StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Internet Security IT - Research Paper Example

Cite this document
Summary
Name of author: Internet Security Internet security is a major technical problem facing by the current world. it is impossible to avoid internet usage now, since it is influencing the entire segments of human life at present. Virus threat, malware, spyware threats, hacking, forgery, identity theft etc are some of the major internet related security issues…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Internet Security IT Research Paper
Read Text Preview

Extract of sample "Internet Security IT"

Download file to see previous pages

In fact antisocial elements are creating new viruses every day and it is difficult to prevent such attacks. A proper antivirus software can prevent many of the virus attacks. However, such antivirus programs should be updated quite regularly to prevent attacks from newer viruses. “A basic and key way of staying secure is to make sure you rapidly deploy software updates, such as operating system and browser updates. Make sure too that patches, particularly security patches, are installed as soon as available” (How to deal with Internet security threats) “If you have ever used an installation program to install system or service software (as nearly every company has), and you have not removed unnecessary services and installed all security patches, then your computer system is vulnerable to hacker attack” (The Top 10 Most Critical Internet Security Threats - (2000-2001 Archive).

While installing third party programs, spywares and malwares can also be get installed in the computer. Many people have the habit of installing free software even if it may not be useful. Majority of the free software available for download contains malware and spyware to monitor the internet activities of the user and also to steal the username and passwords. It is better to avoid installation of free software from unauthorized or non-credible sources. Moreover, under no circumstances, credit card numbers or bank account numbers should be given to the internet sites which have least protection.

Before giving such private details, it should be ensured that those sites have enough security certificates and start with https instead of http. While using usernames and passwords for opening sensitive internet accounts, easy to guess type of words or names should be avoided. Under no circumstances, a hacker should not be able to guess a username or password correctly. Pass words should contain alphabets as well as characters and numbers so that hackers may struggle to identify it. “For operating systems, default installations always include extraneous services and corresponding open ports.

Attackers break into systems via these ports” (The Top 10 Most Critical Internet Security Threats - (2000-2001 Archive). So, while installing essential software, care should be taken to avoid unwanted services so that the number of open ports can be minimized. “The top Web-based attacks in 2009 targeted Internet Explorer and PDF readers. Users tend to trust PDF files because they don't think of them as executing anything; however, embedded code in the PDF can carry malware”(Mushthaler and Mushthaler).

The above information clearly suggests that even software from trusted and reputed vendors may contain malicious things. Firewalls should be strengthened in order to block the attacks of malicious things such as viruses, spyware etc. All the information entering and leaving the computer should pass through a properly created firewall so that any malpractices can be detected. “Firewall is combined with other security functions, including (in many cases) web application firewalling (WAF), sometimes also known as deep packet inspection (DPI)” (How To Deal With Internet Security Threats) Trojan software is considered to be the most harmful in terms of E-Commerce security due to its ability to secretly connect and send confidential information.

These programs are developed for the specific purpose of communicating without the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Internet Security IT Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1436668-internet-security
(Internet Security IT Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1436668-internet-security.
“Internet Security IT Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1436668-internet-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internet Security IT Research Paper

Introduction to Network Security

RUNNING HEAD: NETWORK security Network security Threats and Vulnerabilities of a network Type your name here 2/28/2011 Contents RUNNING HEAD: NETWORK security 1 Threats and Vulnerabilities of a network 1 Type your name here 1 2/28/2011 1 Contents 2 Abstract 4 Problem Statement 4 Research and Analysis 5 Introduction to Network security 5 Why Network security?... hellip; 5 Threats and Vulnerabilities to a network 6 Threats to a network 6 Types of Vulnerabilities 9 Network security Policy 10 Firewall 11 Internet Protocol security 11 References 13 Abstract Networks from the time of their birth have come a long way....
9 Pages (2250 words) Research Paper

Medium and Profession

hellip; This paper analyses three professions that I did not know about in the Internet medium: network architecture, information security analysis and telecommunications specialty.... Information security Analyst The roles in this career include planning, developing, implementing, upgrading and monitoring of security measures so as to protect the Internet network systems from security risks (BLS 128).... Therefore, this career cuts across the various stages of the process of production, but particularly plays a critical role during distribution, when the Internet system gets exposed to security risks....
3 Pages (750 words) Research Paper

E-Commerce Insider Threats

Although, the implementation of e-commerce brings a lot of benefits to the… However, huge works and efforts have been done to manage and implement the effective security for the corporation and business information.... Furthermore, the management of the business information security and operations has turned out to be a main task in business.... The main difficulty of monitoring against the business information security threats has been an important aspect of the literature, and business information system development (Shaw, Ruby, & M....
4 Pages (1000 words) Research Paper

Security Management

Following attacks of 9/11 and other series of attacks and threats of attacks, security features in buildings and sites have become important.... While architects… engineers endeavor to use the best skills that ensure optimum building and site security, Information Technology is the other area that IT experts spend a lot of time and resources trying to protect organization information.... security sector of an organization is never an exception....
17 Pages (4250 words) Research Paper

Free Radius Distribution for Linux OS

Most significant use of Free Radius as a security program is for the specialized Wi Fi networks.... It produces its own security certificates and compatible for all protocols used (Urpi, 13).... On the internet world, FreeRadius is most reliable solution for cyber crimes as it has multiple ways of solution against cyber crimes....
2 Pages (500 words) Research Paper

The US Department of Homeland Security

The Criticalness of Cyber security and DHSs National Role W/Obama Quote.... On 12th February 2013, Obama passed an order to enhance the critical infrastructure of cyber security in the US.... This order passed by Obama supported in building, developing as well as maintaining public-private relationships with other partners and operators to create risk based cyber security system by sharing different information.... According to Obama, the role of cyber security and the Department of Homeland security (DHS) is to improve the infrastructure of the framework of cyber security by transferring the required information related to the protection of cyber threats and following proper guidelines as well as rules (Waltzman, Giancarlo and Webb 1-4)....
9 Pages (2250 words) Research Paper

Internet Security: Privacy and Confidentiality

This paper “internet security: Privacy and Confidentiality” is an attempt to analyze the present concerns regarding privacy and confidentiality issues as applicable to human resource departments in organizations and government offices which use Web-based applications.... hellip; The paper discusses the evolution of the Human Resource functions to internet-based applications, the implications of consequent present-day vulnerabilities like hacker attacks, and the ever-increasing rates of cyber crimes....
20 Pages (5000 words) Research Paper

The Challenges in the Internet of Things

BackgroundGiven that the nodes of IoT are of low communication speed, less computation power, low storage, and naturally heterogeneous, it requires forward and backward secrecy, smooth control of the data access, confidentiality, integrity, and scalable security algorithms.... The phrase 'security' normally involves different concepts; for instance, security connotes the basic security services provision, which involves availability, confidentiality, non-repudiation, authorization, integrity as well as authentication....
16 Pages (4000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us