¶ … computer systems are used, one has to delve a bit deeper into how those issues occur and what they mean for the people who use computers. Addressed here will be a critique of two articles addressing DNS attacks and network intrusion detection, in order to determine the severity of the issues these attacks are causing and what can be done in order to lessen the risks and protect the data of more individuals and companies.
Jackson, C., Barth, A., Bortz, A., Shao, W., & Boneh, D., (2009). Protecting browsers from DNS rebinding attacks. ACM Transactions on the Web, 3(1): 1-26.
Jackson, et al. (2009), provides information on the use of DNS rebinding attacks, which are generally unexpected by the users who experience them and can be very devastating. Many firewalls and other protection options do not work against DNS rebinding attacks, because the browser is fooled into thinking that the website it is being asked to access is safe from malicious software or other problems (Jackson, et al., 2009). The main goals of these DNS rebinding attacks are to defraud pay-per-click advertisers, get around personal and organizational firewalls, and send spam emails (Jackson, et al., 2009). One of the reasons these attacks are becoming so popular is that they cost very little to create. For around $100, the study found that 100,000 IP addresses could be hacked (Jackson, et al., 2009).
There are defenses to these attacks, however, including the classic "DNS pinning" and improvements made to it (Jackson, et al., 2009). Web servers, firewalls, and plug-ins are all vulnerable, and there are recommended changes that can be made to these in order to better protect them from DNS attacks (Jackson, et al., 2009). Many of the defenses suggested by the authors of the study have been used by open-source firewall implementers and vendors who provide plug-ins, so they can provide extra measures of safety.
Analysis
The main contributions and strengths of this article relate to the way the researchers provide information regarding not only what the issue is but how to correct the issue and reduce the risk to those who might otherwise be affected by it. It is one thing to discuss an issue and point out that there are problems, but it is a completely different thing to take those issues and show how they can be solved or at least mitigated (Dean, Felten, & Wallach, 1996). Addressing an issue and putting thought into how to solve it properly is far different -- and far more valuable -- than simply stating that one has discovered an issue that can and should be dealt with. Solutions are available for the majority of problems seen with computers and with other facets of life, but until solutions are provided and implemented, and until their value is truly shown, they remain only speculation and do not provide options for improvement.
There are weaknesses and limitations to every article, and this one is no exception. The main limitation of the study is that it focuses only on DNS attacks, and there are many other types of attacks that regularly occur on computers. While the article does help solve a problem, there is more that could be addressed and solved in order to make computing safer overall (Karlof, et al., 2007). The weaknesses seen in this article are not significant, really, based on what the authors are presenting. The suggestions they have made have already been implemented by a number of companies that provide plug-ins and other Web services, so the suggestions are acceptable and do work properly.
The improvements to the article that could be made would be an ease of readability. While this is a complex topic, the article is confusing for those who are not clear on what DNS attacks are or how computer information actually works. It would not be expected that all of that information would be provided by the authors because there would not be room for that in the study, but more "layman's terms" in the article would make it accessible and understandable to a larger number of readers who may have an interest in the subject but have not yet developed a high level of understanding regarding it.
The article compares well with other articles that have been read so far. It is explanatory and provides something of real value, which is not always seen in studies that simply address what the issue is but that do not provide information on how any of the problems can be corrected. At times it may not be possible to truly correct an issue, but there are usually at least options for mitigation that can be considered (Gajek, Schwenk, &...
Retrieved from http://books.google.co.ke/books?id=3Tla6d153uwC&printsec=frontcover&dq=Encyclopedia+of+computer+science+and+technology&hl=en&sa=X&ei=dZH_UNjcIcHQhAeRg4C4Bw&ved=0CCwQ6AEwAA Kizza, J.M. (2005). Computer Network Security. New York, NY: Springer. Retrieved from http://books.google.co.ke/books?id=HsawoKBLZOwC&printsec=frontcover&dq=Computer+Network+Security&hl=en&sa=X&ei=uZH_UJn-NMbNhAeWroDYCA&ved=0CCwQ6AEwAA#v=onepage&q=Computer%20Network%20Security&f=false Musumeci, G.-P. D., & Loukides, M. (2002). System performance tuning: [help for Unix system administrators]. Beijing [u.a.: O'Reilly. Retrieved from http://books.google.co.ke/books?id=L4oyNrsFBbsC&printsec=frontcover&dq=System+performance+tuning&hl=en&sa=X&ei=C5L_UKjmNonMhAen8ICoBw&ved=0CDIQ6AEwAA Adelstein, T., & Lubanovic, B. (2007). Linux system administration. Sebastopol, Calif: O'Reilly. Retrieved from http://books.google.co.ke/books?id=- jYe2k1p5tIC&printsec=frontcover&dq=Advanced+system+administration&hl=en&sa=X &ei=fpP_UM6EN8HMhAff9YC4DQ&ved=0CD0Q6AEwBA#v=onepage&q=Advanced %20system%20administration&f=false Verma, D.C. (2009). Principles of computer systems and network management. Dordrecht: Springer. Retrieved http://books.google.co.ke/books?id=dUiNGYCiWg0C&printsec=frontcover&dq=Principles+of+computer+systems+and+network+management&hl=en&sa=X&ei=i5T_UIG3IMaBhQfF2YD4Bg&ved=0CDQQ6AEwAA#v=onepage&q=Principles%20of%20computer%20systems%20and%20network%20management&f=false Whyte, E. (2004, Feb 09). Be a system
As with other information technology jobs, outsourcing of software development to other countries may temper somewhat employment growth of computer software engineers. Firms may look to cut costs by shifting operations to foreign countries with lower prevailing wages and highly educated workers. Jobs in software engineering are less prone to being off shored than are jobs in other computer specialties, however, because software engineering requires innovation and intense research
Visual Basic is an Event Driven language, which means that programs don't follow the sequential path of traditional languages such as Pascal. Instead bits and pieces of sequential code are associated with certain events such as the clicking of a button. Then when the program is run, events will occur in response to changes in the environment (such as the ticking of the computers internal clock) or by intervention from
Systems Media Table: Comparison System Uses Word processor The main purpose of this program is to construct sentences of the perceived information and manipulate paragraphs to form a word document. The program uses a display format 'what-you-see-is-what-you-get' to enhance the quality of the expected hardcopy. WordPerfect and Microsoft Word are mostly superseded by both organization and personal computers to perform functions such as word formatting, letter processing and some simple designing. Accordingly, it is the
Evolution of System Performance: RISC, pipelining, cache memory, virtual memory Historically, improvements in computer system performance have encompassed two distinct factors: improvements in speed and also improvements in the number of applications which can be run by the system. Of course, the two are interlinked given that high levels of speed are linked to expansions of short-term memory and the ability of computers to use that memory to perform critical functions. One
In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now