Eight Information Security Technologies

1159 Words5 Pages
This research paper will introduce and examine eight information security technologies.
Respective sections will show specific technology and support the following format:
• Technology Overview: introduction to the technology.
• Business Analysis: A study of the usefulness, utility, cost, usefulness complexity of the technology in the present business environment.
• Security Analysis: The security technology is evaluated against the impression of
Confidentiality, Integrity and Availability as well as presenting its role as a
Countermeasure (protect, detect, correct).

• Firewalls
• Intrusion Detection Systems
• Virtual Private Network
• Network Mapping
• Password Cracking
• Public Key Infrastructure
• Intrusion Prevention Systems
Biometric Authentication
A firewall is defined as a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Firewalls can be defined in many ways according to your level of understanding. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted. From a high-level perspective, they can serve as a choke point, made to stop, or halt, the flow of network traffic, or as a gateway that represents more processing on the traffic beyond simple halting restrictions.

1According to the SANS Institute Firewalls can be broken down into two categories: IP packet filters (NetworkLevel) and proxy servers (Application Level). There are also three parts or “zones” when referring to network protection. The first zone is ref...

... middle of paper ...

...the years from the simple performance of “PING” or
“CONNECT” attempts to more extensive and subversive (or “quiet”) methods of detection. Today, the most popular tool for performing network mapping is the open source tool Nmap.5 Network mapping is capable of testing for the presence of nodes on a network based on a variety of detection techniques, including the use of Internet Protocol (IP), Transmission Control Protocol (TCP) and Universal Datagram Protocol (UDP). Each of these protocols has a unique flavor, and thus can generate varying results.
4 Wikipedia, Network Mapping (St. Petersburg: Wikipedia, 2004, accessed 12 October 2004); available from http://en.wikipedia.org/wiki/Network_Mapping; Internet.
5 Fyodor, Nmap Security Scanner (Unknown: Insecure.org, undated, accessed 12 October 2004); available from http://www.insecure.org/nmap/index.html; Internet.
Open Document