Preview

Internet Security Overview

Powerful Essays
Open Document
Open Document
9590 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Security Overview
Overview of Internet Security
As of 1996, the Internet connected an estimated 13 million computers in 195 countries on every continent, even Antarctica (1). The Internet is not a single network, but a worldwide collection of loosely connected networks that are accessible by individual computer hosts in a variety of ways, including gateways, routers, dial-up connections, and Internet service providers. The Internet is easily accessible to anyone with a computer and a network connection. Individuals and organizations worldwide can reach any point on the network without regard to national or geographic boundaries or time of day.
However, along with the convenience and easy access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the computer systems will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet. Intruders do not need to enter an office or home, and may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can create new electronic files, run their own programs, and hide evidence of their unauthorized activity.
Basic Security Concepts
Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.
When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the

You May Also Find These Documents Helpful

  • Better Essays

    The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password.…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    STurner Assignment Unit3

    • 560 Words
    • 3 Pages

    The Internet is a bunch of interconnected networks that encompass the globe, where routers and switches establish connections between them.…

    • 560 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    301

    • 483 Words
    • 2 Pages

    3. Electronic information: a lot of information is now being stored and transferred electronically this is via a computer, laptop, usb, pen drives. Its another secure way to store data as computers are protected with passwords and can only be accessed by authorised individuals. Data is also…

    • 483 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    I. There were two Great Awakenings in the U.S. The principal, which happened when the U.S. was as yet a settlement of Great Britain, occurred in the 1730s-1740s in New England. This development was a Puritan response to their observation that there was a decrease in confidence in the group, and it included their endeavor to recommit the group to the possibility of destiny (that individuals' confidence was in God's grasp and that they must be spared through their faith in God).…

    • 950 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Confidentiality H+S lvl 2

    • 3984 Words
    • 16 Pages

    Keep written and electronic information safely secured by ensuring personal information should not be left lying around for other clients or staff members to see.…

    • 3984 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    Physician Assisted Suicide

    • 1166 Words
    • 5 Pages

    Jennifer Fass is a clinical assistant professor and Andrea Fass pharmacy assistant professor. They open this paper with an eye catching statement, “The pharmacist on duty at a community pharmacy in Oregon receives a phone call from a local physician who says he intends to write a prescription for a lethal dose of secobarbital to end a patient’s life (Fass & Fass, 2011, p.846).” They review the Death with Dignity Act that was created in 2008. This states that a terminally ill patient with less than six months to live and 18 years or older has the right to request aid from a…

    • 1166 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Information is what keeps this seemingly chaotic world functioning systematically. Not so long ago, information was physically present, printed or written on papers. To convey important information or messages, we used letters that took some time to reach its destination. Once our civilization invented and learned how to use electricity to store and send information, we never stopped since. Most of our important information is now being created, stored and sent through vast network of information superhighways. Information security threats were present even before we went digital and information security threats pose much greater…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    General Security Policy

    • 4713 Words
    • 19 Pages

    It is the policy of ORGANIZATION XYZ that information, as defined hereinafter, in all its forms--written, spoken, recorded electronically or printed--will be protected from accidental or intentional unauthorized modification, destruction or disclosure throughout its life cycle. This protection includes an appropriate level of security over the equipment and software used to process, store, and transmit that information.…

    • 4713 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Internet Security

    • 267 Words
    • 2 Pages

    Internet and Security, two different words but they need each other for the same goal and that is PROTECTION. Security is often a term used to define protection in any occasion or any places or any materials in this modern world. The idea of having a security is to avoid threats from happening.…

    • 267 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.…

    • 3130 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    First, I want to describe who the subjects of the issue are. In my opinion, the issue is the most relevant for the private and commercial information. Home users risk their security while connected to Internet. It is obvious that many people store private information such as Social Security and credit card numbers, as it is more convenient than to enter them every time completing a form for an online purchase. Hackers do not have to attack every user individually, they write special viruses named "Worms" and "Trojan horses" which, once run, could spread in a global scale. These programs may have different functions from gathering personal data to logging pressed keys and e-mailing the information to a hacker. Even if a user does not keep any valuable information, his or her computer does have a value for a hacker. "If you think that your small computer could not become an object of offence because it is very small, then you are mistaken. Even if it doesn't contain anything worthwhile, it could be perfectly used for breaking in other, more significant system." (A. Zaharchenko, Futurology without future [Computerra], 2002).…

    • 1544 Words
    • 7 Pages
    Better Essays
  • Best Essays

    positive effects of internet

    • 3412 Words
    • 14 Pages

    1. is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW), the infrastructure to support email, and peer-to-peer networks.…

    • 3412 Words
    • 14 Pages
    Best Essays
  • Good Essays

    It may have been a phenomenon for the ancient generation but in the 21st century the computer is a very common thing. Everybody uses the computer for any and everything. One can virtually multi-task while using this machine. In today’s world the computer bears a number of effects on its users.…

    • 552 Words
    • 3 Pages
    Good Essays

Related Topics