Preview

Internet Security

Good Essays
Open Document
Open Document
474 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Security
Research Problem: Internet security and privacy, what you can do to make it more efficient, and what software you can buy to protect yourself.

Research Question: What is Internet security and privacy and what we can do protect ourselves?

If you have access to a computer and a modem, you are licensed to drive on the information superhighway. And you are one of a growing number of online participants. The Internet offers many benefits. Web sites provide a vast world of information, entertainment, and shopping at our fingertips. Electronic mail, instant messaging, and chat rooms enable us to communicate with friends, family, and strangers in ways we never dreamed of a decade ago. But the Internet also creates many threats to our personal privacy. Unless you know the "rules of the road," your online activity may lead to significant privacy problems (Internet Security Systems, 2005). According to The Business Technology Network, internet privacy is the degree to which an individual can determine which personal information is to be shared with whom and for what purpose. To ensure this, there are many software programs that will guard your computer 24 hours a day, 7 days a week. For example, one of the most respected software programs is the new Norton Internet Security 2005(Schweitzer, 2002). This bundle includes anti-virus, personal firewall, parental control, and outbreak alert features. It is the most innovative and powerful software on the market. Internet Security as defined by the International Engineering Consortium is the process of preventing and detecting unauthorized use of your computer (Fogile & Peikari, 2004). Prevention measures help you to stop unauthorized users (also known as "hackers") from accessing any part of your computer system (Gralla, 2002). Unfortunately, hackers are always discovering new vulnerabilities to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of



Cited: Fogile, S., & Peikari, C. (2004). Window Internet Securities. Washington: Prentice Hall Gralla, P. (2002). The Complete Idiots Guide to Internet Security and Privacy. New York: Person Education Holden, G. (2004). Norton Internet Security for Dummies. Indiana: Wiley Publishing Internet Security Systems. (September 2005). Retrieved September 18, 2005 from http://www.iss.net Schweitzer, D. (2002). Internet Security Made Easy. New York: Douglas Schweitzer Publishing. The Business Technology Network. (2005). Retrieved September 29, 2005 from http://www.webtech.com The Center of Internet Security. (July 26, 2004). Retrieved September 21, 2005 from http://www.cisecurity.org

You May Also Find These Documents Helpful

  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In today’s society, technology has made countless advances skyrocketing towards the future. Thus the arguments about whether or not security is needed for this amount of power. There are many good aspects of the internet; including social media, messaging, games, and even dating. But, with these things, comes bad that we don't know much about; including catfishing, tracking, and also spying. With the click a button, everything done online can be seen by anyone.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The article starts with several examples of what can actually happen to Internet users when somebody gets free access to private information in their computers and also how unprotected children are when using free Internet programs. Those examples are crucial for the readers' understanding of the importance of a regulation in dealing with web sites, and they leave an opening for the subject to be exposed by the writer.…

    • 905 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Better Essays

    In today’s electronic age, many employers are faced daunting task of making a legal call when determining if monitoring employee behavior is appropriate at all times. In essence, “Little Brother” is always watching. According to Schulman (2013), Little Brother represents the tremendous capabilities technology as provided for employers to keep track of what their work force is up to. Several programs are available that search e-mails, as well as software to block objectionable websites. The most brazen of manager and supervisors can simply go enter your hard drive and review one’s cookies and history, as well as access any employee’s company e-mail. As much as an employee deletes his/her history, or sends unwanted emails to the recycle bin, much of this information still exists on the company server, and many corporations are willing to pay computer consultants to unearth any desired information.…

    • 1036 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Anyone who uses computer technology today accepts the fact that their Personally Identifiable Information (PII) may or could be transmitted, collected, and used to benefit the one who receives that information. It is our responsibility to know what PII transmissions are being made available for public use over the web. Understanding all the aspects of PII and the approaches that are to be taken to protect our privacy will make us more aware of PII. As we continue to utilize the technology available, we expose ourselves to become donors of PII. Having knowledge of what PII is and how information is being compiled to identify our interest is necessary when accessing computer technology of today.…

    • 1078 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Historically, information technology has had only basic security at best and highly vulnerable to attacks. In an effort to ward off cyber threats and capitalize from it, computer security companies began to market a wide range of services and products to prevent sabotage and unauthorized computer use. These security applications include virus detection and removal software, firewall support, encryption software, intrusion detection and analysis software, security consulting services, and even devices for user authentication (Gale, 2011).…

    • 2770 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Project

    • 1487 Words
    • 6 Pages

    The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect national security and business information. Therefore, IT…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    In this information age Internet security is a vital part of people’s lives. Some people do not understand or have the education to comprehend how important privacy and Internet security is.…

    • 550 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Internet Privacy

    • 1330 Words
    • 6 Pages

    Many people use the Internet daily for work, communication, and personal reasons. There is a sense of false security for individuals on the Internet. Information is being sent globally in a matter of seconds, so how can you believe that your information is safe? Why would you want to put any information on the Internet at all? Knowing simple facts, like which activities reveal personal information, how others get information, and ways to safeguard privacy, may help average computer users stay safe and help keep personal information private.…

    • 1330 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Internet Dangers

    • 460 Words
    • 2 Pages

    In this time and era, internet is the most important device in our lives. It provides us with helpful information, keeps us up to date with the latest news, and answers every question we could possibly think of. This usually gives us an unrealistic perception that everything on the internet is true, even though anyone from any country or city or state can say whatever they please, and still make that information sound as if it is straight from a professor. People can do anything imaginable on the internet, which gives the wrong people the power to manipulate innocent victims. Now, this kind of power and anonymity has huge potential in destroying your reputation, giving you viruses, and attaining identity theft.…

    • 460 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the context of computer security the user, hardware and data may face threats at any time and we must take proper countermeasures to deal with such threats.…

    • 1208 Words
    • 5 Pages
    Good Essays