Internet Security. Abstract. Online users today are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses etc.; he/she is also exposed to sniffers, spoofing their private sessions; and they are also vulnerable to Security is a key issue for every user of the Internet and should be addressed before a person ever logs on to the “net”. At best, all users should have passwords to protect themselves, any businesses need to put up firewalls at all points of entry. These are low cost security measures which should not be over looked in a possible multi-billion dollar industry. Boyan, Justin and Essay about Internet Security. Words6 Pages. Internet Security. Security is crucial to any flourishing society such as the one in which we Americans live today. Imagine if there was no law enforcement in New York City. No one except criminals would dare to walk down the streets. People would live in fear every day
Internet Security and Public Information, Essay Example
Essay Examples. Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line, yet in actuality they are not. There are some very easy ways to protect the user from future problems. The Internet has brought many advantages to its users but has also created some major problems. Most people believe that they are internet security essay when they are using the Internet. When only the government and higher education had access, there was no worry about credit card numbers and other types of important data being taken.
There are many advantages the Internet brings to its users, but there are also many problems with the Internet security, especially when dealing with personal security, business security, and the government involvement to protect the users. The Internet is a new, barely regulated frontier, and there are many reasons to be internet security essay with security. The same features that make the Internet so appealing such as interactivity, versatile communication, and customizability also make it an ideal way for someone to keep a careful watch on the user without them being aware of it Lemmons 1. It may not seem like it but it is completely possible to build a personal profile on someone just by tracking them in cyperspace.
Every action a person does while logged onto the Internet is recorded somewhere Boyan, Codel, internet security essay, and Parekh 3. An individuals personal security is the major issue surrounding the Internet. If a person cannot be secure and have privacy on the Internet, the whole system will fail. According to the Center for Democracy and Technology CDTany website can find out whose server and the location of the server a person used to get on the Internet, whether his computer is Windows or DOS based, and also the Internet browser that was used.
This is the only information that can be taken legally. However, it can safely be assumed that in some cases much more data is actually taken 1, internet security essay. These are just a few of the many ways for people to find out the identity of an individual and what they are doing when on the Internet. One of the most common ways for webmasters to find out information about the user is to use passive recording of transactional information, internet security essay. What this does is record the movements the user had on a website, internet security essay.
It internet security essay tell where the user came from, how long he stayed, what files he looked at, and where he went when he left. This information is totally legal to obtain, and often the webmaster will use it to see what parts of his site attracts the most attention. By internet security essay this, he can improve his site for the people that return often Boyan, Codel, and Parekh 2. There is a much more devious way that someone can gain access to information on a users hard-drive. In the past, the user did not need to be concerned about the browser he used; that changed when Netscape Navigator 2. Netscape 2. Java uses the browser to activate programs to better enhance the website the user was viewing, internet security essay.
It is possible for someone to write a program using Java that transfers data from the users computer back to the website without the user ever being aware of internet security essay being taken. Netscape has issued new releases that fix some but not all of the two dozen holes in the program Methvin 3. Many people do not realize that they often give information to websites by doing something called direct disclosure. Direct disclosure is just that, the user gives the website information such internet security essay their e-mail address, real address, phone number, internet security essay, and any other information that is requested. E-mail is like a postcard. E-mail is not like mailing a letter in an envelope.
Every carrier that touches that e-mail can read it if they choose. Not only can the carriers see the message on the e-mail, but it can also be electronically intercepted and read by hackers. This can all be done without the sender or the receiver ever knowing anything had happened Pepper 1. The only way to secure e-mail is by encryption. This makes an envelope that the hacker cannot penetrate. A way to protect a persons e-mail is to use an autoremailer. Cookies are merely some encoded data that the website sends to the browser when the user leaves the site.
