Protecting Against Internet Activists Essay

1498 words - 6 pages

Internet activists are often times a section of people whom meet in the cyber world and collectively deny customers from accessing corporate web sites. The intention of these internet activists is often denial of service. While the intentions of ”traditional” hackers are not just denial of service but stealing valuable insider information and data, internet activists only try to disrupt service.

Organizations these days should guard against cyber-attacks on their web sites by having a very structured security policy. It is not just enough to have a secure infrastructure setup as a one-time effort but continuous monitoring is necessary to ensure no security breach takes place. A well ...view middle of the document...

The traffic pattern analysis would help find any specific patterns in incoming traffic. The security countermeasures load balancing; throttling or dropping requests could further be tweaked based on the traffic pattern analysis results. Using packet trace-back one could attempt to trace back to the original source of the attack. Monitoring the origin of these packets would help filter them out in the event of unusually large volumes of traffic which attempts to bring the servers down. Event logs could be used for further analysis of the attack with a chronological account and an audit trail of all the events that occurred during the attack.


There is an inherent risk in outsourcing the implementation of an online system when military personnel would be the beneficiaries of it. As the government would have to ensure the safety and security of each and every military personal, the consulting firm would have to safeguard the privacy and hence the identities of its users from being compromised. Medical records contain sensitive personal data which needs to be protected at all costs. The mere fact that the system is accessible anywhere from the world is a security threat of such a system. Consultants if not provided with strict access control restrictions to live data could cause insurmountable losses by stealing sensitive data. While consultants are working on a military facility it gets harder to track their web browsing habits which would end up rendering the inside network exposed to other threats that include viruses, malware or suspicious email attachments not being filtered out.

Vulnerabilities of an online patient care system would be numerous if the system is proactively not built with security in mind. Like any online application, potential vulnerabilities would include security misconfigurations on the web or application servers, database servers and firewall. Most of this hardware when procured comes with default settings that would need to be re-configured so that it does not give the attacker a chance to hack into one of these systems without little to any effort. Other potential vulnerabilities include unencrypted transmission of data between systems. When dealing with patient records sensitive information like SSN numbers, credit card numbers, authentication credentials etc. could get transmitted without strong encryption algorithms being applied. An outsider could try to sniff this data using a tool and could thereby steal valuable information which could later lead to identity theft.

It is important to have the system thoroughly verified before it is deemed fit to move live. A third party audit of the system is a great way to uncover any hidden vulnerabilities. Penetration testing by an independent authority is another way of verifying how secure the underlying infrastructure really is and if it required any...

Other Essays Like Protecting Against Internet Activists

Is Any Form Of Internet Regulation Really Possible?

1620 words - 7 pages , abusers, terrorists and fraudsters.Since the Internet is a relatively new technology, the policing and relevant laws are not yet in force to protect those who need protecting. This piece will attempt to put forward arguments for and against regulation of the Internet and then conclude whether regulation is possible. There are many arguments against the regulation of the Internet which are quite persuasive.Since no one company actually owns the

Pro Gay Marriage Rights Essay

1546 words - 7 pages The exploration for gay marriages has been severe over time that it can only be liken to the movements that fought for civil right for the Americans long before the law stood in. It is sudden that in the quest for equal marriage rights, the gay rights activists happen to be few as they work their way out to the constitution. But their struggle is being supported by the public and bearing in mind that the political shift is also working to

Transnational Networks of Support for the Zapatista Rebellion

5256 words - 22 pages circulated via the Internet. The attribution of blame was made even more clear because the Zapatistas began their rebellion on the day that NAFTA came into force, lending symbolic weight to their claims. Indeed, “Coincidence with the inauguration of NAFTA immediately rallied progressives in many countries around the cause of the Zapatistas.” (Froehling 1999, 168) Activists who had just failed in their attempts to defeat NAFTA in the United States Senate

Intellectual Property In The Age Of The Internet

1787 words - 8 pages Copyright legislation and thus this essay will focus on it specifically. Copyrights are ìoriginal works of authorship in any tangible medium of expression, Öfrom which the work can be perceived, reproduced or otherwise communicated, either directly or withÖ aidî (Bird, p.86). Not only has its existence and understanding been heightened by the general public, but violations against it have ìincreased on the Internet as far as its use and what is

