Preview

Internet Security

Better Essays
Open Document
Open Document
1945 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Security
Internet Security

Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line, yet in actuality they are not. There are some very easy ways to protect the user from future problems. The Internet has brought many advantages to its users but has also created some major problems. Most people believe that they are anonymous when they are using the Internet. Because of this thinking, they are not careful with what they do and where they go when on the "net." Security is a major issue with the Internet because the general public now has access to it. When only the government and higher education had access, there was no worry about credit card numbers and other types of important data being taken. There are many advantages the Internet brings to its users, but there are also many problems with the Internet security, especially when dealing with personal security, business security, and the government involvement to protect the users.

The Internet is a new, barely regulated frontier, and there are many reasons to be concerned with security. The same features that make the Internet so appealing such as interactivity, versatile communication, and customizability also make it an ideal way for someone to keep a careful watch on the user without them being aware of it (Lemmons 1). It may not seem like it but it is completely possible to build a personal profile on someone just by tracking them in cyperspace. Every action a person does while logged onto the Internet is recorded somewhere (Boyan, Codel, and Parekh 3). An individual's personal security is the major issue surrounding the
Internet. If a person cannot be secure and have privacy on the Internet, the whole system will fail. According to the Center for Democracy and Technology
(CDT), any website can find out whose server and the location



Cited: January 26, 1997: 1-4. Methvin, David W. "Safety on the Net." Windows Magazine Online (1996): 1-9. November, 1995 Feature PC World Online November 1995 1-3.

You May Also Find These Documents Helpful

  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    How to reduce the attack surface with what hardening steps and network security management best practices, (100) 2) ensure secure authentication, authorization, and accounting, (100) and 3) prevent or respond to intrusions. (100)…

    • 310 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    With that being said, it is extremely crucial to protect personal information on the internet.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    from attacks like nine eleven by “strengthening” security controls such as monitoring emails and social media.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    The difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks due to centralization of resources. Brian Proffitt will argue in is IT World article [24], there are some serious limitations with cloud computing that is being blithely ignored such as bandwidth limitation, storage, and availability. Interviews conducted with colleagues that are experts in the Enterprise Systems network arena reveals that, the impact is all in planning before implementation, the selected architecture and the security policy. Findings in manuscripts and online libraries reflect that Cloud Computing is a technological revolution that provides computer resources as a service; offering flexible IT usage, computing efficiency through improved utilization and reduced administration and infrastructure costs. Users are not limited to applications confined to a computer, data stored to a hard drive, or bounded by the organization’s network. Also known as the sum of Software as a Service (SaaS) and Utility Computing, Cloud Computing is argued to be more efficient and scalable. My hope is to identify the common issues that face Cloud Computing in organizations that have implemented it, and find the answer or probable solutions.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Good Essays

    Information is what keeps this seemingly chaotic world functioning systematically. Not so long ago, information was physically present, printed or written on papers. To convey important information or messages, we used letters that took some time to reach its destination. Once our civilization invented and learned how to use electricity to store and send information, we never stopped since. Most of our important information is now being created, stored and sent through vast network of information superhighways. Information security threats were present even before we went digital and information security threats pose much greater…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    Is Your Information Safe?

    • 1575 Words
    • 7 Pages

    window to get into your house. He doesn't hold a gun to your head, nor does he…

    • 1575 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cyber Security

    • 635 Words
    • 3 Pages

    The Merriam-Webster’s Dictionary defines cyber security measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Most people think that hackers are just people that want to mess up your computer, but real hackers break into systems because they want to see what they can do, then they might leave a message on the victims computer, but that’s it. So, the computer security people protect from those other hackers that want to mess up peoples computers. The means we take can as individual to protect ourselves in the cyber world is be anyomous on websites, don’t post your personal information ,have virus protection install on your computer, get spy ware , get spam guard protect towards your email accounts, and have firewall software protection on your computer.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Best Essays

    During the past decade the technological advancements of the Internet has significantly changed the method of communications and access to information for millions of users worldwide. First developed as a secure communications mode for the military during the height of the cold war era, the Internet has become as commonplace for Americans as the telephone or automobile. Users, provided that they have the necessary computer hardware and browser application as well as a network connection to the Internet are able to access and exchange information at speeds measured in thousandths of a second. Each time a connection to the Internet is made, users risk compromising their privacy through many different channels, including Internet service providers,…

    • 3351 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Internet Privacy

    • 1952 Words
    • 8 Pages

    The concern about privacy on the Internet is increasingly becoming an issue of international dispute. ?Citizens are becoming concerned that the most intimate details of their daily lives are being monitored, searched and recorded.? (www.britannica.com) 81% of Net users are concerned about threats to their privacy while online. The greatest threat to privacy comes from the construction of e-commerce alone, and not from state agents. E-commerce is structured on the copy and trade of intimate personal information and therefore, a threat to privacy on the Internet.…

    • 1952 Words
    • 8 Pages
    Powerful Essays