`
1 | P a g e
TERM PAPER
Topic: Unsettling Parallels between Security and the Environment
Course: INT 881
D.O.A: 27/01/2012 D.O.S: 17/04/2012 Submitted to: Submitted By: Mr. Mohit Prakram Mr. Himanshu Chaudhary Reg. No. 10902369 Roll no. A05 Section: 0E111
`
2 | P a g e
Acknowledgement
I owe special words of thanks to my Teacher Mr. Mohit Prakram
for their support, thoughtful counseling and encouragement at every
step of the term paper. We are also thankful to the teachers of the
Department for giving us the best of knowledge and guidance
throughout the project.
And last but not the least, we find no words to acknowledge my
friends & moral support rendered by our parents in making the effort
a success. All this has become reality because of their blessings and
above all by the grace of god.
`
3 | P a g e
Abstract
In this term paper under the topic “Unsettling Parallels between Security and
the Environment “ We study about different types of communication
technologies used in today’s mordern era and what types of threat causing over
them.
We also study about the different types of security measures for all the threat
releated to the communication system/technology and its environment communication system/technology and its environment
`
4 | P a g e
Table of Contents
S.No. Topic Page no.
1 Introduction
Communication Technology
5
2 History
Past to Present
6
3 Various type of ommunication technologies use
Internet
Wireless Connectivity
Read/Write Web
Audio Online
Smatphones
Networking
6
4 The Concept of computer communication security 8
5 The insecure compter network enivornment 9
6 Considerations and Implementation of a Security Policy
11
7 The pros and cons for the communication technologies 11
8 References 12
`
5 | P a g e
INRODUTION:
As long as there have been people, there has been technology. Indeed, the techniques of
shaping tools are taken as the chief evidence of the beginning of human culture. On the
whole, technology has been a powerful force in the development of civilization, all the more
so as its link with science has been forged. Technology—like language, ritual, values,
commerce, and the arts—is an intrinsic part of a cultural system and it both shapes and
reflects the system's values. In today's world, technology is a complex social enterprise that
includes not only research, design, and crafts but also finance, manufacturing, management,
labor, marketing, and maintenance.
The insecurity of the Internet has been compared to environmental pollution: running a
vulnerable machine creates negative externalities as it becomes a potential vector for worms,
distributed denial of service attacks and so on.
Communication Technology: Communication‖ is an integral part of human existence. It is
communication that decides the very identity of human beings Modern society is turning into
an information society and communication is the exchange of information. It is the process &
transfering information form a Sender to a receiver with the use of a medium in which the
communication information is understood by both sender and receiver.
Communication Technology implies the knowledge, skills and understanding needed to
exchange information verbally or non-verbally. It is processing of information interms of
accessing information, decoding information and sending it via a medium and changer to the
receivers. Medium or channel can be written or oral or gesture form of information through
speech, action or any electronic machine.
Communication Technology is the electronic systems used for communication between
indeividuals or groups. It faciliates communication between individuals or groups. Who are
not physically present at the same location? Systems such as telephone, telex, Fax, radio,
T.V. and Video are included, as well as more recent computer based technologies, including
electronic data interchange and e-mail. In short, communication technolgoy is the activity of
designing and constructing and maintaining communication systems.
Communication Channel
`
6 | P a g e
History:
Communication: Past to Present
From ancient writing techniques and newspapers we’ve moved on to text messaging and
email. From Morse code and telegraphs to telephones and radios, we now moved on to
televisions, computers and cell phones. Since the end of the 19th century, the way people
communicate has been completely transformed. No longer beholden to pen and parchment,
people can now deliver massive amounts of data with the push of a button. New
communication technologies have connected not only people but also businesses, changing
the way people interact on a daily basis.
TV’s that utilized tubes with vacuum seals and boasted analog signals and black and white
color are now Flat Screen LCD’s or Plasma’s that boast all digital High Definition Signals,
thousands of lines of resolution and millions of color pixels. Rotary phones and dial up
communication has been transformed to portable phones. From there they moved on to
satellite communication cellular phones. Hand written symbols, numbers and letters went
from being carried to being digitally transferred. We no longer have to wait for days to
receive information as most of our data messages can be transferred in a matter of seconds
over high speed broadband internet connections with computers that boast Gigabytes of Ram
and Gigahertz of processor speed.
