The internet is an unavoidable infrastructure that can provide enormous benefits to the average person/organization. Unfortunately there are elements whose goal is to interfere with the smooth benefits of it to users for either mischief or criminal intent. This has spawned a bourgeoning industry that focuses on developing and deploying countermeasures to the products of hackers and other internet pirates.
Internet security is configured around several structural features that may be maintained by the user. This work will be focused on identifying all types of entry points into systems, determining the mode of attack, study tactics that can be used to foil such intrusions and fully identify requirements and protocols for effective use of countermeasures and the infrastructure needed for identifying attempted intrusion before it is fully developed.