StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Personal Security and The Internet - Research Paper Example

Cite this document
Summary
This paper begins by looking at the manner in which the internet influences the lives of human beings. It will explore both the negative and positive effects of the internet. The paper also explored the online fraud cases that are associated with the internet in business organizations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Personal Security and The Internet
Read Text Preview

Extract of sample "Personal Security and The Internet"

 Personal Security and the Internet The internet is one of the greatest innovations of the 20th century. With the internet, almost all aspects of operations including business, security and communication have gone immense revolutions. The internet has made the traditionally manual works simpler and cost effective. However, the internet has its ugly side too. Ranging from its vulnerability of attacks by viruses and malware to intrusion of personal information by fraudsters for malicious reasons, the internet can prove to be a dangerous tool. This article will explore some of the issues involved in the security of the internet and its implications on businesses, personal identity and the learning process in children. This paper begins by looking at the manner in which the internet influences the lives of human beings. It will explore both the negative and positive effects of the internet. While we owe the internet for creating the easier communication tools, it is also a platform for orchestrating hate, bullying and cyber crimes against innocent users. The paper also explored the online fraud cases that are associated with the internet in business organizations. These include computerized and internet auction frauds. These are channels through internet frauds are orchestrated. The paper will then find out the ways of protecting internet frauds before identifying the precautions that can be taken to avoid internet frauds. Some of the threats to the internet with a potential of damaging the user’s computers such as viruses and malwares and how to prevent them will also be discussed. Finally, it is necessary to provide conclusion whereupon the details of the findings will be summarized. Introduction The 20th century technological breakthroughs could never have been complete without the internet because it has played a significant role in changing the lives of people within this generation. It has enabled people to apply information with ease, to study without difficulty and communicate effortlessly. Apparently, the internet has made it possible to access huge and diverse amount of information without making many efforts as was required in the past. It also facilitates faster intake and processing of information However, the internet has its own setbacks as well. Some of these setbacks are so harmful and have the potential of causing many risks to users of the internet. As compared to two decades ago, today the world faces unique security and privacy issues that were not there before the introduction of the internet. With the escalation of the internet, such entities as advertising firms and spammers that are associated with it have emerged as well. Apparently, the internet has several applications such as data compilation, use of tracking and other techniques. The application of these has brought in more weird behaviors like hacking of some sites in the internet. The result is that people have developed some behaviors that are detrimental to the security and privacy of the internet users worldwide (Gralla, 2006). How the Internet influences our lives It is true that the internet has changed the lives of people who are living in this generation almost completely. Through the internet, communications have become easier as it has facilitated efficiency in communication. Even without a physical television, one can still watch TV online and be able to get faster news. The internet has also made it easier to connect with people from whichever part of the world that they are in. through, emails, text messaging, video charts and the use of the social media like face book and twitter, it is now possible to share ideas, information, pictures, events and videos through the internet. In the past, somebody had to write a letter that could take ages to reach its destinations. Besides, the existence of Skype, messenger chats and other applications like Whatsapp has enabled people to have casual conversations with one another. Young people are the most consumers of the social media. As a result, there have been increased interactions among people of this generation (Dempsey, 2010). The internet has also enabled users to determine to watch only things that interest them instead of watching the whole television episodes as it was in the past. One only has to download his most favorite and entertaining scenes like games, movies and music and watch at his own time and pleasure. As a result, the internet has influenced how people use their time. Additionally, instead of engaging in the tiresome effort of looking for a director or an agent for someone to showcase his singing or acting prowess, he can as well do it by himself and then send the details to them by use of the internet for evaluation. In this case, the internet contributes in developing talents for young people (Dempsey, 2010). Just like every other thing, the internet has also its down turns. The internet allows any person to post anything on it without verification. When wrong persons access this information, it has the potential of destroying their lives if they follow the advices. The internet has also contributed to isolation of some people. Apparently, some people have over relied on the social media to chat and meet with friends and consequently stopped meeting people physically. As a result, they tend to live in an imaginary world. In this way, the traditional social platforms are gradually falling vacated and people are losing communication skills. Some people spend a lot of their time in the internet posing negative implications on the other aspects of their lives. At the comfort of one’s home, somebody can attend school online, do shopping online or even pay for their bills online. As a result, people abandon their lives like going exercises or even taking a walk (Ciampa, 2009). The internet has also negative influences on the people’s social interactions. Since it does almost everything for people, they have become lazy and rarely interact. Additionally, the internet has ensured online freedom. This is where people have the freedom do or say whatever they want on the internet without fear of suffering consequences for such actions. Consequently, several discrimination cases have been reported from the internet because fundamentalists as racists and sexists express their fury and hate against their victims without any fear. They do it under the disguise of the distance. The internet can also fool the potential victims of criminals. Since the internet makes it