StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Strengths and Weaknesses of the Internet - Report Example

Cite this document
Summary
This report "Security Strengths and Weaknesses of the Internet" discusses a better understanding of what internet security actually is. The main purpose of implementing internet security measures is to reduce the occurrence of risks related to the transfer of information over the internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Security Strengths and Weaknesses of the Internet
Read Text Preview

Extract of sample "Security Strengths and Weaknesses of the Internet"

?[Your full full May 22, Security Strengths and Weaknesses of the Internet Before going into the discussion regarding security strengths and weaknesses of the internet, let us get a better understanding of what internet security actually is. Internet security is a type of security related to the internet. The main purpose behind implementing internet security measures are to reduce the occurrence of risks and threats related to transfer of information over the internet. Internet security provides various significant benefits to the internet users. Internet security is very important for a person who keeps or sends important data over the network. “A basic knowledge of internet security is essential for anyone who uses the web for tasks such as email, networking and shopping” (Paul). Importance of Internet Privacy Internet security has become one of the main concerns for every individual connected to the internet for any purpose. It is because there are a number of hackers present on the internet continuously trying to break into other computers in order to steal important data or to destroy the important data. Hacking has become so common in today’s world that almost every person who uses internet is a target of hackers. “Hacking is the process in which a system is tested before it goes into the market for direct use by the customers” (Douglas). Any individual, whether using internet for communication purposes or for information sharing, needs to ensure premium level internet security because hackers not only try to break into such computers which contain highly critical information but also they try to gain control of such computers which although do not contain any important information but can be used to hack other computers. There are many security measures, which an individual can take to reduce the chances of internet attacks. “Internet security fundamentals are designed to protect individual Internet users from security risks which accompany use of the Internet” (Smith). Some of the easiest and most effective security measures include regularly changing the login passwords, setting difficult passwords, downloading a personal firewall, setting encryption standards, and installing up to date antivirus software. One can never deny the significance of internet security in today’s world. Internet privacy is one of the biggest concerns for any individual doing any kind of work on the internet. The issue of internet security or privacy is not just limited to big organizations and companies; rather it has become a need for any individual having online presence. “It is a common misconception that Internet security plays a large role only in organizations, or when people have sensitive information on their computers” (Sundaram). For online businesses, maintaining internet security is of extreme importance. Some of the key steps which every company should take while going online include registering an anonymous domain name, taking steps to protect online communications, making use of e-currency payment solutions, and ensuring local security along with online security. Implementing internet security measures is very important for any individual for many reasons. Some of the most significant reasons include keeping privacy of important information, not letting strangers to view personal information, being online with no fear, protecting personal and business emails, and doing business activities with optimum security. A very important question related to internet security is that what can happen if a person does not care about internet security or why a person needs to implement effective internet security measures. The answer to the question is that if a person does not take steps to ensure internet security, he/she is likely to face many problems, such as, loss of important data, misuse of data, misuse of computer identity, receiving fake emails, receiving hazardous links, and loss of important files. Therefore, maintaining optimum internet security is very important for any individual having any sort of online presence. Let us now discuss some of the core strengths and weaknesses of the internet with respect to its security and privacy in order to get a better understanding of what we have and what we need to improve regarding internet security. Strengths of Internet Security Internet security provides a number of benefits to the internet users, such as, help in protection of data, help in dealing with fake emails and hazardous web links, help in making the communication protected, and help in dealing with spyware, malware, viruses, Trogens, and worms. Moreover, internet security mechanisms also help us survive from phishing frauds. “Many people are victims of phishing, a type of scam in which the victim is contacted by someone who is claiming to represent someone else” (Smith).This assistance makes internet security essential for every internet user of the today’s world. Protection of files and data is of critical value for every internet user. Internet security mechanisms include effective procedures to deal with all sorts of risks related to the use of internet. It is true that internet provides a number of considerable benefits