Various type of technologies used for communications:
Internet:
The creation of the Internet allowed computer networks from around the globe to network
with each other, giving individuals access to an incredible wealth of information. In 2010,
about half of the world's population has access to the Internet, growing from only 6 percent of
the population in 2000.
Email, social networks, newsgroups and video transmission have connected the world like
never before. Privacy concerns have arisen with the proliferation of the Internet, especially
`
7 | P a g e
with government monitoring and certain social networking sites, but the Internet has woven
itself into the fabric of society and business. High-speed connections allow for an immense
amount of information to be transferred in seconds.
Wireless Connectivity:
Wireless network refers to any type of computer network that is not connected by cables of
any kind. It is a method by which homes, telecommunications networks and enterprise
(business) installations avoid the costly process of introducing cables into a building, or as a
connection between various equipment locations.Wireless telecommunications networks are
generally implemented and administered using a transmission system called radio waves.
Mobile Phone
Bluetooth
WiMax
Global Positioning System
Wireless LAN
E-mail:
Electronic mail, commonly called email, is a means of sending messages to someone
instantaneously over the Internet through a service provider or email hosting website. Email
now virtually replaces hand-written correspondence sent through the postal system. Senders
can not only send a direct message but also attach images and documents to the email, giving
recipients immediate access to information that might otherwise take days to receive and
even longer to edit or update as necessary. Additionally, email services retain messages sent
between parties in your account until you delete them manually, allowing you to always have
a record of communication.
Read/Write web:
Blogs: A blog is a personal journal published on the World Wide Web consisting of
discrete entries ("posts") typically displayed in reverse chronological order so the
most recent post appears first. Blogs are usually the work of a single individual,
occasionally of a small group, and often are themed on a single subject.
Wikis: Wiki is a piece of server software that allows users to freely create and edit
Web page content using any Web browser. Wiki supports hyperlinks and has simple
text syntax for creating new pages and crosslinks between internal pages on the fly.
Social Bookmarking: Social bookmarking is a method for Internet users to organize,
store, manage and search for bookmarks of resources online.
Audio Online:
Podcasting: A podcast is a type of digital media consisting of an episodic series
of files (either audio or video) subscribed to and downloaded through web
syndication.
Internet Radio: Internet radio (also web radio, net radio, streaming radio, e-
radio webcasting) is an audio service transmitted via the Internet. Music streaming on the
`
8 | P a g e
Internet is usually referred to as webcasting since it is not transmitted broadly through
wireless means.
Smartphones
Smartphones are exactly that--mobile phones that know how to do an amazing variety of
tasks. These cellular phones have a multitude of features that not only allow you to
communicate while on the go in a number of different ways, but give you Internet access,
keep track of appointments, and allow you to add features and applications for every need
(or desire) you can think of. Text messaging through mobile phones is increasingly
becoming the way to communicate quick thoughts to friends, family and clients, whether
it's to promise a call later or simply to pass on a thought before it's forgotten.
Networking
Online networking websites, such as Facebook, Twitter and LinkedIn, are ncreasingly
becoming the most popular means of instant and detailed communication. These sites
allow registered users to communication with friends, family and clients from
moment to moment. You can add images, update your status (telling everyone what
you're doing this very moment), start a fan page for your business, write notes, send
personal messages, and more. The idea is to allow users the opportunity to connect
with everyone they know, even if they are hundreds of miles apart.
The Concept of Computer Communications Security
Security concerns in computer communications and software applications are a
relatively recent phenomena. These concerns have grown since the discovery and
widespread use of the worldwide web, the internet and changing hostserver
relationships. Corporations, financial institutions, and the government have all
recognized the risk and responsibility of using computer technology since their
increased use of computer communications.
The corporate world has always recognized that the potential for industrial espionage
is real. As a result, companies have taken steps to protect their formulas and
manufacturing processes. Financial institutions listed on the stock market have sought
to protect trading and exchange information. These institutions have installed
safeguards to protect stockbroker communications.
`
9 | P a g e
The importance of security awareness and computer security awareness has increased
exponentially since September 11, 2001. Recent government legislation involving law
enforcement as it relates to computer security has changed the perception of privacy.
