Security

Topics: Computer crime, Malware, Fraud Pages: 9 (3055 words) Published: September 25, 2013


Information Security
ISSC361

6/23/2012

Jerry Cade

Internet Security
Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According to the Internet Systems Consortium (ISC), which conducts four surveys each year, in January 2006 there were some 395 million Internet hosts in operation—and billions of computers consulting billions of pages carried by those hosts. Despite best efforts, a system of this size and complexity will inevitably have points of entry that can be abused—and software programs frequently have unknown weaknesses that hackers (for fun) or criminals (for gain) discover and turn to their advantage until the flaws are fixed. Computer networks hold valuable and often protected, private information, not least data on identities; credit cards; financial data; technical, trade, and government secrets; mailing lists; medical records; and the list could be continued. These data are vulnerable on the computer and in transit. The Internet, as a connector between computer systems, is also a highway of access to valuable data stores. The vulnerabilities are loss of data through malicious erasure, the acquisition of proprietary information, the manipulation of the data such as illegal withdrawals and transfers of funds, the capture and criminal use of credit cards or identities, and any and all unauthorized uses to which information may be put. Internet security breaches can also potentially have direct physical consequences if the wrong people hijack systems that control transportation or power systems. Computers have become so pervasive, and their networking so universal, that Internet security and security in general are closely linked objectives of society. On October 21, 2002, all 13 of the Internet’s root Domain Name System servers were targeted by a distributed denial of service attack. While the attack had little overall effect on the performance of the Internet, a more sophisticated and sustainable attack might have had a more deleterious impact. As use of the Internet grows, sohas concern about security of and security on the Internet. A long list of security related incidents that have received wide-ranging media coverage (e.g. the Melissa virus, the Love Bug, and the Code Red, Code Red II, Nimda, Slammer and Blaster worms) represents the tip of the iceberg. Every day, persons gain access, or try to gain access, to someone else’s computer without authorization to read, copy, modify, or destroy the information contained within. These persons range from juveniles to disgruntled (ex)employees, to criminals, to competitors, to politically or socially motivated groups, to agents of foreign governments. Cyber Crimes within the last 5 years

Six Estonian nationals was arrested and charged with running a sophisticated Internet fraud ring that infected millions of computers worldwide with a virus and enabled the thieves to manipulate the multi-billion-dollar Internet advertising industry. Users of infected machines were unaware that their computers had been compromised—or that the malicious software rendered their machines vulnerable to a host of other viruses. Beginning in 2007, the cyber ring used a class of malware called DNS - changer to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals,...

References: (2012). USLegal. Retrieved from http://definitions.uslegal.com/i/internet-security/
April (2012). The FBI. Federal Bureau of Investigation. Retrieved from http://www.fbi.gov/news/stories/2006/april/social_networking040306
(2012). The United States. Department of Justice. Retrieved from http://www.justice.gov/criminal/cybercrime/
CSR. Report for Congress. Retrieved from http://www.arl.org/bm~doc/crsinternet.pdf
D.Slater, (2012 May), CSO Secueity and Risk. Retriveved from http://www.csoonline.com/article/204450/business-continuity-and-disaster-recovery-planning-the-basics
M. Rouse, (2006 January), TechTarget. http://searchstorage.techtarget.com/definition/business-continuance
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • GOOD ONLINE SECURITY HABITS Essay
  • Essay about Computer System: Security Threats and Defenses
  • Handling Security And Ethical Issues IT Essay
  • Essay about The Relvance of Information Security in 21st Century Sri Lanka
  • Essay on How to Achieve Business Information Security in Cyperspace
  • network security strategy SOF Answer Essay
  • Security Assessment and Recommendation Essay
  • Computer Security Essay

Become a StudyMode Member

Sign Up - It's Free