StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internet and Security - Coursework Example

Cite this document
Summary
A paper "Internet and Security" claims that Thomas contradicts the hope that the destruction of the Berlin wall brought to the noble relations of countries (Friedman, 67). On 9/11, there was terror and anguish. Attacks pioneered by Osama bin Laden pain and muddle in the universe…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Internet and Security
Read Text Preview

Extract of sample "Internet and Security"

 Internet and Security A) The World is flat 1) The security concern expressed by Thomas Friedman in his book, “The World is flat” is the threat of terrorist groups like Al-Qaida. Thomas celebrates the flattening of the world, which could otherwise be termed as globalization, but suddenly notes the crises involved in the benefits of an interconnected universe. In chapter 15 of the book (11/9 versus 9/11), Thomas contradicts the hope that the destruction of the Berlin wall brought to the noble relations of countries (Friedman, 67). On 9/11, there was terror and anguish. Attacks pioneered by Osama bin Laden pain and muddle in the universe. He notes that the precise tools that are used for flattening the world (technology) are the same tool that can be used to unflatten the world. Responsible use of technology builds the universe while selfish use of the same technology destroys the world and keeps societies distant. The other security concern is economic security of the American people. The author expresses concerns that the American place as the economic power house is threatened because of the attitude of the citizens and the government. The government spends mindlessly on wars and neglects the fundamental economy of the states. The citizens on the other hand idolize ideas and opinions that cannot bring economic growth to the nation. They, for example, idolize Britney Spears while their serious competitors idolize the resourceful Bill Gates (Friedman, 32). 2) Three ethical concerns outlined in “the World is flat” are: Social injustice in the global economic system: Thomas notes that the flattened world has caused a caste-like system where wealthy states are getting richer while the poor countries are languishing in more poverty. Trade is focused between rich states while the poor countries are sidelined. The concern is that populations in poor nations will languish in perpetual poverty. Misuse of borrowed technology: The author loves the rate of labor transfer, and the numbers of people coming from other countries in quest of knowledge in the USA. He regrets the misuse of this acquired knowledge, for example, in the 9/11n attack. The mastermind of the attacks, Osama, received his education in the US. The third ethical question insinuated in the story is unlawful labor outsourcing. It creates jobs for some but breeches professional ethos in some areas. By the time of publication of the book, there were no stringent laws regulating the business. An example is the online writing of assignments for some students by others. B) Ethics and Security 1) Security awareness training communication plan Date Topic Details Everyone is a Target Create awareness that everyone is a possible target of cyber crime, and everyone needs to take guard Social Networking Explore ways of ensuring safety by controlled sharing of information over social networks Browsers Educate on the available browsers, their security meter in safeguarding transmitted information Passwords Importance of securing systems and sites with passwords Armature cracking of insecure passwords Choosing secure passwords Encryption Explore the reasons for encryptions Choosing the right protocol for securely encrypted data Email and AIM Security of email sand AIM accounts Elaborate how to use the right firewalls for email safety Smart Phones and Mobile devices Show the security risks involved in accessing high confidentiality sites via smart phones and other mobile devices 2) How to safeguard children from online predators Online bullying and predation on children has become a vastly spread phenomenon and is a source of worry to eexact caring and responsible parents. To avert worse effects of this delinquency, parents are advised to place the family PC at an elevated, visible place. Monitoring the sites a child is visiting from a distance becomes possible. The fear of being witnessed defy parental orders keeps the child at bay from browsing family forbidden sites. Parents need to advise or help their children pick instant messaging and chat-room names that draw little attention. Guiding a child through which chat rooms to avoid also helps safeguard the child’s interests. A child, therefore, evades the probabilities of meeting a sex minded bully or cyber criminal online. Children need lessons from their parents about the safety of internet. A general consensus that the internet is not safe should be reached between the parents and their children. Anonymity provides a false sense of security. The truth about web based location sensors is necessary for the young ones so that they understand that they are not invincible. Online predators can use the same tools to monitor their moves and harm them. The most crucial of all is that parents should make a step to understand the use of computers and the cyber crime. Parents have heavier convincing power when their children know they understand what they are warning about. Parents should not assume that their children know the dangers of internet. Involving the offspring in the discussion even when they look knowledgeable enough may help. Despite the restrictions and boundaries that parents are herein advised to try out, high-handedness will worsen a situation. Parents, therefore, should exercise these restrictions with caution and wit. Pushing a teenager too forcefully from what he enjoys gets him deeper into the offending habit. C) Online Predator Threats 1) Tools for controlling child online predation Parents can use commercially available filtering and monitoring software to control the websites that a child can access. These tools have the functionality to locate the exact location of computer user miles from the tracker. Parents use this tool to know the boundaries within which a would-be offender is, and prevent the possibility of an ugly scenario. Parents can block access of some social sites. Parents, therefore, protect their children from accessing websites that contain harmful contents such as pornography and precarious chat sites. Parental controls enable parents to restrict the use of computers for desired purposes. A parent has the authority to keep the children do academic work alone even if he is out of sight. A password that a child cannot decipher makes this kind of control tool effective and reliable. 2) Comparing and Contrasting Tools used to minimize online Harassment and Theft Examples of tools for reducing online harassment and theft are IP2Location and IP2Proxy. Both offer a complete XML web based API. The principle difference between the two is that IP2Locator has the functionality of analyzing weblog statistics, enabling the user to understand his target better by geographical location; IP2Proxy lacks this function. IP2Locator contains model code examples for simple incorporation. It computes the distance between the source and destination locations. This web based filter pin points the exact location of a customer with information about the country, latitude and longitude and states. IP addresses provide all that information. These functions make IP2Locator an effective tool to get the exact location and arrest a cyber criminal. So far, the IP2Locator has not been awarded any prize. Reference Friedman, T. L. (2007). The world is flat: A brief history of the twenty-first century. New York: Picador/Farrar, Straus and Giroux. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Internet and Security Coursework Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1610823-see-details-below
(Internet and Security Coursework Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1610823-see-details-below.
“Internet and Security Coursework Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1610823-see-details-below.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internet and Security

