Internet Security is the most important aspect of information technology. It has been years since computer has been invented and to keep the information confidential we have to safeguard this information. The importance of integrating security measures into systems development. Every business has their own security systems to reach their goals of information security. The computer world created security systems in order to reduce risk, maintain confidentiality, ensure the reliability of data resources, and compliance with national security laws and privacy policies and laws.
There are several types of standards when integrating security measures into new systems. Some companies developed their own application that has their own standards; others usually follow well-established national or international standards especially if the systems they developed are to be used by government agencies or contractors. Two major standards developed by the United States government and the other by the International Standard Organization. The U.S. used of the information security standard not only for businesses but also for our homeland security. Ever since the September 11 incident we have developed a tighter security for every branch of the government. The new standard is being used most especially for our military from the Internet worldwide and others has to follow. The most important one is the issuance of immigration visas. Our land, air and water transportation has been the first one to put this into action and intelligence officer’s tract criminal’s activities through these measures. These are the Standards from the Orange Book: Trusted Computer System Evaluation Criteria (TSEC) is well – known for this book was published by the National Computer Security Center (NCSC), an arm of the U.S. Department of Defense (DOD). This is known as The Orange Book because of the color of its cover. This was written for military use only, but now the Information Industry uses it. It defines security four security levels, from minimal protection called Decision D, to ultra security called Decision A.
The four DOD standards:
1. Decision A: Verify Protection
2. Decision B: Mandatory Protection
3. Decision C: Discretionary Protection
4. Decision D: Minimal Protection or no Protection.
Japan developed JR East Japan Information Systems Company. JEIS plans upgrade to Windows Server 2003 for Increased Security, Manageability, and Performance. In order to maintain a competitive advantage over the Information Technology (IT) companies, JEIS focuses on constantly implementing the most advanced technology available. They are looking to increase the performance of its web server, reduce replication traffic between each domain controller, increase bandwidth between some branch office that only have a 128-kps frame relay connection, create a virtual private...