The article provides detailed information about TCP/IP protocol and security software applications which are proved to be ineffective. The article is quite valuable since it touches upon the issues of information security which has become a burning problem to be solved.

Reference

Natale, W. (2001). TCP/IP and Security Software Applications. Journal of Computing Sciences in Colleges, 16(3), 205-211.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 26). TCP/IP Protocol and Information Security. https://ivypanda.com/essays/tcpip-protocol-and-information-security/

Work Cited

"TCP/IP Protocol and Information Security." IvyPanda, 26 Mar. 2022, ivypanda.com/essays/tcpip-protocol-and-information-security/.

References

IvyPanda. (2022) 'TCP/IP Protocol and Information Security'. 26 March.

References

IvyPanda. 2022. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.

1. IvyPanda. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.


Bibliography


IvyPanda. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1