Internet-Based Applications Assignment: Security Concerns

Verified

Added on  2019/10/18

|8
|1182
|470
Homework Assignment
AI Summary
This assignment solution addresses the security concerns associated with internet-based applications. It begins by highlighting the vulnerabilities inherent in national infrastructures, including private networks and the internet, and the potential for malicious attacks. The solution then examines a case study of ING life, detailing their adoption of security measures such as Microsoft SNA server for improved mainframe application access and the Cisco PIX Firewall for secure VPN access. Finally, the assignment explores the concept of an extranet and proposes mobile service solutions with unique codes for enhanced security and efficient communication between servers and clients, suggesting SMS and mobile applications with customer-specific features to mitigate security risks. The solution emphasizes the importance of proactive security measures to protect against both internal and external threats.
Document Page
Running Head: Internet-Based Applications
Internet Based Applications
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Internet Based Applications 2
Table of Contents
Answer 1..........................................................................................................................................2
Answer 2..........................................................................................................................................3
Answer 3..........................................................................................................................................4
References........................................................................................................................................6
Document Page
Internet Based Applications 3
Answer 1
Generally, it can be said that all national infrastructures mainly depend on the underlying
communication of computer information infrastructures like private networks, the internet,
computing resources, and the databases. All these underlying information infrastructures and the
infrastructures are covered with reliability and system survivability flaws, vulnerabilities,
representing security, and the potential attacks that can influence the software, hardware, lives of
people, and the communications media. Furthermore, it can be said that security concerns are
significant, but it must also be considered that the networks and the systems tend to fall apart on
their own, without requiring attacks of malicious.
On the other hand, it can be significantly said that the public infrastructure like internet brings a
large number of risks and difficulties associated with the security as well as physical damage.
Reliability glitches and the high-security flaws are common in most of the networks,
programming languages, web software, and the systems (Bradshaw, 2016). It can be said that the
extent of the available risk cannot recognize in an effective manner due to the presence of
enough complexities associated with the public network. Another risk and difficulty associated
with the use of the public internet are the presence of unforeseen vulnerabilities. These
vulnerabilities damage the hardware and software parts of a system in a greater manner.
Apart of all these, there are a much realistic threat to the information infrastructures, containing
incompetent operational and administrative staff, terrorists, intruders, and malicious insiders.
Malicious attacks can come from anywhere in the world and brings huge effects with it. It
destroys all dial-up and network connections in a negative manner. Thus, it can be said that there
are few truly serious malicious attacks on networking and computer systems that influence the
Document Page
Internet Based Applications 4
system working in a negative manner. But instead of malicious attacks, there are other security
threats also which influences the system and network working in a negative manner. So, it can be
said that use of public infrastructure will prove critical and risky for everyone.
Answer 2
After studying the given case study, it can be said that the ING life adopted right security
concerns for its organization. Microsoft SNA server is a better solution with the presence of
integrated services. With the help of this server, ING lives can improve mainframe application
and data resources from a workstation of the client (Mueller, 2013) significantly. Furthermore,
the most important feature of Microsoft SNA solution adopted by the ING life is its links with
remote desktop IP and connectivity to the mainframe with an IBM mainframe. This help the
organization in its business applications which requires online facilities like online transaction,
and Web access.
Furthermore, it can also be said that there is no footprint of SNA server on the mainframe. It
mainly uses the standard protocols of communication to communicate between NT server and
the mainframe computer. Furthermore, it helps the ING lives by integrating the data access and
the mainframe data with each other. This will do with the help of Host data replicator, model
transaction integrator, and DDM provider (Kolkman, 2015). Furthermore, another solution
adopted by the ING life is the Cisco PIZ Firewall that permits maintaining stateful firewall
protected and secure VPN access with a single framework. On the other hand, it can be said that
Cisco PIX Firewall solution produces a scalable solution for the security which helps the
organization in gaining more and more reliability. It is because PIX Firewall is a combination of
a different operating system that is less difficult and the highly protected. Due to this, it becomes
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Internet Based Applications 5
more suitable and reliable that software firewalls. In addition, with the help of PIX Firewall the
organization able to secure its internal network from the access of unauthorized outside users like
the public internet. Thus, it can be said that solutions adopted by the ING life are better and
effective which allows a secure network with efficient working.
Answer 3
Generally, an extranet is considered a part of the inward organization site that is accessible to
general society and imparted safely to assemblies of individuals outside the organization such as
foremen and customers, or suppliers. Furthermore, it can be said that the organizations led with
the network after the prominence of online and internet administrations. This will allow them a
reliable and secure functioning. In addition, the offering parts of the internet such as item index
with outside individuals were critical. It is because representatives themselves could not
dependably access the internet from the outside workplace. Furthermore, it can be said that the
administration's network was quite reliable and facilitate the online internet with the more
effective solutions.
The solution which may prove beneficial for the brokers in offering them better connectivity is
mobile service with the particular code. This will offer a more secure network with efficient and
reliable solutions. ING life can introduce mobile application and SMS facility for efficient
communication between the server and the client (Joosen, 2014). This can do by bringing
applications with a unique code for the individual. The organization need to develop the software
and application features as per the customers' requirement and should provide them on their
demand and queries. With the help of the customer code they can start their functioning and can
perform reliable transactions without any concern of security. For example, if any customer
Document Page
Internet Based Applications 6
wants to know the amount then it would like to send AMT with its code. This facility is quite
remote based which allows secure functioning. Thus, it can be said that ING life can avoid
security concerns by using the recommended solution.
Document Page
Internet Based Applications 7
References
Bradshaw, S., & DeNardis, L. (2016). The politicization of the Internet’s Domain Name System:
Implications for Internet security, universality, and freedom. new media & society,
1461444816662932.
Joosen, M. H. W., & Martinelli, J. L. F. (2014). Engineering Secure Future Internet Services and
Systems.
Kolkman, O. (2015). COLLABORATIVE SECURITY: INTERNET SECURITY, THE
INTERNET WAY.
Mueller, M., Schmidt, A., & Kuerbis, B. (2013). Internet security and networked governance in
international relations. International Studies Review, 15(1), 86-104.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Internet Based Applications 8
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]