Emerging Platforms for Internet Security, Capstone Project Example
Words: 1630Capstone Project
Evaluating Software Architectures and Emerging Platforms for Internet Security
Advancements in software architecture and emerging internet security platforms have opened up the technology and web services market to a wide range of possibilities that were not accessible prior to their implementation. A prime example of this can be seen with the advent of Virtual iD online security protocol, or computer forensic tools like Scapel. These innovations make the internet a safer place to handle business, but more importantly a safer place for individuals to share their live with the world.
Software architecture and security are two overlooked aspects of web and computing. The expansion of the e-commerce and web based services make it almost mandatory that individuals incorporate some form of advanced architectural software into their virtual infrastructure. “An architectural style, sometimes called an architectural pattern, is a set of principles—a coarse grained pattern that provides an abstract framework for a family of systems. An architectural style improves partitioning and promotes design reuse by providing solutions to frequently recurring problems.” Here the authors note that through the use of a specific software architecture, a track of performance can be kept, and improved upon. Likewise, there has been a prevailing threat in the technology world since the attacks of September 11th, 2001. The need for security has enhanced with the expansion of the internet, but many feel it has done even more so with advancements in the terrorist world. Weimann notes, “Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term “cyberterrorism.” The fear of random, violent victimization blends well with the distrust and outright fear of computer technology (Weimann, 2004).” This fear of what people are recognizing as cyber-terrorism creates a perfect market for software like Virtual iD, and many computer forensic applications like Scapel, that allow for advanced level of security.
Evaluation Data (research)
Virtual ID: Founded in 2012 by serial entrepreneur Marnus Broodryk, Virtual iD is a tool designed to secure access to personal information, but to also verify identity online.
Features Virtual iD is a tool designed to secure access to personal information, but to also verify identity online. Users can manage their personal information on a virtual Personal information is only mentioned once and from that initial registration, a unique Virtual iD code is generated. Once this number is generated, the user simply uses their Virtual iD to any participating service provider and once authorized by yourself the service provider can access all your information.
Usability What all this means for users is no more filling out forms. All forms will be predefined and printed out by services providers allowing for more transparency and security. When information is updated, it’s updated virtually across the board to all channels.
Impact This means faster and more accurate retrieval of data. Virtual iD is already a popular security protocol implemented in many government agencies around the world. Similar to Verisign, which was founded in 1995, as an RSA Security spinoff, Virtual iD originally started out by providing trust for the internet in the form of certificate authority (CA), with more than 3,000,000 certificates in authentication services.
Web Dynamics – Client/Server Architectural style
Features: The client/server architectural style is a distributed system style that separates the work done between a client, server and the network. . The most basic client/server systems function within a 2-Tier architectural style and provide a server application that can be accessed by numerous clients. .The main benefits of the client/server architectural style include the fact that, the client/server architectural style is perfect for server based applications. It supports a wide range of clients that create web-based applications run strictly through browsers, or those who implementing business processes through a shared cloud network . It is incredibly common for companies that develop online services for other companies, similar to WebDynamics, to follow in the same business model and utilize the advantage of a client/server architectural style. This is because it’s perfect for centralizing data storage, supporting management functions or devices, which are all needed for all corporations looking to conveniently upload and download needed data. This architectural software form does have its downsides. For example, closely combining application data with business logistics results in a 2-tier client/server system, that has very slow scalability with files and an overdependence on a central server. Many software engineers have worked towards designing 3 tier, or no-tier architectural style server/client systems which has significantly alleviated these issues.
