28.10.2016 Views

gender differential paper IJCRB

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ijcrb.webs.com<br />

INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS<br />

JUNE 2011<br />

VOL 3, NO 2<br />

to compromise the operating system. Higher up for example, in the pre‐render hooks<br />

browsers provide, significant amounts of code has already parsed the data in the<br />

document. The higher you are on the software stack the more abstraction exists and the<br />

more chance the layers under you may be compromised.<br />

4. Choice ‐ DPI can be deployed host‐based, on physical appliances, or using new options<br />

like cloud‐based security as a service, third party vSwitches or Hypervisor introspection<br />

APIs. Because all of the traffic is based on standards (defacto or otherwise) consumers<br />

can mix and match vendors and control types without difficulty.<br />

5. Layers ‐ DPI can be applied cleanly as a serial chain of filters. Traditionally a network<br />

starts with a Firewall, behind which any number of components are deployed (IDS/IPS,<br />

Web Proxy, Network Anti‐Virus, Anti‐Spam). These layers form a funnel of traffic<br />

without having to be aware of each other.<br />

As a technology DPI should not be condemned for how it may be used; DPI itself is not<br />

inherently good or evil. Until there are alternative means of policing information exchange with<br />

these positive attributes, DPI will continue to be a necessary and useful technology.<br />

Conclusion:<br />

Productivity is an important issue in todays competitive and complex environment. internet<br />

misbehaviour represents a very new and ongoing challenge for the contemporary scholar or<br />

practitioner. many companies have corporate policies to deter the internet abuse, many users are<br />

addicted to internet activities and have little control of not using internet activities in the<br />

workplace.<br />

DPI as a short definition is a way for networks and third parties to determine what information<br />

users are surfing for on the web. But according to Markey who is the chairman of house<br />

telecommunication and internet subcommittee, the internet is like a delivery service and when<br />

DPI is abused is like a post office inspecting mail and even altering it.<br />

Despite of disadvantages of DPI when it is used to manage traffic , root out viruses and for some<br />

law-enforcement purposes and also controling the staffs and end users for misuse of internet we<br />

can see its efficiency.<br />

Deep Packet Inspection (and filtering) enables advanced security functions as well as internet<br />

data mining, eavesdropping, and censorship. Advocates of net neutrality fear that DPI<br />

technology will be used to reduce the openness of the Internet. DPI is currently being used by the<br />

enterprise, service providers and governments in a wide range of applications.<br />

COPY RIGHT © 2011 Institute of Interdisciplinary Business Research 582

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!