TCP/IP Protocol and Information Security Annotated Bibliography

Exclusively available on IvyPanda Available only on IvyPanda

The value of the article

The article by Natale (2001) dwells upon TCP/IP protocol and information security. The security issues have become of primary concern of numerous companies and organizations. Admittedly, Internet environment in the end of the twentieth century was “more benign” than at present (Natale, 2001, p.206). The article reveals useful information concerning effective security software applications which can be used in workplace and for private communication.

We will write a custom essay on your topic a custom Annotated Bibliography on TCP/IP Protocol and Information Security
808 writers online

Brief summary

The article opens up with detailed description of TCP/IP protocol. It is pointed out that the protocol is divided into four layers fulfilling certain tasks. One layer is “responsible for communicating with the actual network hardware”, the second layer is “responsible for determining how to get data to its destination”, the next layer is responsible for providing “data flows to the application layer”, and the fourth layer is the one where “users typically interact with the network” (Natale, 2001, p.205). This protocol transmits data in most precise way, i.e. no data is missing or distorted.

However, it is also noted that critique concerning the lack of security is valid, since the protocol was designed in times when the issues of security were insignificant. Natale (2001, p.208) reported about the survey implemented to check effectiveness of several security software applications: ZoneAlarm Pro 2.1 – version 2.1.25, Norton Internet Security 2000 – version 1.0.147.0, LockDown 2000 – version 7.0.0.3, BlackIce Defender – version 2.1.cn.

Reportedly, all four applications failed to reveal “the highest and medium security level settings” since they did not “afford any protection” to ICQ messaging, HTML and e-mail with attachment, but it was also noted that ZoneAlarm Pro 2.1 – version 2.1.25 was still superior in detecting threats (Natale, 2001, p.209). As far as the lowest level is concerned it was reported that the four applications were equal. Thus, Natale (2001) concludes that none of these applications can provide an appropriate level of security, so users should be very attentive when choosing an effective application.

Managerial implications

The article is a valuable source of knowledge for many employees working in a real life company. In the first place, they will become aware of potential threats which the Internet has (in case someone did not pay much attention to information security). They will see that such activities as ICQ messaging or sending/receiving HTML or other files via e-mails can be dangerous in terms of information security. Thus, employees will be more careful when using their e-mails. Notably, the author of the article used Trojan to check the level of protection. Trojan is a notorious threat which many people are aware of.

Employees can also imagine possible threats of Trojan “activity” on their computer. Personnel will also acknowledge what security software applications are proved to be ineffective. They obtain empirical evidence of these applications ineffectiveness, which is much more valuable than an opinion of IT-specialists. Thus, they will not use them, and instead they will choose some more effective applications. Besides, the article can be interesting for all Internet users since it opens up the mystery: how it is working.

Conclusion

The article provides detailed information about TCP/IP protocol and security software applications which are proved to be ineffective. The article is quite valuable since it touches upon the issues of information security which has become a burning problem to be solved.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Reference

Natale, W. (2001). TCP/IP and Security Software Applications. Journal of Computing Sciences in Colleges, 16(3), 205-211.

Print
Need an custom research paper on TCP/IP Protocol and Information Security written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, March 26). TCP/IP Protocol and Information Security. https://ivypanda.com/essays/tcpip-protocol-and-information-security/

Work Cited

"TCP/IP Protocol and Information Security." IvyPanda, 26 Mar. 2022, ivypanda.com/essays/tcpip-protocol-and-information-security/.

References

IvyPanda. (2022) 'TCP/IP Protocol and Information Security'. 26 March.

References

IvyPanda. 2022. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.

1. IvyPanda. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.


Bibliography


IvyPanda. "TCP/IP Protocol and Information Security." March 26, 2022. https://ivypanda.com/essays/tcpip-protocol-and-information-security/.

Powered by CiteTotal, the best bibliography tool
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1