Identifying computer intruders and combating network attackers has always been a
priority by corporations and government entities. However, the search for terrorist
intentions has caused some compromises in the privacy areas of ordinary law-abiding
citizens. This changed perception of privacy has extended into parts of the corporate
world, the financial markets, and all government institutions. New computer security
measures have been adopted to prevent the pirating of confidential information and
threats due to terrorist intentions.
The Insecure Computer Network Environment
The world is an entirely untrustworthy and insecure computer network environment.
Only recently, steps have been taken to understand the nature of all sources (attackers)
and intended victims (targets). Different security appliances have been developed to
protect the corporate enterprise from various methods of attack. These security
appliances with the proper computer protocols have reduced the risk in computer
communications and increased confidence in an insecure network environment,
a few examples of the better-known security appliances.
The universal vulnerability is defined as the state in a computing system which:
Allows an attacker to execute commands as another user
Allows an attacker to access data that is contrary to the specified access restrictions
for that data
Allows an attacker to pose as another entity
Allows an attacker to conduct a denial of service
The guidelines for an exposure in a computing system are defined as follows:
An attacker may be allowed to conduct information gathering activities
An attacker may be able to hide activities
A capability can be included, that is expected, but easily compromised
A primary point can be used by an attacker to gain access to the system or data.
`
10 | P a g e
Something that can be considered a problem according to some reasonable security
policy
The security of a computer network is defined in terms of trusting the accuracy and
confidentiality of the data received and transmitted from the system. Four basic threats to a
good security policy are Masquerade, Interception, Modification and Denial-of Service.
Four basic parameters essential to a good security policy are Authentication, Confidentiality,
Integrity and Availability. The authentication process is used to verify the identity of the
person or persons with access to information and defends against masquerade. The property
of confidentiality is used to guarantee that information is not available or disclosed to
unauthorized individuals and defends against interception. The integrity property verifies that
data has not been changed, destroyed or lost in any manner and defends against data
modification. The property of availability is defined as being accessible and prevents denial-
of-service events
Cryptography, which incorporates encryption and decryption of computer data, has provided
protection and increased confidence in data communications. Symmetric encryption
algorithms use the same key to encrypt and decrypt while asymmetric algorithms use
different keys.
`
11 | P a g e
To validate the integrity of data Hashing was developed as another form of cryptography.
Once the hash function mathematically operates on a computer message, it cannot be
reversed. Both parties know the algorithm, and a Hashed Message Authentication Code
(HMAC) authenticates the originator of the message. Another process called Digital
Signatures4 has been developed and accepted as a commonplace security practice. New
protocols, which are more compatible with specialized security mechanisms, have been
generated. These mechanisms were able to prevent compromises in network security and
reduce incidences of malicious activity.
Different types of attacks can penetrate a computer system or network. Large e-mails or
uploading large files with the File Transfer Protocol (FTP) can cause Data Flooding.
Considerations and Implementation of a Security Policy
Initiatives to protect and defend a computer environment will derive the following benefits:
Creating a framework for implementing security features in the network
infrastructure.
A process will be devised so existing network security can be audited.
The procedures that are generated can be considered expedient, prudent,
advantageous, and roductive.
Global security can be implemented and enforced.
A basis for legal action can be created, ifnecessary
The pros and cons for the communication technologies:
Pros:
Reach most friends, family and business contacts in seconds. Develop a business line without needing a real office. Fast development and less time to market. Lower prices on communications to consumers. Real time interaction with other information systems. Home and daily tasks automation. Asking questions with a million people willing to help out.
Cons:
No reliable trusted sources. Information might not be accurate. Communicating over a distance might degrade the human approach to relations. The mind has become lazy, not reading the entire page but going straight to the
interesting part. Reduced privacy. A faster world based on technology reduces the amount of time to be with ourselves.
`
12 | P a g e
Conclusion: Communication security is a systems engineering discipline. The field requires a systems
erspectiveand approach. The entire computer architecture needs to be thoroughly understood
before a layered approach to design is undertaken. In today’s world, integrated network
security is no longer a benefit or something “nice to have.” It is a crucial element needed to
protect and defend almost every aspect of daily life. In the end, a secure computer network
architecture is not enough, a personal commitment to security awareness, and a dedication to
a security policy might protect us in an insecure computer network environment.
References:
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4106339&tag=1
www.hrmars.com/admin/pics/274.pdf
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04420065