[Tutor Name]
Answer 1: Cyber attacks as a result of today’s inadequate state of cyber security have resulted into significant financial losses for home users where they fail to maintain sufficient security systems on their computers. To combat such issues, Internet Service Providers has the ability of potentially improving the security of home users by detecting and quarantining customers whose machines house malware. ISPs will provide upgraded security software to users and educate them on why cyber security is crucial (Wood & Rowe). ISPs avoid malicious cyber activity and let users access the Internet enabling them to closely study the traffic flowing into and out of their personal networks, thereby helping them to identify traffic spikes of excessive malicious visitors (Anderson, 2008b).
Answer 2: Federal government needs to implement internet security technologies like RPKI, DNSSEC (DNS Security Extensions), and Secure BGP by introducing strict policies and clear guidelines to support and encourage the use of these cyber security technologies. The federal government relies extensively on the continual use of the Internet. Therefore their ISPs need to adopt the aforesaid technologies. The .gov DNS TLD can be secured using DNSSEC. Typical routing risks include poorly written software, malicious alterations to policy attributes, and policy configuration flaws (Clayton, 2010). Here, internet security techniques like the Resource Public Key Infrastructure can be employed to gain increased surety of address verification. With this, fraudulent misdirection of halting Internet traffic can be avoided by inclusion of an address verification method. To meet security requirements, for example, the U.S. National Security Agency has issued the specifications of Shipjack and KEA, the encryption algorithm and key management protocol respectively to secure the privacy of U.S government traffic (Anderson, 2008a).
Answer 3: To combat threats encountered by the critical function of the IT sector’s Internet Routing, organizations must opt for one of the following approaches:
Prevent the risk
Transfer the risk to some other sector or business entity
Reduce the severity of the risk by preventative action (Alaganandam et al, 2005).
The IT sectors are soft targets of viruses, spam ware, and malicious attacks, and may contribute to other threats to Internet Security. Risk mitigation approaches like address verification, diversification on infrastructure, secure routing protocols, route leak identification, etc. can be used in an organization’s IT department to ensure security and reliability of information protection (Eloff & Granova, 2009).
Anderson, R. (2008a). Telecom System Security. In Security engineering? A guide to
building dependable distributed systems (2nd ed.). New York, NY: John Wiley &
Sons Publishing, Inc.
Anderson, R. (2008b). Nuclear Command and Control. In Security engineering? A guide to
building dependable distributed systems (2nd ed.). New York, NY: John Wiley &
Sons Publishing, Inc.
Clayton, R. (2010). Might Governments Clean-up Malware?. Retrieved from
http://weis2010.econinfosec.org/papers/session4/weis2010_clayton.pdf
Eloff, J., & Granova, A. (2009). Information warfare. In Vacca, J. R. (Ed.), Computer and
information security handbook. Boston: Morgan Kaufmann Publishers.
Wood, D., & Rowe, B. (n.d.) Assessing Home Internet Users’ Demand for Security: Will
They Pay ISPs. Retrieved from
http://weis2011.econinfosec.org/papers/Assessing%20Home%20Internet%20Users%
20Demand%20for%20Security%20-%20Will%20T.pdf
Alaganandam, H., Anandam, P., Alsalam, J., Liu, Y., Mittal, P., Rodriguez-Vieitez, E., &
Voutilainen, S. (2005). Red Team Report. Retrieved from
http://www.cs.washington.edu/education/courses/csep590/05au/redteam/RedTeam1.p
df