tailieunhanh - JOURNAL OF INDUSTRIAL TECHNOLOGY: Internet and Network Security

Complacency, or the belief that "good-enough security" is all that is required, seems to be the mind-set of many. Consequently, IT professionals may have settled for security that isn't always effective. In the 2008 CSI Computer Crime & Security Survey, 50% of the survey respondents reported that they suffered virus-based security incidents. The survey results also show that one in five suffered a bot attack in 2008. Virus security incidents have been the number 1 attack item for four of the past five years, placing second in the other year. Interestingly, in the 2008 CSI survey, 97% of the. | Journal of INDUSTRIAL TECHNOLOGY Volume 17 Number 1 - November 2000 to January 2001 Internet and Network Security By Dr. James H. Yu Mr. Tom K. Le KEYWORD SEARCH Administration Internet Legal Issues Management Reviewed Article The Official Electronic Publication of the National Association of Industrial Technology 2000 Journal of Industrial Technology Volume 17 Number 1 November 2000 to January 2001 James H. Yu is a professor of Electronics and Computer Technology at San Jose State University. His current research includes microprocessor architecture management information systems computer networking and security and electronics manufacturing technologies. Tom K. Le is a technical account manager at Acclaim Technology in San Jose. He received his Bachelor of Science degree from University of California at Berkley. He has implemented numerous system network configurations including network security measures for corporations and business. Introduction Although the history of the Internet is relatively short its growth has been dynamically explosive. The number of Internet users worldwide has grown from 95 million to 130 million in 1998 and it is projected that there will be 350 million users in the year 2003 eMarketer 1998 . The Internet is a worldwide collection of networks that links together millions of computers by various means such as modems fiber optic lines routers and servers. It provides connections to businesses the government industries educational institutions and individuals. Each of these organizations has become increasingly dependent on networks and distributed computing and processing systems. Furthermore because they possess a critical and Internet and Network Security By Dr. James H. Yu Mr. Tom K. Le integral asset of information internetworking security and what measures to protect this information has become a major area of concern. In this paper we will address the key concepts of network security common network .