Internet Security

Topics: Computer security, Computer software, Computer program Pages: 2 (474 words) Published: October 30, 2005
Research Problem: Internet security and privacy, what you can do to make it more efficient, and what software you can buy to protect yourself.

Research Question: What is Internet security and privacy and what we can do protect ourselves?

If you have access to a computer and a modem, you are licensed to drive on the information superhighway. And you are one of a growing number of online participants. The Internet offers many benefits. Web sites provide a vast world of information, entertainment, and shopping at our fingertips. Electronic mail, instant messaging, and chat rooms enable us to communicate with friends, family, and strangers in ways we never dreamed of a decade ago. But the Internet also creates many threats to our personal privacy. Unless you know the "rules of the road," your online activity may lead to significant privacy problems (Internet Security Systems, 2005).

According to The Business Technology Network, internet privacy is the degree to which an individual can determine which personal information is to be shared with whom and for what purpose. To ensure this, there are many software programs that will guard your computer 24 hours a day, 7 days a week. For example, one of the most respected software programs is the new Norton Internet Security 2005(Schweitzer, 2002). This bundle includes anti-virus, personal firewall, parental control, and outbreak alert features. It is the most innovative and powerful software on the market.

Internet Security as defined by the International Engineering Consortium is the process of preventing and detecting unauthorized use of your computer (Fogile & Peikari, 2004). Prevention measures help you to stop unauthorized users (also known as "hackers") from accessing any part of your computer system (Gralla, 2002). Unfortunately, hackers are always discovering new vulnerabilities to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of...

Cited: Fogile, S., & Peikari, C. (2004). Window Internet Securities. Washington: Prentice Hall
Gralla, P. (2002). The Complete Idiots Guide to Internet Security and Privacy. New York: Person Education
Holden, G. (2004). Norton Internet Security for Dummies. Indiana: Wiley Publishing
Internet Security Systems. (September 2005). Retrieved September 18, 2005 from
Schweitzer, D. (2002). Internet Security Made Easy. New York: Douglas Schweitzer Publishing.
The Business Technology Network. (2005). Retrieved September 29, 2005 from
The Center of Internet Security. (July 26, 2004). Retrieved September 21, 2005 from
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Internet Monitoring Essay
  • Protecting Information Privacy in the Internet Age Essay
  • Internet security outline Essay
  • Internal & External Security Paper for the Hospitality
  • Misuse of Internet Essay
  • Essay on Internet Privacy
  • Curse of the Internet Essay
  • Essay on Itm 431 Module 1 How to Achieve Business Information Security in Cyberspace

Become a StudyMode Member

Sign Up - It's Free