Preview

Term Paper

Powerful Essays
Open Document
Open Document
1470 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Term Paper
Internet Security
Embry-Riddle Aeronautical University
Table of Contents TOC \o "1-3" \h \z \u Abstract PAGEREF _Toc368496881 \h 3Discussion PAGEREF _Toc368496882 \h 4Background PAGEREF _Toc368496883 \h 4Analysis PAGEREF _Toc368496884 \h 5Conclusion PAGEREF _Toc368496885 \h 7References PAGEREF _Toc368496886 \h 8

AbstractThis paper focuses on five major areas of security issues on the Internet. Security concerns relate useful information to the average web surfer at home. There are tips on safeguarding one’s security and privacy over a network connection, plus some definitions of typical security problems individuals will come into contact with. The second focus of this paper includes the initial internet security measures. It will discuss the early security protocols and how technology has increased the security of the internet numerous times. Invention of internet security is the third topic of this project and focuses the invention and its impact on the Internet. The forth topic deals with the legal measures which have taken place regarding internet security issues. Finally, the fifth topic deals with the consumer privacy concerns, for the most part, people are becoming aware of internet security as online activities continue to skyrocket. As the technology becomes more available and easy to use, people seem to accept security risks in exchange for the convenience.

Internet Security
Since the early 1990’s, the solitary thing most people knew about internet security that there was a colossal computer network that had been inundated by a computer virus. Today it is difficult for anyone, to remember the pre-internet era. ‘Nearly 500 million people around the world use the internet, with several billion touched by it in some manner CITATION Gar03 \l 1033 (Garfinkel, Spafford, & Schwartz, 2003). It is no wonder why technology has increased by leaps and bounds since the early invention of the internet.
Discussion
BackgroundRegardless of



References: BIBLIOGRAPHY l 1033 Garfinkel, S., Spafford, G., & Schwartz, A. (2003). Practical UNIX and Internet Security. O 'reilly. Healey, J., Rohmeyer, P., Sachs, M., & Schmidt, J. (2012). Cyber Security Policy Guidebook. Wiley.com. Leiner, B., Cerf, V., Clark, D., Kahn, R., Kleinrock, L., Lynch, D., . . . Wolff, S. (2013). Brief History of the Internet. Retrieved from Internet Society: http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet#Origins Miyazaki, A., & Fernandez, A. (2001). The Journal of Consumer Affairs. Wiley.com. Shoniregun, C. A. (2002, October 1). The Future of Internet Security. Ubiquity, p. 1.

You May Also Find These Documents Helpful

  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The internet is one of the most amazing inventions of man. The internet has greatly revolutionalized how we do our everyday tasks. It plays a very vital and effective role in the lives of every human being. It has been one of the most outstanding innovations in the field of communication; it is indeed a wonderful addition to our lives. The internet can be known as a kind of global meeting place where people from all parts of the world can come together. It is a service available on the computer through which everything under the sun is now at the fingertips of anyone who has access to the internet. It is a vast network of computers that connect many of the world’s businesses, institutions and individuals. It is easily assessable from home for anyone who has a modem and a computer. It has made a huge impact since its introduction to the public.…

    • 583 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Internet Security

    • 474 Words
    • 2 Pages

    Research Problem: Internet security and privacy, what you can do to make it more efficient, and what software you can buy to protect yourself.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Syllabus of 8th Sem

    • 728 Words
    • 3 Pages

    SEMESTER VIII CRYPTOGRAPHY AND NETWORK SECURITY L T P M C 3 1 0 100 4 UNIT I INTRODUCTION 9+3 OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality UNIT II PUBLIC KEY CRYPTOGRAPHY 9+3 Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography - Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA. UNIT III AUTHENTICATION AND HASH FUNCTION 9+3 Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard UNIT IV NETWORK SECURITY 9+3 Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail…

    • 728 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    term paper

    • 836 Words
    • 4 Pages

    Some survey-based studies have reported a link between video game use and poor achievement in school. But correlation doesn’t prove causation. Kids who struggle in school may be more likely to seek out video games as a distraction.…

    • 836 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Term Paper

    • 4943 Words
    • 20 Pages

    Mohammad Mizenur Rahaman (Corresponding Author) Assistant Professor Department of Business Administration Shahjalal University of Science and Technology Sylhet -3114, Bangladesh E-mail: rfi.research.dmr@gmail.com Alternative E-mail: mizen_397@yahoo.com Cell: +8801716258962, +8801818970170 Md. Rabiul Islam Assistant Professor Department of Business Administration Bangladesh University 15/1 Iqbal Road, Mohammadpur, Dhaka, Bangladesh E-mail: rabimbadu@yahoo.com Cell: +8801712004242, +880119717222 Md. Abdullah Assistant Professor Department of Marketing Comilla University Comilla, Bangladesh E-mail: mabdullahru@yahoo.com Cell: +8801552428537 Shah Johir Rayhan Lecturer Department of Management and Finance Sher-e-Bangla Agricultural University Dhaka, Bangladesh. E-mail: johir_rayhan2006@yahoo.com Cell: +8801712700906 Abstract Industrial disputes one of the important issues that hindrance the development of the sectoral growth. RMG sector in Bangladesh is mainly human resource especially women workers intensive industry and they have remarkable contribution in the economy of Bangladesh. Last few years this sector not contributing as much as we expected because of industrial disputes narrowing the performance of this sector. As the paramount proportion of human resources in garment sector are women workers, so their attitudes has significant impact on…

    • 4943 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    Term Paper

    • 348 Words
    • 2 Pages

    Below is a free essay on "General Elections 2013" from Anti Essays, your source for free research papers, essays, and term paper examples.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Security

    • 768 Words
    • 4 Pages

    Counter attacks: Documents should have a password, a firewall should be used to bar hackers, user account should have a password or a screen lock and data should be…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    “The internet’s breakthrough to mass popularity occurred in 1991 with the arrival of the World Wide Web. The Web was developed by Tim Berners-Lee, a British computer scientist. The United States Department of Defense was concerned at the time about the possibility of devastating nuclear warfare. The internet began to take shape in the late 1960’s. It began investigating means of linking computer installations together so that their ability to communicate might withstand war” (“Internet” 350).…

    • 645 Words
    • 3 Pages
    Satisfactory Essays