2.4 Ethics of Monitoring employees Internet use in the workplace20
2.5 Rights of employers to monitor employees in the workplace22
2.6 Types of monitoring24
2.7 Why Internet use monitoring in the workplace26
CHAPTER 328
3.1 What is Internet Usage Analysis?28
3.2 What is Internet usage monitoring32
3.3 Internet usage monitoring of employees in the workplace: Legal issues35
3.4 The Internet activities to be monitored - to include internet activities in the banking sector37
3.6 Deployment and evaluation of an Internet Usage mechnism40
CHAPTER 443
4.1 The Internet banking framework43
4.2 Steps in the framework process44
4.3 Security requirements for an Internet banking environment in general45
4.4 The Internet banking environment47
4.5 Description of the spheres48
4.6 Autonomous actions contained within the Internet banking transaction51
4.7 Security decision analysis52
CHAPTER 555
5.1 Case study55
5.2 Conclusion57
CHAPTER 659
6.1 Conclusion and Recommendations59
REFERENCES61
LIST OF TABLES68
Internet Security and Uses
Chapter one
1.1 Internet overview
A computer network is a group of computers that are linked together via assorted means (wires, phone lines, fiber optic, satellite, etc.) so that they can transfer information among themselves. The Internet is simply a network of networks. The Internet is currently composed of over 30,000 different networks, with close to 3,000,000 host computers connected to them and accessible by approximately 35 million people worldwide. The Internet is growing at the explosive rate of about 10 percent per month. The Internet is also a huge group of worldwide information resources, providing access to over 85 countries throughout the globe. Because it is so vast, there is no way in which one individual or even one organization could be responsible for the Internet. Therefore, the Internet depends on voluntary cooperation between the thousands of network administrators throughout the world to provide the rest of us with access to this network of tremendously varied resources.
The Internet began in the late 1960s as a result of the Cold War. The United States Department of Defense needed to minimize the vulnerability of several of its mainframe computer systems. So they connected four computers in California, Colorado, and Utah via phone lines and the Internet was born. In the early 1970s, the network (called ARPAnet at first, then MILnet) grew and connected many military and research institutions, and was managed by the Advanced Research Projects Agency (ARPA). In the 1980s, the National Science Foundation (NSF) set up a high-capacity data backbone network (NSFnet), which became the significant infrastructure for the Internet in the USA.
1.2 Internet Security overview
One of the biggest problems with data transfer in the early years was that computer networks had trouble communicating with other networks, because so many different types of system were used and because the systems used so many different (or no) standards or protocols. The problem was solved by ARPA in the 1970s through the development of the TCP/IP (transmission control protocol/Internet protocol) ...