Internet Privacy Laws In China

2402 words - 10 pages . These types of directives allow law enforcement officials to use surveillance against more crimes of terror and has been updated the law to reflect new technologies and new threats [5]. Law officials may use email, internet site history and other means of tracking to be used to pursue suspects. Like Europe, the US does not aim to censor its constituents; rather use the Patriot Act as a tool to fight terrorism. This paper aims to provide


664 words - 3 pages the truth. "I'd bet there are a lot of career employees in the intelligence agencies who'll be glad to see Obama take the oath so they can finally speak out against all this illegal spying and get back to their real mission," says Caroline Fredrickson, the ACLU's Washington D.C. legislative director. New Yorker investigative reporter Seymour Hersh already has a slew of sources waiting to spill the Bush administration's darkest secrets, he

Nike Inc.: Developing an Effective Public Relations Strategy

1783 words - 8 pages . They made efforts to reach the mass media by buying full page ad’s in many of the nations newspapers, issuing press releases and press conferences to shed light on their efforts to abide by their code of conduct and posting the progress on improved labor conditions on their website. With the use of the Internet Nike was better able to defend themselves against the statements being made by their critics. The creation of their corporate website was

Context of the Problem

796 words - 4 pages believe that they have nothing to hide when they are registering with an Internet site or service, privacy on the Internet is about protecting one's personal information, even if the information does not seem, sensitive. The paper presents the risks associated with the open issues on data protection, such as vulnerabilities, security and privacy issues pertaining to cloud security. Analysis the method and model for rapid deployment of cloud

The Yes Men: A Case Study

1670 words - 7 pages deplorable actions. By spreading awareness and education in a humorous and satirical manner they are able to get through to a deeper audience then perhaps the typical activists against corporate globalization. The YM’s vision of course is to see a world of responsible corporations and governments who take a human and humane consideration in business practices. Like many other anti-corporate globalization groups they recognize an extreme divide

Social Media and Political Revolution

5235 words - 21 pages Revolution 10. Oksana Makar incident 11. President Yanukovych being ousted viii. 2009 Moldova ix. 2009 Iran “Twitter Uprising” x. 2010 Tunisia xi. 2011 Egypt “Facebook Revolution” xii. Lebanon, Syria, Libya lack of internet e. Critics of social media revolution xiii. Arguments against social media making a difference 12. Social media platforms

On the Offensive

1043 words - 5 pages Lewis, this was “a brilliant defensive move that is successful in reshaping the public debate and diluting criticism” (O'Connell, 2012). Working together with other countries will help reach a set of standards, making those who go against liable for their actions and therefore held responsible. Without co-operation there will never be a secure internet or a strict set of rules governing the use of the internet. It seems the U.S. are more

Related Papers

Descrimination On Blacks Essay

1829 words - 8 pages so repeatedly cut them down that most blacks were so far beaten into submission that hope for a better life seemed gone. The South could not stand having the government come and interfere in their affairs, and were willing to protest the government's decisions by not protecting activists. Then with the Montgomery bus boycott, all blacks finally had a cause to rally in support for. Rosa Parks sparked the beginning of the Civil Rights movement

Censorship And Internet Essay

938 words - 4 pages unpleasant material and prevent young people imitating negative behaviour. However, it is apparent that filtering the Internet is against the freedom of information, anti-educational and it is difficult to develop people’s ideas and views. This essay aims to discuss the issue of restricted information on the Internet. It will be argued that censorship of the Internet interferes with people having a broad range of ideas, views and experiences. It

Animal Rights Activism: A Domestic Terror Threat

2629 words - 11 pages researchers and their families at their own home. In the past the militants protested against the scientists who work with the intelligent species. Recently, animal rights activists are targeting researchers regardless of the species they are using for their research. This includes targeting those doing studies with fruit flies. These attacks, considered domestic terrorism and attempted homicide, should be a major wake up call. Congress has already

Discrimination Against The Lgbt Community In Malaysia

3824 words - 16 pages peaceful demonstrations (so-called “Blackout 505” rallies) to claim that thecoalition retained the power through alleged election fraudand multiple irregularities. On 18 May 2013, a crackdown started against civil society activists and political opponents who organized and took part in such rallies. Many of them were detained and charged under the Sedition Act . Some of the arrests involved among others Tian Chua, Vice-President of the Parti Keadilan