to the users. However, the number of viruses, threats, and attacks associated with the use of the internet is also very high. Therefore, computer science professionals have developed some appropriate mechanisms, which really help the internet users in reducing the occurrence of threats and making the computers and internet usage safe and secure. Some of the most common effective measures towards internet security include installation of antivirus applications, and firewalls. Antivirus and Antispyware Antivirus applications are the most commonly used mechanisms for ensuring computer safety. It is one of the main strong points regarding internet security. Antivirus applications scan the computers for malware and viruses making the data stored in the computers safe and secure. When a person uses internet for any specific purpose, transfer of viruses can take place from the internet to the computer system. “A virus is nothing but a malicious computer program written to muck up the workings of your computer by corrupting your hard disc and data files” (Ryan). These viruses can harm the data either by destroying it or by making it useless for the owner of the computer system. Antivirus applications are developed in such a way that they constantly look for viruses and malware, which try to reside into the computer system. Antivirus applications finds them out and remove them from the computer system ensuring protection of data stored in the computer. Antivirus applications not only look for viruses and malware but also they are geared towards catching Trojans and worms. However, antivirus applications are not very reliable for catching malware; therefore, the experts have developed antispyware, which can deal with malware much better than antivirus applications. “Antispyware picks up on malware hidden deep within freeware, usually masquerading as something else” (Sundaram). Some internet users download freeware, which increases the chance of malware attacks on the computer systems. Antispyware applications look for malware and spyware, which reside in the computer systems and take appropriate actions to limit their adverse effects. Firewalls Computer experts have developed firewalls with the purpose to prevent unauthorized accesses to the computer systems. Firewalls judge all sorts of unauthorized accesses and stop them from doing anything to the computer systems on which firewalls are enabled. One can set the settings for the firewall from low to high depending on the types and number of threats to the computer system. “Firewall will prevent unauthorized access to your computer from any external source, and the settings can be varied from low security to high” (Ryan). Firewalls not only prevent unauthorized people or viruses from accessing the computer systems but also generate a log file, which contains details of all connections that try to access those computer systems. Therefore, firewalls are the security mechanisms that provide good security to the computers by stopping all sorts of unauthorized accesses. Weaknesses of Internet Security Along with a number of significant benefits of implementing internet security measures, there also exist some weaknesses related to internet security. Some of the major weaknesses include unreliability of some antivirus applications, strong programming of viruses, and threats associated with downloading of anonymous files. These weaknesses still make internet security a common concern for many people. Moreover, there also exist some weaknesses in the security provided by internet explorer and Mozilla firefox. If we talk about the security issues related to internet explorers, we can say that almost all versions of internet explorer have some internet security issues, which need to be dealt effectively by the computer science professionals. Some issues are related to the flaws in the java scripting whereas others are related to the design flaws. These flaws provide ways to viruses and hackers to reach the computer systems through different versions of internet explorers. There also exist some weaknesses in Mozilla firefox, which increase the chance of hackers’ attacks. Hackers can carry out Denial of Service attacks on the internet users who use Mozilla firefox. We cannot say that explorers are full with flaws or they cannot provide internet usage safety to the users, rather the fact is that there are just a small number of flaws in these explorers, which create internet safety issues for the users. Computer experts and information technology professionals need to resolve all issues related to internet security in order to provide bug free and reliable explorers to the internet users. Works Cited Douglas, Tina. “Importance of Internet Security.” Ezinearticles.com, 03 Jun. 2011. Web. 22 May 2011. Paul, Alex. “What Are the Best Tips for Internet Security?.” Wisegeek.com, n.d. Web. 22 May 2011. Ryan, Joseph. “Best Internet Security.” Ezinearticles.com, 10 Feb. 2011. Web. 22 May 2011. Sundaram, Karishma. “Understanding Internet Security.” Brighthub.com, 29 Apr. 2010. Web. 22 May 2011. Smith, S. “What are Some Internet Security Fundamentals?.” Wisegeek.com n.d. Web. 22 May 2011. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The security strengths and weaknesses of the Internet Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1422540-the-security-strengths-and-weaknesses-of-the
(The Security Strengths and Weaknesses of the Internet Essay)
https://studentshare.org/information-technology/1422540-the-security-strengths-and-weaknesses-of-the.
“The Security Strengths and Weaknesses of the Internet Essay”, n.d. https://studentshare.org/information-technology/1422540-the-security-strengths-and-weaknesses-of-the.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Strengths and Weaknesses of the Internet

