Problem of Information Security Traffic on Internet
AbstractInternet information traffic becomes greater and moreimportant. With increasing growth of information importancerequirement for its security becomes indispensable. Theinformation security problem especially affect large and smallcompanies whose prosperity is depending on Internet presence.This affecting the three areas of Internet commerce: credit cardtransactions, virtual private networks and digital certification.To ensure information traffic it is necessary to find a solution,in a proper way, for three major problems: frontier problem,market problem and government problem. While the eventualemergence of security standards for Internet transactions isexpected, it will not automatically result in secure Internettransactions. In future, there is a wealth of security issues thatwill continue to require attention: internal security, continuedhacking, social engineering, malicious code, reliability andperformance, skills shortages and denial of se1vice attacks.
NCSA Firewall Policy Guide, www.ncsa.com.
Infosecurity News, Jan/Feb 1996, v7 n1, p.24.
Network Wizards, Internet Domain Survey, July 1995,
Steve Higgins, PC Week, Feb 8, 1993, vlO n5, pl.
For extensive libraries on ITAR see:
Bruce Schneier, Applied Cryptography, 2nd edition,
John Wiley & Sons, 1995.
Matt Blaze, Wbitfield, Ronald L. Rivest, Bruce
Schneier, Tsutomu Shimomura, Eric Thompson, Michael
Wiener, Minimal Key Lengths for Symmetric Ciphers
to Provide Adequate Commercial Security, A Report
by an Ad Hoc Group of Cryptographers and Computer
Scientists, January 1996,
NCSA NEWS, March, 1996.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).