664 research outputs found
Economic barriers to development : cost of access to internet infrastructure
The Internet is increasingly viewed as an "indispensable" resource for general development and economic growth (UNDP 1999). Its adoption by governments, organizations and individuals has resulted in the shrinking of spatial and temporal distances between different regions of the world, and has greatly facilitated the "free" and quick exchange of information. Such constrictions of time and space impact upon social and economic interactions at all levels of society. Furthermore, ramifications of this impact are felt by a society, group or individual irrespective of whether or not they use the Internet. The ability to access the Internet, and in particular the costs associated with such access, are therefore important points of consideration. Not only do these costs contribute to the disproportional spread of the Internet across the world's population; they also potentially contribute to uneven patterns of development within, and between countries
The Effect of the presence of a Honeypot in a protected network vs. an unprotected network
Honeypots are a relatively new way to deal with threats but in a very peculiar way; they are not a solution themselves as they don\u27t solve a problem, rather than that Honeypots are flexible tools that can be used to collect information about the way an attack can affect the network. To achieve this Honeypots should be an easy target for attackers, and that\u27s the reason why certain precautions must be taken when using one of these tools to avoid a problem bigger than a solution. In this paper it\u27s going to be tested the effect that the implementation of a honeypot or honeynet can have in a production network under two security scenarios: a protected network vs an unprotected one
Internet... the final frontier: an ethnographic account: exploring the cultural space of the Net from the inside
The research project The Internet as a space for interaction, which completed its mission in Autumn 1998, studied the constitutive features of network culture and network organisation. Special emphasis was given to the dynamic interplay of technical and social conventions regarding both the Net’s organisation as well as its change. The ethnographic perspective chosen studied the Internet from the inside. Research concentrated upon three fields of study: the hegemonial operating technology of net nodes (UNIX) the network’s basic transmission technology (the Internet Protocol IP) and a popular communication service (Usenet). The project’s final report includes the results of the three branches explored. Drawing upon the development in the three fields it is shown that changes that come about on the Net are neither anarchic nor arbitrary. Instead, the decentrally organised Internet is based upon technically and organisationally distributed forms of coordination within which individual preferences collectively attain the power of developing into definitive standards. --
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, “Who or what are
you?” Authorization asks, “What are you allowed to do?” And fi nally,
accounting wants to know, “What did you do?” These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
- …