By Topic

Internet security enters the Middle Ages

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Oppliger, R. ; Berne Univ., Switzerland

The Internet continues its triumphant advance. It is commonly seen as the first incarnation of an information superhighway, or a national information infrastructure (NII). Because the Internet is dynamic, it has already changed significantly. The initial, research-oriented Internet and its protocol suite were designed for a benign environment best described as collegial, where users and hosts were mutually trusting and interested in a free, open exchange of information. These days, the Internet environment is less collegial and trustworthy; it encompasses all the risks, dangerous situations, and human vices found in society as a whole. The Internet has just entered the Middle Ages. The simple security model of the Stone Age still works for single hosts and LANs. But it no longer works for WANs in general and the Internet in particular. As a first step, firewalls have been erected at the Internet gateways. Because they are capable of selectively dropping or forwarding IP datagrams, firewalls also restrict the connectivity of the Internet as a whole. The Internet's firewalls are thus comparable to the town walls and front gates of the Middle Ages. Screening routers correspond to general-purpose gates, while proxy servers and application-layer gateways correspond to specialized gates

Published in:

Computer  (Volume:28 ,  Issue: 10 )