Importance of Internet Security

Internet security Name: Course: Tutor: Date: SECTION A 1.... This question is concerned with basic terminology in computer security.... (a) What are the main goals in computer security?... The main goals of computer security are Confidentiality- entails verification of information's privacy.... It is very crucial to ensure that any system downtime is not attributed to security compromise.... Vulnerability in computer or information security is a loop hole or a weakness that can be exploited by an attacker to compromise the security of the computer system....
17 Pages (4250 words) Coursework

Personal Security and The Internet

With the internet, almost all aspects of operations including business, security and communication have gone immense revolutions.... As compared to two decades ago, today the world faces unique security and privacy issues that were not there before the introduction of the internet.... The result is that people have developed some behaviors that are detrimental to the security and privacy of the internet users worldwide (Gralla, 2006).... This paper begins by looking at the manner in which the internet influences the lives of human beings....
12 Pages (3000 words) Research Paper

Controlling the Internet

This essay "Controlling the internet" answers the question should the internet be subject to controls, including new legislation, greater policing, and the use of filtering systems, so as to prevent its use for allegedly harmful purposes.... hellip; The internet as part of Information Technology which plays a significant role in the development of our society has become an essential element of our lives, government, education, research, and across diverse sectors of our society....
10 Pages (2500 words) Essay

Information Technology

To improve security there is a need for system designers, system administrators and decision makes to come up with tough policies and security related procedures which should make it very hard for hackers and cyber criminals to penetrate computer systems.... Internet security has become one of the most discussed issues in this era of information technology.... Internet security has become one of the most discussed issues in this era of information technology....
8 Pages (2000 words) Essay

Impact of Censorship and the Internet

Censorship refers to crime prevention on the Internet; the following steps can be taken in this respect:Develop effective Internet and Security policies for all websites to be implemented.... In the paper “Impact of Censorship and the internet”, the author looks at the internet as a forum that not only allows pure and free speech but has also contributed to the development of those ideologies that have to lead the courts to make decisions in critical moments....
3 Pages (750 words) Assignment

Social Media Platform

In terms of its security, there are aspects that deem a great deal of attention especially since the people all over the world make use of it and hence have to be sure that they are using a website which… The four aspects of security are regarded as Privacy, Authentication, Integrity and Nonrepudiation.... Privacy is related with how Facebook users prevent disclosing their respective information to people who are unwanted and have no say Internet security Facebook is a social media platform that is renowned all over the world....
2 Pages (500 words) Essay

Is Mass Surveillance Ever a Good Thing

Countries have adapted the system as part of their security procedures.... There is the issue of national security verses the bill of rights in that other may argue on the impact mass surveillance may have on their right to… The country would prefer national security and utilize it to advance in the quest of keeping vigil to all citizens within their territorial jurisdiction.... Bush (2006) attributes the effect of mass surveillance to national security....
7 Pages (1750 words) Research Paper

Organizational Security in the Internet

Understanding what the threats are with the internet and how it is linked to organizational security and finding different alternatives to begin to secure organizations required to use technology and the Internet will also provide better solutions for those linked to IT.... he first major types of threats seen from the internet and organizational security come from the internal environment and how end-users use technology.... The paper "Organizational security in the Internet" tells that businesses face higher risks because of the use of technology required for better living....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us