Internet use is a resultant effect of digitization. The major technologies that have results from internet use are hypersonic and air-breathing engine technologies. Over the years, there has been an increase in the use of internet for individuals and corporate prompting the need of internet security. The main method that is used in handling of issues associated to internet security is the development of firewalls. Firewalls ensure that any potential alien is blocked from causing any detrimental harm to the computer system. Other internet security options include virus protection, file backups and identify theft protection. The major limitation that the project faces is the ability to set security measures on the internet protocols owing to the risks such as session hijacking, IP spoofs and packet sniffing
. The commonly used technologies include hypersonic flight, rocket engine technology, technology of turbojet engine, ramjet engines and Scramjet technology. The use of the technologies is mainly manifest in the hypersonic research programs. The two main organizations that implement the hypersonic research program are the national aeronautics and space administration and The Defense Advanced Research Project Agency.
Outline
Title: Internet Security
Abstract
Introduction
Background
Purpose and audience
Method
Limitation
Scope
Commonly used technology
Hypersonic flight
Rocket engine technology
The technology of turbojet engine
Ramjet engines and the technology in use
Scramjet technology
Scramjet technology
How Scramjet technology works
Scramjet combustion
Reasons for using scramjet technology
Hypersonic research programs
The national aeronautics and space administration
The Defense Advanced Research Project Agency
Conclusion
Recommendations
INTRODUCTION
Technology and the digital world, in particular, are rapidly changing. The changes in technology bring with them new opportunities. However, by using this new technology, one can expose themselves and others to a vast range of risks. The problem comes in because not everybody using the new technology is aware of the risks and how to assess it (Schoniregun, 2002). This scenario applies mostly to people working in environments with a high scale of censorship although it also applies to those in states with relatively low levels of censorship or uncensored. Safe digital communication has therefore become a subject of interest to most people in recent times.
1.1 Background
The internet is a compound and dynamic aspect in regarding the topology as well as an emerging trend in communication technology. Being dynamic means that the measures applied to secure small and rigid networks may not work for the internet efficiently. Ignorance and lack of necessary information is one of the leading causes of internet insecurity, for example, improper programming. Technology keeps on changing. The security solutions offered today may not be effective tomorrow since the changes in technology bring about new risks and challenges. Also, the postulated solutions must be combined to be effective in fighting internet insecurity. The measures given should also be consistently scrutinized to ensure that they are effectively offering the needed solutions (Summers &Kurzban, 1988). This paper aims at looking at internet security and the different methods used. It does this by analyzing collected data.
1.2 Purpose and audience
Internet security is a common concern for every internet user and the administrators of the system. The use of internet has become a widespread phenomenon in the current world. Anyone who has access to the internet is an audience to this topic. Whether to safeguard confidential information in personal files, keep unauthorized individuals from accessing computer systems, have control measures in the access of extranet or intranet or to conduct business on the internet requires one to understand the level of security needed and how to put the required measures in place. The increase in the threats facing Internet security is a major barrier to the use of the Internet for business transactions (Preetham, 2002). The Internet is crucial in connecting businesses with their client. The fear of Internet insecurity is, however, a major threat to this scenario. It is, therefore, imperative for every individual using the Internet to understand the concept of Internet security and all that comes with it. This way these individuals can assess the risks and deal with them before they cause any harm.
1.3 Method
The continued use, the rapid growth of the internet and the increase in the number of people using the internet has led to the increase in the interest in internet security. The growth in interest is in accompaniment of an increase in the demand for the same. Internet security breaches often occur especially for large businesses using the internet in its business interactions. Procedures are there to handle the internet security issues. Firewall is the most common method and one that is often considered a synonym for Internet security. Firewalls have been in existence for a long time, and most enterprises use them to protect their entire internet network (Summers &Kurzban, 1988). Internet firewalls, however, cannot protect against all the internet threats. They can be very effective especially if set up and used by specialists who understand how they work.
Other Internet security methods include virus protection, file backups, and identity theft protection. An anti-virus is very crucial in protecting the individual information kept on the computer. An anti-virus is made up of two parts, a scanner and a firewall with the firewall protecting the system while online. It identifies threats and informs the internet user. The scanner helps in identifying threats in case any malicious threat finds its way into the computer system. Some Internet threats, for example, viruses are meant to steal information while others destroy I (Kent, 1994)t. It is imperative that one has a backup at all times to ensure that in case the computer malfunctions then data will always be safe. Identity theft protection is crucial in online security strategies. This security method protects individuals from identity theft that has become a common fraud. It does so by monitoring the web to ensure the protection of a person's information.
