StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The security strengths and weaknesses of the Internet - Essay Example

Comments (0) Cite this document
Summary
[Your full name] [Instructor’s full name] May 22, 2011 Security Strengths and Weaknesses of the Internet Before going into the discussion regarding security strengths and weaknesses of the internet, let us get a better understanding of what internet security actually is…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
The security strengths and weaknesses of the Internet
Read TextPreview

Extract of sample "The security strengths and weaknesses of the Internet"

Download file to see previous pages Internet security is very important for a person who keeps or sends important data over the network. “A basic knowledge of internet security is essential for anyone who uses the web for tasks such as email, networking and shopping” (Paul). Importance of Internet Privacy Internet security has become one of the main concerns for every individual connected to the internet for any purpose. It is because there are a number of hackers present on the internet continuously trying to break into other computers in order to steal important data or to destroy the important data. Hacking has become so common in today’s world that almost every person who uses internet is a target of hackers. “Hacking is the process in which a system is tested before it goes into the market for direct use by the customers” (Douglas). Any individual, whether using internet for communication purposes or for information sharing, needs to ensure premium level internet security because hackers not only try to break into such computers which contain highly critical information but also they try to gain control of such computers which although do not contain any important information but can be used to hack other computers. There are many security measures, which an individual can take to reduce the chances of internet attacks. “Internet security fundamentals are designed to protect individual Internet users from security risks which accompany use of the Internet” (Smith). Some of the easiest and most effective security measures include regularly changing the login passwords, setting difficult passwords, downloading a personal firewall, setting encryption standards, and installing up to date antivirus software. One can never deny the significance of internet security in today’s world. Internet privacy is one of the biggest concerns for any individual doing any kind of work on the internet. The issue of internet security or privacy is not just limited to big organizations and companies; rather it has become a need for any individual having online presence. “It is a common misconception that Internet security plays a large role only in organizations, or when people have sensitive information on their computers” (Sundaram). For online businesses, maintaining internet security is of extreme importance. Some of the key steps which every company should take while going online include registering an anonymous domain name, taking steps to protect online communications, making use of e-currency payment solutions, and ensuring local security along with online security. Implementing internet security measures is very important for any individual for many reasons. Some of the most significant reasons include keeping privacy of important information, not letting strangers to view personal information, being online with no fear, protecting personal and business emails, and doing business activities with optimum security. A very important question related to internet security is that what can happen if a person does not care about internet security or why a person needs to implement effective internet security measures. The answer to the question is that if a person does not take steps to ensure internet security, he/she is likely to face many problems, such as, loss of important data, misuse of data, misuse of computer identity, receiving fake emails, receiving hazardous links, and loss of important files. Therefore, maintaining optimum ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The security strengths and weaknesses of the Internet Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1422540-the-security-strengths-and-weaknesses-of-the
(The Security Strengths and Weaknesses of the Internet Essay)
https://studentshare.org/information-technology/1422540-the-security-strengths-and-weaknesses-of-the.
“The Security Strengths and Weaknesses of the Internet Essay”, n.d. https://studentshare.org/information-technology/1422540-the-security-strengths-and-weaknesses-of-the.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The security strengths and weaknesses of the Internet

Security System In Reference To Immigration

 When James Hollifield delivered this paper at the 1989 Annual Meeting of the American Political Science Association barely three months before the descend of the Berlin Wall he seemed to foretell the crisis situation which the member states of the European Union (at that time the European Community) and the United States would visage when coming to terms with the unprecedented international migration flows they experienced in the early 1990s. With the collapse of communism in Europe and the subsequent rise of irredentist and nationalist tendencies on a global scale, both Western Europe and the United States were faced with the challenge of sustained wide-scale migration flows into their territory throughout the early half of...
11 Pages(2750 words)Report

How Secure Is the Internet When It Comes to Personal Data

Millions of computer users worldwide every year lose invaluable data and information at the hands of stolen means employed by anyone sitting on workstation thousands of miles away from the host node. Computer privacy is one such aspect on which the researchers in the same field are working their best. Certain ways are being devised all around the globe to ascertain the manner in which computer data can be kept secret from the people who are not authorized to seek it. Internet privacy of late has become a serious issue that should be tackled with immediate effect. There are many issues at stake with respect to computer privacy such as the authority to create standards regarding the usage of personal data on one’s machine as w...
6 Pages(1500 words)Term Paper

Analysis of Japans Economic Strengths and Weaknesses Overview

Its economy is the second-largest after the United States in real terms and by far the largest in terms of GDP, set at an estimated $3.914 trillion and a per capita income of $30,700 in 2005. In terms of PPP, the Japanese economy is second to the People’s Republic of China in all Asian economies. The country is also the largest in terms of foreign investment and has successfully sustained a trade surplus for more than five decades. As of 200, the Japanese state holds a sixth of the United States Treasury Securities, which represents about 3.5 percent of the United States’ gross domestic product. It is notable that Japan’s economic problems can greatly impact the global market (CIA World Factbook, 2006 and Economi...
14 Pages(3500 words)Case Study

Description of Two Established Personality Assessment Tools: Discussion of Strengths and Weaknesses

The Thematic Apperception Test (TAT) was developed in the 1930s by Harvard University psychiatrist Henry A. Murray and university student Christiana Morgan in the pursuit of identifying personality characteristics and unconscious human desires (Bosshardt, 2004). TAT assessments generally consist of 31 different cards in which varying ambiguous illustrations and photos are displayed, asking participants to respond to their interpretations of what is occurring within each visual image. Internal conflicts or motivational desires are generally projected by participants who are exposed to TAT assessments, allowing psychologists to determine the personality constructs of individuals.

The Sensation Seeking Scale (SSS) was deve...
6 Pages(1500 words)Term Paper

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages(1500 words)Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages(2000 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic The security strengths and weaknesses of the Internet for FREE!

Contact Us