Usability: Relevant services supported by WebDynamics and their Client/Server software style are digital strategy, design & creative, web & mobile development, e-commerce solutions, traffic generation, content production, hosting & infrastructure, campaign management. As noted by “client/server architecture indicated a graphical desktop UI application that communicated with a database server containing much of the business logic in the form of stored procedures, or with a dedicated file server (msdn.com, 2012.)” Client-Queue-Client systems. This is a communication tool that allows clients to interact with one another through a server based collaboration tool. Client Queue is a client server system software component is a very popular tool that allows clients to communicate with other clients through a server-based queue. “Clients can read data from a server that acts simply as a queue to store the data. This allows clients to distribute and synchronize files and information. This is known as a passive queuearchitecture.” Peer-to-Peer (P2P) applications. Developed from the Client-Queue-Client style, the P2P style lets clients switch roles by exchanging synchronize files across multiple clients. Application servers host applications and services that a thin client accesses through a browser. These systems tend to have advanced security, since all data is stored on the server instead of a single machine. Centralized data access. Since all data is centralized, access to data is far more easy to administer than with any other architectural style. Ease of maintenance. Because responsibilities are shared throughout multiple computing systems and data is distributed across more than one server, maintenance of the system is more convenient.
The impact WebDynamics has on the technology and web industries as a whole is massive. It is the same technology utilized by sites like Wikipedia and numerous other companies. The main reason its services as a provider of architectural Client/Server software is favored over many other brands and styles has to do with the speed and convenience it provides in comparison to other styles. “Today, some examples of the client/server architectural style include Web browser—based programs running on the Internet or an intranet; Microsoft Windows® operating system—based applications that access networked data services (msdn.com, 2012)” Client/server architectural style has established standard web protocol for how the relationship between a client and one or more servers is understood., When client initiate one or more requests, usually through the use of a graphical UI, clients no longer have to wait for replies from servers in the dark. Processing is handled more efficiently, but most importantly, There is server response information on hand for the user to confirm processes are active.
Scapel – Computer Forensic Tool
Scapel reads databases of NTFS files, header, footer, and files from FATx, ext2/3, or raw partitions. Scalpel is a computer forensic tool used specifically for data recovery after system crashes, or in the prevention of potential system crashes.
Scalpel is an open source carving utility. An example of this security tool would be the similar product Foremost. The main difference between Scapel computer forensics security software and foremost is that Scapel is actually faster. Scapel as a file recovery and digital forensics investigations tool is virtually unmatchable because due to functions help users recover files off an extended file system. The system is driven by a configuration file. Scalpel has max bound configurations and the applications and special file format specifications that allow for detailed data on extended file systems in ways that that most security systems are incapable.
Carving or un-deleting files is a complex process that Scapel simplifies. Scalpel does this through the use of header byte signatures and footer byte signatures. The tool also allows previews of files to make sure they render properly before they are carved. Due to these particular function The bulk of the computer forensic community view Scalpel as one of the most secure data recovery tools because of its safeguards against corrupt files. Often when a system crashes, it does so for a reason. Sometime retrieving files that were corrupted can cause more harm than good. Some specific feature include the ability to retrieve and scan files camera files associated with applications likeas Smart Media, CompactFlash, USB flash drives, hard disks and CD-ROM. Application driven data forensic tools have a wide range of selections and functionality. The user launches Scapel by opening the program and then exporting all of the files on a particular computer to a predefined folder. Unlike Scalpel, PhotoRec opens data on a massive scale and does not provide the same depth of selection for partition table types. Scapel rebuilds partition tables and restores file allocations across formatted partitions, and even allows users to recover deleted files.
In sum, the growing need for internet security is an urgent reality. Corporations looking to secure their systems from cyber-terrorist attacks or crashing due to computer overuse, or server overload, need experts in the field to manage systems on a hands on level, as well as to keep up with current trends in system problem solutions. In regards to security, innovations like Virtual ID, and Software architecture is also an aspect of system security and business technology that is growing ever more sophisticated.
Carvey, H. (2011). Windows forensic analysis dvd toolkit. Syngress.
Garland, D., & Shaw, M. (1994). Retrieved from http://www.cs.cmu.edu/afs/cs/project/vit/ftp/pdf/intro_softarch.pdf
msdn.com. (2012). Chapter 3: Architectural patterns and styles. Retrieved from http://msdn.microsoft.com/en-us/library/ee658117.aspx
Weimann, G., (2004). Cyberterrorism: How Real Is the Threat? United States Institute of Peace, December 2004
Time is precious
don’t waste it!