This data will be retrieved when the user returns at a later time, internet security essay. Although cookies are stored on the users hard-drive, they are actually pretty harmless and can save the user time when visiting a web site Heim 2. Personal security is an important issue that needs to be dealt with but business security is also a major concern. While electronic attacks are increasing more rapidly than any other kind, internet security essay, a large number of data break-ins are from the inside. While electronic espionage is increasing, so is the ability to protect computer systems. There are many ways for businesses to protect internet security essay. They can use a variety of techniques such as firewalls and encryption. Firewalls are one of the most commonly used security devices.
They are usually placed at the entrance to a internet security essay. The firewalls keep unauthorized users out while admitting authorized users only to the areas of the network to which they should have access. The second problem is that firewalls use passwords to keep intruders out. Passwords, a major key to internet security essay, are also the most basic of security measures, internet security essay. The user should avoid easily guessable passwords such as a childs name, birthdate, or initials. Just in case an intruder does get through the first layer of security, a good backup is to have all the data on the system encrypted.
Many browsers come with their own encryption schemes, but companies can buy their own stand-alone packages as well. Most encryption packages are based on a public-private key with their own private encryption key to unlock the code for a message and decipher it. Businesses need protection but they cannot do it alone. The Federal government will have to do its part if the Internet is going to give us all the returns possible. Businesses will not use the Internet if they do not have support from the government. In the United States there is no set of laws that protect a persons privacy when on the Internet. The closest rules that come to setting a standard of privacy is an assortment of laws beginning with the Constitution and continuing down to local laws.
These laws unfortunately, are not geared for the Internet. These laws are there only to protect a persons informational privacy Boyan, Codel, and Parekh 3. Now, because of the booming interest and activity on the Internet in both the personal and the business level, the government has started investigating the Internet and internet security essay on ways to protect the users. The Federal Bureau of Investigation FBIinternet security essay, the Central Intelligence Agency CIAand internet security essay National Security Agency have all devoted small units to fighting computer security crimes.
After Senate hearings, the Internet security essay Department proposed that internet security essay full-time task force be set up to study the vulnerability of the nations informational infrastructure. This would create a rapid-response team for investigating computer crimes. Security for internet security essay Internet is improving, it is just that the usage of the Internet is internet security essay much faster. At best, all users should have passwords to protect themselves, any businesses need to put up firewalls at all points of entry.
These are low cost security measures which should not be over looked in a possible multi-billion dollar industry. Boyan, Justin and Eddie Codel and Sameer Parekh. Center for Democracy and Technology Web Page. pl accessed January 26, Heim, Judy. Methvin, internet security essay, David W. Lemmons, internet security essay, Phil. November, Feature PC World Online November Pepper, Jon. Save my name, email, and website in this browser for the next time I comment. Essays Find a Tutor. APA MLA Harvard Vancouver Essay Examples. March Internet Security Essay Examples, internet security essay.
Copy to Clipboard Reference Copied to Clipboard. Internet Security Essay Examples [Internet]. Related essays: The Internet: Its Effects And Its Future The Internet Its Effects And Its Future The Internet: its effects and its future Pretty Good Privacy Internet Security Essay What are the security problems and solutions of the Internet Internet Security. Leave a Comment Cancel reply Comment Name Email Website Save my name, email, and website in this browser for the next time I comment.
Safe and Sorry – Terrorism \u0026 Mass Surveillance
, time: 6:14Internet Security Essay Essay on
Internet Security. Abstract. Online users today are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses etc.; he/she is also exposed to sniffers, spoofing their private sessions; and they are also vulnerable to Mar 29, · Internet Security Has Become a Big Topic. Words: Length: 3 Pages Document Type: Essay Paper #: Read Full Paper. Internet security has become a big topic in the last few years because every business and every person has, to some extent, allowed their information to be captured by the web Sep 30, · Internet - Cyber security Pages: 2 ( words) Applications of SSL VPN for Internet Security Pages: 21 ( words) Internet Security of IP Information Pages: 7 ( words) Life Before the Internet and After the Internet Pages: 2 ( words) Internet and Internet Activities Pages: 3 ( words)
No comments:
Post a Comment