664 research outputs found

    The Use of Firewalls in an Academic Environment

    No full text

    Economic barriers to development : cost of access to internet infrastructure

    Get PDF
    The Internet is increasingly viewed as an "indispensable" resource for general development and economic growth (UNDP 1999). Its adoption by governments, organizations and individuals has resulted in the shrinking of spatial and temporal distances between different regions of the world, and has greatly facilitated the "free" and quick exchange of information. Such constrictions of time and space impact upon social and economic interactions at all levels of society. Furthermore, ramifications of this impact are felt by a society, group or individual irrespective of whether or not they use the Internet. The ability to access the Internet, and in particular the costs associated with such access, are therefore important points of consideration. Not only do these costs contribute to the disproportional spread of the Internet across the world's population; they also potentially contribute to uneven patterns of development within, and between countries

    The Effect of the presence of a Honeypot in a protected network vs. an unprotected network

    Get PDF
    Honeypots are a relatively new way to deal with threats but in a very peculiar way; they are not a solution themselves as they don\u27t solve a problem, rather than that Honeypots are flexible tools that can be used to collect information about the way an attack can affect the network. To achieve this Honeypots should be an easy target for attackers, and that\u27s the reason why certain precautions must be taken when using one of these tools to avoid a problem bigger than a solution. In this paper it\u27s going to be tested the effect that the implementation of a honeypot or honeynet can have in a production network under two security scenarios: a protected network vs an unprotected one

    Internet... the final frontier: an ethnographic account: exploring the cultural space of the Net from the inside

    Get PDF
    The research project The Internet as a space for interaction, which completed its mission in Autumn 1998, studied the constitutive features of network culture and network organisation. Special emphasis was given to the dynamic interplay of technical and social conventions regarding both the Net’s organisation as well as its change. The ethnographic perspective chosen studied the Internet from the inside. Research concentrated upon three fields of study: the hegemonial operating technology of net nodes (UNIX) the network’s basic transmission technology (the Internet Protocol IP) and a popular communication service (Usenet). The project’s final report includes the results of the three branches explored. Drawing upon the development in the three fields it is shown that changes that come about on the Net are neither anarchic nor arbitrary. Instead, the decentrally organised Internet is based upon technically and organisationally distributed forms of coordination within which individual preferences collectively attain the power of developing into definitive standards. --

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA
    • …
    corecore