possible for one to chat with strangers from whichever part of the world, some people can take advantage of this process and advance their criminal activities on their potential victims. Some people normally hide their identities while chatting online, and later take advantage of their victims. For instance, some pedophiles might begin by building online relationships with minors in the disguise that they are of the same age. With the escalation of the online games, people tend to abandon their real lives as they engage in imaginary characters as heroes in the games. In the end, such institutions as the family, education and jobs become casualties (Ciampa, 2009). Online fraud cases While the internet assists in many ways, it can also be a safe haven for criminals. There has been an escalation of internet fraud cases for a while now. Internet fraud describes the application of services from the internet and internet access software to take advantage of victims or defraud them of their personal information, also referred to as identity theft. The advances in business related technologies have enabled better communications of products and services especially among the business people. Consequently, it is now possible for business clients to enjoy online shopping than was ever before. The fact that most business organizations have ensured legitimacy and honesty in their online dealings with clients has not been good enough. The technology of the internet has also encouraged criminals as well. Apparently, the setting up or closing of a website can be done with relative ease. This makes the processing capability of transactions simple as well. Therefore, the internet criminals find leeways upon which they perpetuate their internet crimes on online shopping customers. As this process takes shape, it is described as fraud. Some of the common means upon which fraud occurs include message boards, chart rooms and websites (Chander, Gelman, & Jane, 2008). Online fraud normally occurs in three ways. The first way is by using an internet component for fraudulent solicitations presentations on potential victims. It can also occur when a component of the internet is used in conducting transactions that are fraudulent in nature. Finally, a component of the internet can be used in the transmission of frauds proceed to institutions linked to the scheme such banks. Some of the channels highlighting fraud are presented below (Chander, Gelman, & Jane, 2008). Computerized fraud The use of deception for the acquisition of money, goods or services amounts to fraud. The escalation of internet use means that many commercial things can be done online. As this takes place, fraudsters are also out to look for opportunities to exploit the customers’ earnings. The type of information contained in credit cards can work against the owner if it lands in the hands of a fraudster (Chander, Gelman, & Jane, 2008). Internet auction fraud Many websites that conduct auctions have emerged lately. This has also given opportunities for internet fraudsters to emerge as well. Many people have fallen victims of this kind of fraud. The easiest way to avoid fraud of this nature is to ensure that the companies that conduct online shopping activities have insurance covers. The website company must also be proved real and operational. Apparently, some people create websites without real companies and goods to be sold. For unsuspecting customers, they will receive money and vanish without delivering any products to them (Chander, Gelman, & Jane, 2008). Online buying from a website can be very tricky at times. No matter how secretive the details of a credit card will be, delivering goods purchased from the supermarket require the submission of the credit card information to the seller. Some fraudsters take advantage of this and deceive unsuspecting buyers into disclosing their credit card details only to disappear with their money. Apparently, most genuine websites use secure transactions for the collection and storage of details of the credit card. It is important that customers are aware the identity of such websites. For instance, the use of a padlock symbol somewhere in the website is an indication that the website is protected meaning that it cannot give away the details of the customers. Investment fraud Companies are taking advantage of the popularity of the internet to come up with several investment schemes for their benefit and intention of enhancing efficiency. In this regard, they develop websites that looks for investors while offering returns that are so fantastic. However, fraudsters have not allowed this opportunity escape them as well. They have also opened up websites with beautiful and flashy interfaces to lure investors into putting their money. The moment they succeed in fooling their target investors, they disappear together with the website only to open it later under a different name. The customers must be very careful and desist from basing their judgments on appearances. Genuine websites must have carefully realistic terms and conditions. One of the reasons why fraud cases are increasing is because of the laxity of the victims in reporting the fraud cases. Many people do not seem to be aware that fraud is a crime. Therefore, they let the fraud cases go unreported. This only serves to encourage the fraudsters to continue engaging in their crimes. It is against this backdrop that people should be encouraged to report all case of fraud for subsequent investigation and prosecution (Chander, Gelman, & Jane, 2008). Detecting online frauds The nature of the internet together with its global network can present a challenge in detecting internet fraud. However, depending on jurisdictions, some crime prevention agencies have several devices for detecting online fraud. Security agencies in many states of the world have employed staff members who are well versed with the latest technological changes and computer software. The technocrats seize potential evidences from computers and rebuild it to identify the cases of fraud. However, the most viable approach at reducing online fraud involves making the people aware of this crime. This can be done by paying regular visits to learning institutions and create awareness amongst pupils and students who are the victims of crime. Some of the most common forms of online fraud are cyber bullying. This can be through sending of cruel messages and messages to victims to hurt the victim. Detecting this time of crime might be difficult since some victims choose to suffer in silence. The internet can also facilitate communication between children across jurisdictional boundaries. Such criminals as sexual offenders normally take advantage of this process, and sexually abuse their victims. This kind of inappropriate behavior online on the internet is called grooming (Dempsey, 2010). Precautions against internet crimes As a way of preventing internet crimes, the most advisable thing is to ensure the safety of the victims. The parents and teachers should assume some roles that will protect their children