scispace - formally typeset
Search or ask a question
Topic

Internet security

About: Internet security is a research topic. Over the lifetime, 5375 publications have been published within this topic receiving 112993 citations. The topic is also known as: operation security.


Papers
More filters
Journal ArticleDOI
TL;DR: The creation of a scale to measure perceived Web security is described and the favorable psychometric properties of the scale are indicated, and the causal analysis indicates that security is a greater influence on intent to purchase using the Web than is the ease and utility of purchasing products.
Abstract: While Web‐based consumer activity is poised on the brink of dramatic growth, concerns about security have the potential to limit this growth by arousing shopper’s concerns about the Web‐based channel. One key aspect to consumer participation in Web commerce may be the extent to which they perceive risk to their sensitive information. This study describes the creation of a scale to measure perceived Web security. We apply the scale in a causal model to investigate the relative impact of beliefs about Web shopping on intent to purchase products using the World Wide Web. Data from two samples is used to develop the scale and to perform the causal analysis. Our findings indicate the favorable psychometric properties of the scale, and the causal analysis from our sample indicates that security is a greater influence on intent to purchase using the Web than is the ease and utility of purchasing products.

591 citations

Book
11 Sep 1995
TL;DR: Building Internet Firewalls is a practical guide to building firewalls on the Internet and describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site.
Abstract: From the Publisher: More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from RD all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendices consisting of a resource summary, a directory of how to find firewall toolkits and other security-related tools, and a detailed summary providing TCP/IP background information.

568 citations

Proceedings ArticleDOI
17 Nov 2014
TL;DR: This paper begins with general information security background of IoT and continues on with information security related challenges that IoT will encountered and points out research directions that could be the future work for the solutions to the security challenges that Internet of Things encounters.
Abstract: The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private information, preserving information security on the shared data is an important issue that cannot be neglected. In this paper, we begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters.

567 citations

Journal ArticleDOI
TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
Abstract: Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a transformative approach for providing numerous services. Compact smart devices constitute an essential part of IoT. They range widely in use, size, energy capacity, and computation power. However, the integration of these smart things into the standard Internet introduces several security challenges because the majority of Internet technologies and communication protocols were not designed to support IoT. Moreover, commercialization of IoT has led to public security concerns, including personal privacy issues, threat of cyber attacks, and organized crime. In order to provide a guideline for those who want to investigate IoT security and contribute to its improvement, this survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing. To achieve this goal, we first briefly describe three widely-known IoT reference models and define security in the context of IoT. Second, we discuss the possible applications of IoT and potential motivations of the attackers who target this new paradigm. Third, we discuss different attacks and threats. Fourth, we describe possible countermeasures against these attacks. Finally, we introduce two emerging security challenges not yet explained in detail in previous literature.

547 citations

Patent
24 Mar 2005
TL;DR: The Shared Internet Storage Resource (SISR) as mentioned in this paper provides Internet-based file storage, retrieval, access, control, and manipulation for a user by providing an easy-to-use user interface.
Abstract: The Shared Internet Storage Resource provides Internet-based file storage, retrieval, access, control, and manipulation for a user. Additionally, an easy-to-use user interface is provided both for a browser or stand-alone application. The entire method provides means by which users can establish, use, and maintain files on the Internet in a manner remote from their local computers yet in a manner that is similar to the file manipulation used on their local computers. A high capacity or other storage system is attached to the Internet via an optional internal network that also serves to generate and direct metadata regarding the stored files. A web server using a CGI, Java®-based, or other interface transmits and retrieves TCP/IP packets or other Internet information through a load balancer/firewall by using XML to wrap the data packets. File instructions may be transmitted over the Internet to the Shared Resource System. The user's account may be password protected so that only the user may access his or her files. On the user's side, a stand-alone client application or JavaScript object interpreted through a browser provide two means by which the XML or other markup language data stream may be received and put to use by the user. Internet-to-Internet file transfers may be effected by directly downloading to the user's account space.

539 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
The Internet
213.2K papers, 3.8M citations
84% related
Network packet
159.7K papers, 2.2M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202314
202233
2021144
2020180
2019183
2018185