index_9
Auerbach Publications
© 2001 CRC Press LLC
08/01
ing site, layers of security could be implemented to reduce exposure.
Authentication, dial-back, time limitations, and access restrictions were
employed to increase control over the communication and decrease ex-
posure to threats. These protection suites were made possible primarily
because of the one-on-one aspect of the communication; once the con-
nection was established, it could be easily identified and controlled. As
far as the communication itself, it was relatively protected while travers-
ing the public phone system over dedicated circuits.
Because broadband technology can utilize Ethernet to allow connec-
tivity to the access device the computer simply has to be "on" for Internet
communications (see Exhibit 4). This represents a huge change from tra-
ditional modem access, where the computer was responsible for estab-
lishing and maintaining the connection. Currently, with typical
broadband the connection is sustained at the access device allowing In-
ternet connectivity, regardless of the state of other systems on the Ether-
net interface. The Ethernet interface on the computer does not require a
user to initialize it, know a phone number, or be concerned about the
connection. All these options are controlled by the operating system;
even the IP address is automatically assigned by the ISP, reducing the in-
teraction with the user even further. Now, the responsibility for Internet
EXHIBIT 4 Broadband Removed the User and System from the Es-
tablishment of the Connection
Modem
Cable/xDSL
Modem
Internet
ISP
(Cable/xDSL)
Phone
System
Ethernet
Crossover
Cable
TV Cable/Phone Line
Used for xDSL
Systems and Devices
Responsible for
Creating and Maintaining
the Connection
Phone Line
Internal
Modem
Serial Cable for
External Modems