since they are usually victims. It is important that parents regularly monitor the internet sites that their children visit to establish if they are safe. The children should not be allowed to access their computers in areas that appear hidden from their parents. Additionally, the children should acknowledge that not everybody on the internet should be trusted meaning that they should be forbidden from meeting strangers in the internet. Parents must also install their computers with special software that is able to restrict accessing adult websites by their children. Amidst all these, it is important that children get accustomed with personality details. Such personal details as phone numbers, addresses and the names of their schools or residences must never be shared with strangers whom they meet online (Dempsey, 2010). Threats on the Internet The internet has several threats that include malware, viruses and spyware. Malware is both a spyware and an adware’s generic term. Its installation can take place without the knowledge of the user. Some of the entry points include paying a visitation to some websites that are compromised, installation of a program and opening of an email. The sources of the malware are able to exploit all the vulnerable areas of the operating system of the PC for installation of software or remote access. The benign malware forms allow for advertisement software installation with pop-up displays during internet browsing. It can also be used for allowing illegal material sharing and copyright information (Dempsey, 2010). The installation of keyloggers allows malware to identify theft. It helps to record the actions of the mouse together with any key pressed. As this is done, the passwords and the username together with the details of the bank can be easily captured before being channeled to a remote hacker. Fraudsters use this information to transfer funds from other people’s bank accounts. As keyloggers are discovered, the user will be forced to change the details of his or her password. Additionally, malware will slow down a PC and leads to reduced productivity (Dempsey, 2010). Viruses Viruses are spread through emails that usually come with attachments. At times, the message body of the email itself causes viruses. Viruses are also spread through web pages that come directly from a network. Infected files like documents found in the Microsoft Soft Office and other external devices like USBs and discs transport viruses. This means that computers are always at a risk of catching a virus especially when connected to the internet. The viruses act differently. Some stay for very long periods before showing their activities while others spread to other files and documents just within weeks or months. In both cases, they can lead to serious problems to the computer. To guarantee the best health of a computer, it is advisable that one runs a hard drive scan once every week. Other smaller scans like local folders and spamware, adware and spy can also ensure good health of a computer (Dempsey, 2010). Spyware Spyware is a kind of malicious software that installs in the computer by itself without the user’s consent. It uses the computer for the generation of profit for those who make the software. Some even track the way one uses the computer and then reports any wrongdoing to the manufacturer of the software. Some even use the computer for accessing the website, calling premiums and advertisings promotions. Their actions only enabled them to be identified upon the slowing down of the computer. Spyware is becoming a common problem today (Dempsey, 2010). Latest software and hardware protection Protecting software and hardware is a challenging task. However, one has to enable a firewall and have an antivirus that is updated to run the program. Malware applications Spybot & D and Malwarebytes should undergo weekly updates to run the malware. Spybots S & D use TeaTimer for real time protection. It enables the computer to be protected against spyware all the time. Other malicious programs that might install themselves without the knowledge of the user are also protected. However, the surest way of software protection is using DVD and CD for transferring data and then storing it safely. One can also buy an external drive for storage (Dempsey, 2010). Whereas some of these risks can be avoided, others must be accepted as they are. This is recognition of the fact that the global business status of the world today has made it almost impossible to operate without the internet. Therefore, the only way of avoiding insecurity issues associated with the internet is by taking precautions on the amount of the personal information that one should post in the internet. By limiting the amount of information that one posts on the internet, one can effectively protect their personal information. Additionally, one can protect his personal identity in the internet by avoiding carelessness. Such actions as keeping off the Windows Firewall and having a virus scanner that is real timer and a web filter can go a long way in protecting crucial data from damaging from a user’s computer. To this end, malware bytes and antivirus can effectively assist. Conclusion The internet is a platform where individuals and organisations develop, share, process and store information. With well guided risks, the internet is able to handle personal and sensitive information for an individual and an organization. Some of the internet operations require registration of personal data. Therefore, it acts as a storage platform for personal information data. However, the internet is prone to many problems that range from malicious attacks and protection and security concerns. Information on the internet is not always guaranteed full security and protection. In this effect, several software has been developed such as anti-malware, anti-virus and anti-spyware to cushion personal data in the media from attack. Nonetheless, this depends on the responsibility of the user. The use of the internet for safer processing of information comes with some level of risks. References Chander, A., Gelman, L., & Jane, M. R. (2008). Securing privacy in the Internet age. Stanford, Calif. : Stanford University Press. Ciampa, M. (2009). Security Awareness: Applying Pracitical Security in Your World. Boston, MA : Cengage Learning. Dempsey, J. S. (2010). Introduction to Private Security. Belmont, CA : Cengage Learning. Gralla, P. (2006). How Personal & Internet Security Work. Indianapolis, Ind.: Que. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Personal Security and The Internet Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1478043-personal-security-and-the-internet
(Personal Security and The Internet Research Paper)
https://studentshare.org/information-technology/1478043-personal-security-and-the-internet.
“Personal Security and The Internet Research Paper”, n.d. https://studentshare.org/information-technology/1478043-personal-security-and-the-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF Personal Security and The Internet

