Internet Security - Research Paper Example

Comments (0) Cite this document
Internet Security Internet Security As the global world get smaller and our relevance of function spans over countries, transgressing any physical borders, the need for direct, frequent and immediate communication has made communication over the internet far more than popular: it has made it a necessity…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Internet Security
Read TextPreview

Extract of sample
"Internet Security"

Download file to see previous pages the computers being used to access the internet, or the user. The subjects pertaining to the security against these threats are internet safety and internet security. There is a slight difference in internet security and internet safety, with the most basic one being that the former focuses more on the direct safety of a computer network from threats that can attack through the internet, such as viruses or data corruption, while internet safety relates more to the security and safety of the user, such as identity fraud, money scams, false information etc. Although both forms of security threats can are important to understand and counter, this paper will concentrate mostly on the more technical aspect of internet security, and will focus on the various threats that are encountered and the preventative measures taken against them. As mentioned, internet security is the necessary measures taken and rules laid out which make the use of the internet more secure for a user in terms of the safety of their computer from various threats. To understand where these threats rise from it is first important to understand the basic working of the internet. ...
IP transfers the required bits of data, firs within each individual network, then between secondary levels of networks, starting from the most basic level, and then progressing regionally and then globally, thus allowing the information to reach from one point to another. TCP checks these bits of data, ensuring they are correctly being transferred and offering corrective feedback measures when they aren’t (Reed, 2004). Data threats enter this system of information management when at any of these many levels data is encrypted and corrupted. To prevent this, a number of measures are taken, which include SSL (Secure Sockets Layer), TLS (Transport Layer Security) and IPsec, with the most effective one being the IPsec protocol, which in turn further uses the AH (Authentication Header) and ESP (Encapsulating Security Payload) protocols as the mechanism for its protection. AP authenticates the data and then sends it further on, and ESP provides confidentiality. All three protocols basically revolve around the same principal of securing communication by authenticating the sender at each level where these protocols are implemented, and by encrypting the data so that in case of unwanted interception, it is not altered. Internet security threats are also widely transferred through email messages. Again, understanding how email messages work greatly explains the reason for this. Email messages can also be considered bits of data that are transferred through the many networks of internet, with the main difference being that users can easily edit and change this data at the various levels it is transmitted to. How email messages basically work is that first a user composes a message. This message is converted into a certain standard form and is transferred to the mail ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Internet Security Research Paper Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from
(Internet Security Research Paper Example | Topics and Well Written Essays - 1750 Words)
“Internet Security Research Paper Example | Topics and Well Written Essays - 1750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Internet Protocol Security (IPsec)
et is a public network which was not created with the aspect of security in mind. Since the Internet Protocol has no built in security feature and the information communicated over the Internet is in the form of plain text, this information is very vulnerable to threats such as unauthorized examination, alteration or exploitation.
12 Pages(3000 words)Research Paper
Research report on Internet Security
Through internet, people can access the bank accounts, e-mails and other information. Essentially, internet acts as a limitless source of information. However, with all good aspects which are offered by internet, it also opens the door for possibly dangerous threats.
12 Pages(3000 words)Research Paper
Internet Security IT Research Paper
This paper briefly explains various types of interne security threats and the possible preventive measures. Virus attack is one of the major security issues of internet. Different types of viruses, spyware, malware etc can attack the computers through internet.
3 Pages(750 words)Research Paper
Internet Technology, Marketing, and Security
, information security has turned out to be one of the major concerns of businesses, as well as individuals, though the developments in information technology have offered a lot of opportunities to the businesses. On the other hand, this technology evolution has also generated numerous threats to corporate and personal lives.
7 Pages(1750 words)Research Paper
Internet Security
Web Security. Web security or internet security is a subdivision of computer science, which precisely shares the internet, and typically encompasses the browser safety but similarly the network security. Web safety correspondingly comprises additional presentations or operating systems.
5 Pages(1250 words)Essay
Internet Technology, Marketing and Security

The paper illustrates the application of social media by Pepsi, Red bull and Coca-Cola brands and the related successes and failures. Finally this paper speculates on the future of social media in addition to relevant recommendations for effective utilization of social media by businesses in the future.

8 Pages(2000 words)Research Paper
Internet Technology, Marketing, and Security
(Pingdom, 2011) In the past fifteen years or so many companies are becoming aware of the fact that social media marketing is becoming a doorway to success and if they fail to adopt it at the right time, they will be left far too behind from their competitors (Pingdom, 2011) The hype for social media marketing was not based on statistical reports and its authenticity is still a question as suitable parameters are not devised to evaluate it.
9 Pages(2250 words)Research Paper
Personal Security and The Internet
The internet is one of the greatest innovations of the 20th century. With the internet, almost all aspects of operations including business, security and communication have gone immense revolutions. The internet has made the traditionally manual works simpler and cost effective. However, the internet has its ugly side too.
12 Pages(3000 words)Research Paper
Internet Technology, Marketing and Security
The use of the internet has greatly increased across the globe with a very great percentage of internet users using social media networks. The main social media platforms that are being used include Facebook, Twitter, Google, YouTube, and LinkedIn where Facebook has the greatest market share.
8 Pages(2000 words)Research Paper
Security on the Internet
However, reflecting upon the drawbacks, the organization appeared to have made multiple modifications within the security features of its networks for attaining the trust and the preference from its business partners. Besides,
16 Pages(4000 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Research Paper on topic Internet Security for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us