1.4 Limitations
The Internet protocol that forms the foundation for the internet today came into existence in the beginning of the 1980's. At this time, the Internet network was small and the users trustworthy. The IP, therefore, does not have even the most basic means of security that is encryption. This scenario makes the internet vulnerable to a security breach. This aspect makes the internet susceptible to security risks such as session hijacking, IP spoofs and packet sniffing.
1.5 Scope
The main aim of establishing the internet was to enhance universal cohesion by improving the accessibility of individuals by improving their communication. It does this by helping with the exchange of information between servers. Security threats have however negatively influencing this by overloading the servers through the creation of Internet traffic. Strategies are in a formulation to deal with such issues and come up with strategies for dealing with then.
2.0 COLLECTED DATA
Commonly used technology
2.1 Hypersonic flight
Hypersonic flight is among the best five most innovative technologies that are expected to change the Air Force. The most outstanding characteristics of this flight are responsiveness and speed. The target is to harness this technology and use in missiles and later on aircrafts. The Air Force also plans to manufacture hypersonic vehicles eventually which would be powered by SABRE. Just as the name suggests, hypersonic flights travel at a speed fast enough to go across the continental US in 30 minutes (Schwetje&Walsh, 1989). The technology is believed to be beneficial to the Air Force in the sense that if offers sustainability and allows them to hit targets that are time-sensitive. The hypersonic technology will eventually get rid of the lag and reduce the time to a call for a launch and the time it takes to reach the target.
2.2 Rocket engine technology
The rocket engine technology has a speed of up to five times that of sound. The SABRE rocket engine uses a technology where ultra-lightweight exchangers bring a cooling effect on the system as it moves at supersonic speed. This engine uses the oxygen in the atmosphere for propulsion purposes. Its design counteracts the requirement for fuel to be set aside on board and this decreases the weight of the machine. The rocket engine technology also allows the machine to change to a rocket mode allowing an increase in speed approximately twenty-five times higher than the speed of sound.
2.3 The technology of turbojet engine
The turbojet technology is popular for its high-performance although it is a characteristic of bad fuel efficiency. The high-performance is as a result of a high-pressure engine. Due to their high consumption of fuel, the engines are being replaced with turboprops engines as these consume less fuel in comparison to the turbojet. The turbojet engines are of use in aircraft and few cases to power vehicles (Schwetje& Walsh, 1989). This engine technology came into existence with the aim of easing the flying process. With the rapid changes in technology new jet engines are being manufactured using technologies such as 3-D printing of cooling components and very strong matrix composites. Such improvements make the engine more effective.
2.4 Ramjet engines and the technology in use
Ramjet technology is a component of steady state combustion engines which is a constituent of the air-breathing engine. The engine compresses air moving at supersonic speed through short waves. This air then comes into contact with fuel that is then ignited to come up with enough pressure and temperature degrees to cause combustion. The products affected by this combustion expand through the nozzle giving the engine the required pressure and heat for combustion. Ramjets have been known to move with a supersonic speed that can go up to Mach 6. It does this without working fractions since when it gets to supersonic speed the turbines and compressors are no longer essential.
2.5 Scramjet technology
Rocketing through the atmosphere guzzling oxygen and changing it into the fuel used by the jet or aircraft is the concept behind the scramjet technology.
2.6 How does it work?
Scramjet technology aims at reducing weight. The fuel used by aircrafts and rockets need oxygen to combust. As the aircraft goes to higher altitudes, however, there is a scarcity of oxygen. This scarcity means that the aircraft needs to have its supply of oxygen. In this regard, aircrafts are forced to carry their oxygen to help in the combustion process, and this increases the weight of the aircraft (Verma, 2010).
Scramjet technology focuses on getting rid of the necessity to carry its oxygen supply. To make up for this deficiency, an aircraft with scramjet gulps up oxygen from the atmosphere as it goes up, slows it down, compresses it and uses it for combustion.