Fear and Loathing on MySpace.com

The world of the internet has forever altered the social habits of our population Children no longer cruise the local drive-in or hang out in the mall.... Though MySpace has made a token effort to tighten their age restrictions, they are well aware of the loopholes in security.... ow easy is it for someone to pretend to be a different age or gender on MySpace According to computer security expert Richard Carlotti, anyone can do it.... He says, "If it is designed to be used by teen-agers, the security needs to be geared toward them, which means anyone with a 13 year old mind can subvert the system"....
8 Pages (2000 words) Personal Statement

Where I Am so Far in School

As a part of this, I got a chance to learn more about the practical use of internet and email.... This will give me better insight into the effective utilization of internet and email for communication both within and out of an organization.... Thus, undoubtedly, health and wellness are the foundation of personal development.... Thus, undoubtedly, health and wellness are the foundation of personal development....
2 Pages (500 words) Personal Statement

Personal Statement in the Field of Information Security

It has always been my long term dream to become a renowned Information security professional.... With the passion, I have in this field; it is my duty to ensure that am well equipped before entering to the field to… In this regard, it was within my biggest priorities to undertake an undergraduate degree program from MIT. I believe that your institution stands high especially on the field of security study program (MIT Para 2).... For this reason, I considered it to be Personal ment I would like to be at the top in the field of Information security....
1 Pages (250 words) Personal Statement

Global Political Economy a Marxist Critique

This is because it focuses mainly on economic interests, and refuses to look at other areas of cooperation, such as cooperation in maintaining global security, fighting poverty, improving the health standards of people, and maintaining food security.... This paper “Global Political Economy a Marxist Critique” seeks to answer the question as to why liberalism is the best theoretical framework that explains the concept of globalization....
10 Pages (2500 words) Personal Statement

Taking Cybersecurity Classes

Taking cyber security classes would increase my basis of knowledge in IT and related subjects thus allowing me to not only expand my area of expertise, but improve on the existing ones as well.... This business will be able to achieve this growth through the additional expertise I will gain from the cyber security classes.... Luay Assidmi suggested this particular program for my progression, and I believe the completion of this class will strengthen my abilities in online security....
2 Pages (500 words) Personal Statement

The Appealing Nature of Formulating and Practical Strategies

In the course of trying to understand his field of work, He was fascinated by the complex security exchange trading systems in which he spotlighted on.... In the course of trying to understand his field of work, I was fascinated by the complex security exchange trading systems in which he spotlighted on.... Owing to my fascination with the subject, Economics as a discipline will equip me with adequate knowledge to master market functionality and enable me to develop skills inherent in my personal endeavors in the business world....
4 Pages (1000 words) Personal Statement

Master Culture Management

Ever since, I developed a strong desire to pursue MA culture management.... My passion emanated from arranging small trips with my bachelors level… I helped them out to manage big events at school.... As a result, I have constantly sought to pursue my enthusiasm.... The rationale behind my pursuance of MA culture management results from its outstanding characteristics....
2 Pages (500 words) Personal Statement

Academic Interests and Learning Economics

I have often been interested in learning the impact economic decisions have on people's lives, and on a personal level how economic forces may impact my happiness, health, and security.... The author of this paper "Academic Interests and Learning Economics" states that s\he is more decided about the kind of life s\he wishes to lead and the kind of things s\he wishes to do, and the knowledge the author needs to acquire to fulfill his\her life goals....
1 Pages (250 words) Personal Statement
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us