Java Reference
In-Depth Information
De-Militarized Zone
Mail
Server
FTP
Server
Web
Server
Internal Firewall
Internet
Internet
Router
Internet
Firewall
Intrusion Prevention System
Management Department
on VLAN 3
Core Switch (L3
Switch)
Marketing Department
on VLAN 2
Server
VLAN
Accounting Department
on VLAN 1
Anti-Virus Server
Patch Management Server
Database Server
Application Server
Authentication Server
Key Management Server
Figure 2.3
network diagram elucidating defense-in-depth.
2.3 Internet Security Incidents and their evolution
he advent of computerization brought with it multifarious beneits and unforeseen eiciencies
to the world, but it also came with its set of security incidents. he arrival of networks and the
Internet ushered in an age of connectivity and information interchange. he world was mov-
ing to a new dimension called the Internet. Everyone had started living their daily lives on the
Internet—from communication to shopping to banking to keeping in touch with friends to even
getting married online. ( Second Life is a virtual world that allows people to create avatars online
and lead online lives. Second Life also recently experienced the irst divorce of a married couple on
Second Life . Talk about virtual reality!!) As the world moved to the online dimension and people
started performing their day-to-day activities on the Internet, it was only natural that certain mali-
cious elements got wind of this trend and started using their nefarious ways on the Internet. Let
us explore the evolution of various Internet security threats.
Search WWH ::




Custom Search