2.7 Scramjet Combustion
The concept of supersonic combustion is a complex concept. It is also very hard to maintain and sustain it. It is affected by factors such as temperature, steam velocity, pressure, and ratios. The major limiting factor for scramjet technology is the delay occurring when mixing the fuel and air. If the mixing of the fuel with the air is not effective, then combustion will not take place even if all the other factors are available and in the right proportions. Another problem is that of fuel injection. This scenario is as a result of compressibility effects and the high levels of pressure and speed. Better methods of injection have however been designed to overcome this deficiency.
2.8 Why use scramjet technology?
The scramjet technology is common in the Air Force. It can common in missile launching. Its supersonic speed will allow it to travel fast enough to evade any countermeasures. Their speed also allows them to travel to any destination in the globe (Verma, 2010). Scramjet technology is a cornerstone of the national security of the state that owns it. Scramjet engines are in use in hypersonic spy aircrafts. The technology will be very useful in coming up with space vehicles and missiles.
2.9 Hypersonic research programs
2.9.1 The National Aeronautics and Space Administration (NASA)
This organization is the US agency that deals with the research involving space programs, aerospace, and aeronautics. NASA was born in 1958 with the aim of promoting peaceful applications in aerospace science. NASA has been on the frontline in leading the space exploration initiatives. Some of its successful projects include the moon-landing mission and the space shuttle (Gyekenyesi, 2011).
NASA in the recent past has concentrated on hypersonic research programs. The main initiative program is to deal with the challenges facing the air-breathing flight. This program focuses on jet engines such as scramjet engines and tries to make it more effective.
2.9.2 The Defense Advanced Research Project Agency
DARPA is a research agency that is a branch of the U.S defense department. It was among the leading agencies that gave funds for the designing and establishment of the internet. It came into existence in 1958 in response to the successful creation of the Sputnik. Its impetus is thinking independently besides the rest of the military and to always offer solutions to defense challenges facing the state (Berger &Rumpe, 2008). DARPA is popular for some of the globes' most important technological innovations. It has been at the center of inventions, for instance, the internet and GPS. It is an agency that never stops but which is always coming up with new technologies whether intelligence or military to match with the changing times.
3.0 CONCLUSION
3.1 Summary
Digitalization brought in the issue of the internet. Since the birth of the Internet however, the issue of Internet security has been widespread. Measures have been put in place to improve internet security. For these campaigns to be effective, the internet users must have the required knowledge relating to internet security (Preetham, 2002). This event will make it easy for them to assess the risks and ultimately take the needed measures to deal with these risks.
The hypersonic technology has become very common in the recent past due to innovations in technology. Research agencies have been set up me an effort to come up with the best technology. The air-breathing engine technology popular because it offers speed that is essential in national defense States are in this regard investing in these programs.
3.2 Recommendations
Due to the rapid changes in technology, there have been changes regarding measures put in place to improve internet security. I would highly recommend quantum encryption as a means of internet security (Preetham, 2002). This concept is a physics principle that encrypts a message making it unreadable to other people apart from the sender and the receiver. The government should invest in laws that protect the internet from cyber-crimes and hacking. This initiative will instill fear in cyber criminals who breach internet security. To sum it up, the proper use of internet security strategies will come very handy in preventing cyber-crimes and in enhancing internet security.
Hypersonic technology is one of the innovations that will have a life-changing effect on the defense system of the states that have the technology. I highly would encourage states that have not yet tapped into the hypersonic innovation to vent in and invest. More research into the program will come very handy in coming up with better innovations that match the changing times.
References
Berger, C., &Rumpe, B. (2008) Autonomies Fahren รข€“Erkenntnisseaus der DARPA Urban Challenge (Autonomous Driving
Insights from the DARPA Urban Challenge) ItGyekenyesi, J. (2011). Potential Composite Structures for NASA Future Launch Vehicles and Crew Spacecraft AMR, 410, 17-17.
Kent, S. (1994). Internet security standards: past, present, and future. Standard view, 2(2), 78-85
Preetham, V. (2002) Internet security and firewalls Cincinnati, Ohio: Premier Press.
Schwetje, F., & Walsh, D. (1989) Hypersonic flight: the need for a new legal regime IEEE Aerospace and Electronic Systems Magazine, 4(5), 32-36
Thanks for post the article and this article very help full for me and its help to installed cyber security and avast antivirus on my Laptop and PC again thanks so much
ReplyDelete