Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You and Your Team.

Learn More →

Internet‐based security incidents and the potential for false alarms

Internet‐based security incidents and the potential for false alarms The paper explains the background to experimental work that was conducted with the aim of measuring aspects of the WWW (specifically the average lifetime of a web link and the impact of the “Millennium Bug”), but which inadvertently caused two perceived security breaches on remote systems. The paper explains the nature of these incidents and considers why, when over 700,000 IP addresses were randomly sampled in the experimental study, only two sites considered the activity to be an attempt to breach their security. It is concluded that, while the appropriate protection of Internet‐based systems is undoubtedly of importance, the problems experienced during the experimental study suggest a lack of uniformity in what different organisations will class as a security breach. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Internet Research Emerald Publishing

Internet‐based security incidents and the potential for false alarms

Internet Research , Volume 10 (3): 8 – Aug 1, 2000

Loading next page...
 
/lp/emerald-publishing/internet-based-security-incidents-and-the-potential-for-false-alarms-fPP9G1IvvU
Publisher
Emerald Publishing
Copyright
Copyright © 2000 MCB UP Ltd. All rights reserved.
ISSN
1066-2243
DOI
10.1108/10662240010331984
Publisher site
See Article on Publisher Site

Abstract

The paper explains the background to experimental work that was conducted with the aim of measuring aspects of the WWW (specifically the average lifetime of a web link and the impact of the “Millennium Bug”), but which inadvertently caused two perceived security breaches on remote systems. The paper explains the nature of these incidents and considers why, when over 700,000 IP addresses were randomly sampled in the experimental study, only two sites considered the activity to be an attempt to breach their security. It is concluded that, while the appropriate protection of Internet‐based systems is undoubtedly of importance, the problems experienced during the experimental study suggest a lack of uniformity in what different organisations will class as a security breach.

Journal

Internet ResearchEmerald Publishing

Published: Aug 1, 2000

Keywords: Computer security; Internet; WWW; Hacking

References