2Security Weaknesses

2.1. Introduction

TCP/IP is the default norm that appeared as a normalization of something that already existed, ARPA-Net, without any modification or consideration of numerous points, and in this case, security measures.

Moreover, given both its simplicity and the exponential development of the Internet, TCP/IP was most frequently used and established itself as the norm. Indeed, it is rare or even impossible for a computer engineer to find a norm other than TCP/IP.

The history of TCP/IP is that of the Internet or even of its ancestor, ARPANet. The Internet, however, due to its history and the circumstances of its appearance, became the distributed solution. We speak of “intelligence at the limits”, and this is the principal reason behind all of the weaknesses discussed, given that advanced and complex functions are made available to the final user.

The use of TCP/IP locally (Intranet) presents the same security weaknesses, or even more serious ones, given the restricted size and ease of information sharing.

The considerable progress made in the field of computer engineering facilitated the appearance of malicious programs, or malware, and intrusion tools that allow information to be destroyed, configurations to be modified, the system to be put out of order, etc., whether directly or indirectly, by facilitating access to a computer or even by diminishing its resources.

The physical and non-physical destruction caused by malware is always increasing, presenting ...

Get Computer Science Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.