Preview

Internet Security

Good Essays
Open Document
Open Document
474 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Security
Research Problem: Internet security and privacy, what you can do to make it more efficient, and what software you can buy to protect yourself.

Research Question: What is Internet security and privacy and what we can do protect ourselves?

If you have access to a computer and a modem, you are licensed to drive on the information superhighway. And you are one of a growing number of online participants. The Internet offers many benefits. Web sites provide a vast world of information, entertainment, and shopping at our fingertips. Electronic mail, instant messaging, and chat rooms enable us to communicate with friends, family, and strangers in ways we never dreamed of a decade ago. But the Internet also creates many threats to our personal privacy. Unless you know the "rules of the road," your online activity may lead to significant privacy problems (Internet Security Systems, 2005). According to The Business Technology Network, internet privacy is the degree to which an individual can determine which personal information is to be shared with whom and for what purpose. To ensure this, there are many software programs that will guard your computer 24 hours a day, 7 days a week. For example, one of the most respected software programs is the new Norton Internet Security 2005(Schweitzer, 2002). This bundle includes anti-virus, personal firewall, parental control, and outbreak alert features. It is the most innovative and powerful software on the market. Internet Security as defined by the International Engineering Consortium is the process of preventing and detecting unauthorized use of your computer (Fogile & Peikari, 2004). Prevention measures help you to stop unauthorized users (also known as "hackers") from accessing any part of your computer system (Gralla, 2002). Unfortunately, hackers are always discovering new vulnerabilities to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of



Cited: Fogile, S., & Peikari, C. (2004). Window Internet Securities. Washington: Prentice Hall Gralla, P. (2002). The Complete Idiots Guide to Internet Security and Privacy. New York: Person Education Holden, G. (2004). Norton Internet Security for Dummies. Indiana: Wiley Publishing Internet Security Systems. (September 2005). Retrieved September 18, 2005 from http://www.iss.net Schweitzer, D. (2002). Internet Security Made Easy. New York: Douglas Schweitzer Publishing. The Business Technology Network. (2005). Retrieved September 29, 2005 from http://www.webtech.com The Center of Internet Security. (July 26, 2004). Retrieved September 21, 2005 from http://www.cisecurity.org

You May Also Find These Documents Helpful

  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In today’s society, technology has made countless advances skyrocketing towards the future. Thus the arguments about whether or not security is needed for this amount of power. There are many good aspects of the internet; including social media, messaging, games, and even dating. But, with these things, comes bad that we don't know much about; including catfishing, tracking, and also spying. With the click a button, everything done online can be seen by anyone.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Better Essays

    In today’s electronic age, many employers are faced daunting task of making a legal call when determining if monitoring employee behavior is appropriate at all times. In essence, “Little Brother” is always watching. According to Schulman (2013), Little Brother represents the tremendous capabilities technology as provided for employers to keep track of what their work force is up to. Several programs are available that search e-mails, as well as software to block objectionable websites. The most brazen of manager and supervisors can simply go enter your hard drive and review one’s cookies and history, as well as access any employee’s company e-mail. As much as an employee deletes his/her history, or sends unwanted emails to the recycle bin, much of this information still exists on the company server, and many corporations are willing to pay computer consultants to unearth any desired information.…

    • 1036 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Project

    • 1487 Words
    • 6 Pages

    The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect national security and business information. Therefore, IT…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Anyone who uses computer technology today accepts the fact that their Personally Identifiable Information (PII) may or could be transmitted, collected, and used to benefit the one who receives that information. It is our responsibility to know what PII transmissions are being made available for public use over the web. Understanding all the aspects of PII and the approaches that are to be taken to protect our privacy will make us more aware of PII. As we continue to utilize the technology available, we expose ourselves to become donors of PII. Having knowledge of what PII is and how information is being compiled to identify our interest is necessary when accessing computer technology of today.…

    • 1078 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Historically, information technology has had only basic security at best and highly vulnerable to attacks. In an effort to ward off cyber threats and capitalize from it, computer security companies began to market a wide range of services and products to prevent sabotage and unauthorized computer use. These security applications include virus detection and removal software, firewall support, encryption software, intrusion detection and analysis software, security consulting services, and even devices for user authentication (Gale, 2011).…

    • 2770 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    In this information age Internet security is a vital part of people’s lives. Some people do not understand or have the education to comprehend how important privacy and Internet security is.…

    • 550 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When people think about privacy and the internet, what do they think? Do they feel secure? Or, do they feel vulnerable when it comes to using the internet at their house or in a public place? The answer to some of these questions may surprise people because some think they are completely safe at home on their home networks. But the truth is, your security/privacy is taken advantage of on the daily basis by companies and third parties.…

    • 756 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In this course, you have discovered how important computers and their contents are to everyone. Safeguarding your computer and its valuable information is important. You should be aware of the threats facing by your computer and data, and take necessary measures to protect them as well. By taking some precautionary steps, you can safeguard not only your hardware, software and data, but yourself. This lesson introduces you with some of the most common threats to your privacy, data, and hardware; and how to protect yourself and your system.…

    • 1208 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Internet Privacy

    • 1330 Words
    • 6 Pages

    Many people use the Internet daily for work, communication, and personal reasons. There is a sense of false security for individuals on the Internet. Information is being sent globally in a matter of seconds, so how can you believe that your information is safe? Why would you want to put any information on the Internet at all? Knowing simple facts, like which activities reveal personal information, how others get information, and ways to safeguard privacy, may help average computer users stay safe and help keep personal information private.…

    • 1330 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Targeted Advertisement

    • 1973 Words
    • 8 Pages

    A computer user sits in front of a screen and starts browsing their favourite website while their child similarly does the same. While this peaceful pastime activity is being enjoyed, however, they are unaware of the hidden pathways through which every detail about them is being disclosed. Because of these pathways, there are people that can get hold of the users’ names, phone numbers, IP addresses of the computers and their households. They have access to information about any users’ income, medical history, gender and age, not to mention what they searched on search-engines and which websites the users visited. They can even learn which online shopping purchases were performed by the users on any recent website.…

    • 1973 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Internet Dangers

    • 460 Words
    • 2 Pages

    In this time and era, internet is the most important device in our lives. It provides us with helpful information, keeps us up to date with the latest news, and answers every question we could possibly think of. This usually gives us an unrealistic perception that everything on the internet is true, even though anyone from any country or city or state can say whatever they please, and still make that information sound as if it is straight from a professor. People can do anything imaginable on the internet, which gives the wrong people the power to manipulate innocent victims. Now, this kind of power and anonymity has huge potential in destroying your reputation, giving you viruses, and attaining identity theft.…

    • 460 Words
    • 2 Pages
    Good Essays