Domain Name System Security Extension Technology

The paper "Domain Name System Security Extension Technology" indicates that deployment of DNSSEC increases the security of the internet, as well as those of users of ISP services, which will ultimately enhance services to end-user and ensure a more secure and reliable network into the future.... Technological advancement resulted in the emergence of the internet, which has changed the way people interact both at the private and business levels.... the internet's several applications and communication services have become exceedingly crucial in the present world....
11 Pages (2750 words) Term Paper

Financial Management Cash Management Techniques

Amazon was a small company that used to sell books on the internet.... Amazon was a small company that used to sell books on the internet.... TOWA matrix (Threats-Opportunities-weaknesses-Strengths) has been used to develop feasible alternative strategies.... They are (1) using strengths to overcome weaknesses,(2) Using strengths to overcome threats, (3) overcoming weaknesses to take advantage of opportunities and (4) overcoming weaknesses to address threats....
2 Pages (500 words) Essay

Security findemental (contract security guard service selection exercise)

The matrix evaluation is done for the company for the wide range study, “SWOT is an acronym used to describe the particular Strengths, weaknesses, Opportunities, and Threats that are strategic factors for a specific company.... The memorandum hereby provides the results for recruiting the security supervisors with an immediate effect for the rotating shifts in the organization.... Researches Library and museum studies   09 April 10-April security Staff Contract Report From The Manager security Department ABC Company USATo The Manager The Human Resource Department ABC Company USASir,Subject: Recommendation for security guard service contract....
2 Pages (500 words) Essay

Stengths and weaknesses of biometrics mechanis,s

The article goes in depth about each of the technologies, matching the advantages and disadvantages that has been the focal point of What are the strengths and weaknesses of each technology: Facial recognition Facial recognition is non-intrusive and fairly cheap technology.... Gait technology has been a prominent force that has been the driving force for signature recognition to drive security Many new improvements have been the catalyst to improve these programs (“Comparative study of different biometric features”). Analyzing this, it is clear… For instance, the password method is the cheapest technology but is the most vulnerable....
2 Pages (500 words) Essay

Strategic Plan for the Indonesian Music Shop

Since the company does not have any shop floor it operates its business through internet and web communication mediums.... The research report “Strategic Business Plan for the Indonesian Music Shop” examines the Indonesian music industry, which has seen a gradual fall in the recent past time due to several reasons which have actively contributed in strengthening its fall....
14 Pages (3500 words) Assignment

Internet of Things and Internet Security

nbsp; In the near future, the cost of the internet will be cut down.... Although it is an open platform providing various benefits, there is much exploitation in the technological and application level of the internet.... This paper aims at covering various levels of concern regarding the security of the internet.... the internet will give more personalized and intelligent services on its own.... Despite the advantages offered by the internet, there are growing concerns regarding security issues....
12 Pages (3000 words) Case Study

Al Qaidas Tactics and Techniques: Strengths and Weaknesses

Identifying the strengths and weaknesses of Al Qaida's tactics and techniques in carrying out its terroristic activities is necessary for mapping out counter-strategies to arrest its terrorism network.... The paper "Al Qaida's Tactics and Techniques: strengths and weaknesses" tells that Al Qaida has been successful in terrorizing the world.... Selected literature was reviewed to critically assess these strengths and weaknesses, if applicable, which will be presented in the succeeding sections....
7 Pages (1750 words) Case Study

Current Trends in Information Security

The paper "Current Trends in Information security" examines the significant current threats to information security and the most important controls that WebCenter should be considered as a priority to mitigate the risks of these threats being realized.... hellip; The primary objectives of information security are; integrity, confidentiality, and availability.... Current threats to information security The two major threats to information security include; phishing and hackingPhishingPhishing, also known as “carding” or “brand spoofing,” refers to a form of social engineering where an attacker, known as a phisher, deceptively retrieves data of a legitimate user's confidential information by copying electronic communications from an organization in an automated manner (Shi and Saleem 2012)....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us