Internet Security - Research Paper Example

Comments (0) Cite this document
Internet Security Internet Security As the global world get smaller and our relevance of function spans over countries, transgressing any physical borders, the need for direct, frequent and immediate communication has made communication over the internet far more than popular: it has made it a necessity…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Internet Security
Read TextPreview

Extract of sample "Internet Security"

Download file to see previous pages the computers being used to access the internet, or the user. The subjects pertaining to the security against these threats are internet safety and internet security. There is a slight difference in internet security and internet safety, with the most basic one being that the former focuses more on the direct safety of a computer network from threats that can attack through the internet, such as viruses or data corruption, while internet safety relates more to the security and safety of the user, such as identity fraud, money scams, false information etc. Although both forms of security threats can are important to understand and counter, this paper will concentrate mostly on the more technical aspect of internet security, and will focus on the various threats that are encountered and the preventative measures taken against them. As mentioned, internet security is the necessary measures taken and rules laid out which make the use of the internet more secure for a user in terms of the safety of their computer from various threats. To understand where these threats rise from it is first important to understand the basic working of the internet. ...
IP transfers the required bits of data, firs within each individual network, then between secondary levels of networks, starting from the most basic level, and then progressing regionally and then globally, thus allowing the information to reach from one point to another. TCP checks these bits of data, ensuring they are correctly being transferred and offering corrective feedback measures when they aren’t (Reed, 2004). Data threats enter this system of information management when at any of these many levels data is encrypted and corrupted. To prevent this, a number of measures are taken, which include SSL (Secure Sockets Layer), TLS (Transport Layer Security) and IPsec, with the most effective one being the IPsec protocol, which in turn further uses the AH (Authentication Header) and ESP (Encapsulating Security Payload) protocols as the mechanism for its protection. AP authenticates the data and then sends it further on, and ESP provides confidentiality. All three protocols basically revolve around the same principal of securing communication by authenticating the sender at each level where these protocols are implemented, and by encrypting the data so that in case of unwanted interception, it is not altered. Internet security threats are also widely transferred through email messages. Again, understanding how email messages work greatly explains the reason for this. Email messages can also be considered bits of data that are transferred through the many networks of internet, with the main difference being that users can easily edit and change this data at the various levels it is transmitted to. How email messages basically work is that first a user composes a message. This message is converted into a certain standard form and is transferred to the mail ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Internet Security Research Paper Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from
(Internet Security Research Paper Example | Topics and Well Written Essays - 1750 Words)
“Internet Security Research Paper Example | Topics and Well Written Essays - 1750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Firewall and Internet security

...?Firewall and Internet Security – A Research Proposal Research Question The advancements in technology and the growing pace of internet have almost pulled every individual on earth into the virtual world of cyber pace. As every day passes by, the rapidity with which internet grows has increased exponentially and as a result, the world is shrinking smaller and smaller. People living in extremities of the world could easily communicate just like they are doing it when they are in direct contact with each other. The distance is no more a matter of concern. Despite all the advantages of a networked world, the parallel increase in cyber threats has been an alarming factor....
9 Pages(2250 words)Dissertation

Internet Security

...?Web Security Web security or internet security is a subdivision of computer science, which precisely shares the internet, and typically encompasses the browser safety but similarly the network security. Web safety correspondingly comprises additional presentations or operating systems. The chief purpose of the web security is to inaugurate the rubrics and the procedures that are used in contradiction of the attacks on the internet. Typically, the internet provides an apprehensive channel that is cast-off for swapping data, which hints to high peril of interloping, or deceit. There are...
5 Pages(1250 words)Essay

Internet Security

...?Internet Security SECTION A This question is concerned with basic terminology in computer security. (a) What are the main goals in computer security? For each goal, give a brief description and an example. The main goals of computer security are Confidentiality- entails verification of information’s privacy. For example, the policy information in a company should only be known by the executive management. Integrity- ensuring that that a party gets is the original one that was placed there. For example, the patient information entered to the computer by a nurse is the exact information that reaches the physician. Availability- Ensuring that the resources...
5 Pages(1250 words)Coursework

Internet Security

...DELIVERING INTERNET SUCCESS TO SMALL BUSINESSES: NETWORK SECURITY FREE ONLINE TRAINING Literature Review Background of the Review With the emergence of information technology's embrace over the different indicative resolutions provided to modern business industries, it could not be denied that the saturation of resources for this particular approach to business have been better dealt with through online support as well. There are some instances when finding on-ground support is not easy enough to obtain especially for those owning small businesses online. Likely, seeking the help of professional individuals in the field of information technology does cost something, and practically, this amount is not...
7 Pages(1750 words)Essay

Internet Security Article

...Applied Research Project - UG Computing Programmes Project Proposal Form Project Internet plays a crucial role in the concept of globalization because it is because of internet that the world has become a globe where people can correspond with one another in a very less time. With every beneficial invention, there are also disadvantageous aspects. Because of internet, there are many global internet security concerns. Global internet security is a concern for all the world because due to internet, where people have gained many benefits, there are also many disadvantages such as internet...
1 Pages(250 words)Article

Internet security

...Running Head: Internet security Security: Introduction Internet security has become one of the most discussed issues in this era of information technology. The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business. The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be embraced even from unlikely quarters with government adopting concepts such e-governance. The growth in the use of Internet has however...
8 Pages(2000 words)Essay

Internet Security

...Internet Security Roll No: Teacher: 17th November 2009 Internet Security Internet is employed in businesses, educational institutes, governmental institutes, social institutes, researching and many other places because it keeps the capability of allowing a communication path that is easier, wider, faster and user friendly. Internet plays a crucial role in the concept of globalization because it is because of internet that the world has become a globe where people can correspond with one another in a very less time. With every beneficial invention, there are also disadvantageous aspects. Because of...
7 Pages(1750 words)Essay

Internet Security

...Internet Security Facebook is a social media platform that is renowned all over the world. In terms of its security, there are aspects that deem a great deal of attention especially since the people all over the world make use of it and hence have to be sure that they are using a website which ensures complete security and data protection. The four aspects of security are regarded as Privacy, Authentication, Integrity and Nonrepudiation. Privacy is related with how Facebook users prevent disclosing their respective information to people who are unwanted and have no say within the related systems. The privacy aspect has been given significance in the wake...
2 Pages(500 words)Essay

Initiating Change in the Manufacturing and Distribution Division of PolyProd on page 241-246 in the Cummings & Worley tex

1 Pages(250 words)Case Study

Network and Internet Security

...Network &Internet Security Session keys just as the suggests are one-time user keys or temporary keys. They are encryption keys used to ensure secured communication sessions between agencies or connected computers. They are commonly used by communicating parties for transport connections. For the purpose of security, session keys are frequently changed to ensure their reliability. These encryption techniques are categorized into public key encryption and single key encryption. The public key encryption is intended to use two keys; one private key and another public key. Each key is assigned to either encrypt or decrypt. On the other hand, the single key encryption only uses a single secret key for both encryption and decryption... of...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Internet Security for FREE!

Contact Us