StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Attacks and Internet Security - Annotated Bibliography Example

Summary
The paper  “Computer Attacks and Internet Security ”  is an actual example of an information technology annotated bibliography. The article "Firewalls and Internet security: repelling the wily hacker" by William, R. discusses the effects and the challenges posed by hackers on the internet. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful

Extract of sample "Computer Attacks and Internet Security"

Internet Security Name Institution Date Internet Security: Annotated Bibliography William, R. (2003). Firewalls and Internet security: repelling the wily hacker. Addison- Wesley: Longman Publishing Co., Inc. The article discusses the effects and the challenges posed by hackers on the internet. Wiley hacker has been identified in the article as one of the threats to internet security. The article has also identified firewall and other measures that can be used to deal with the internet threats. The article provides useful information to the computer technicians and the members of the public in terms of dealing with the threats posed to the internet security and their effects on the users. Householder, A. et al. (2002). Computer attack trends challenge Internet security. Computer Journal, 35 (4) 5-7. The authors of the article provide an analysis of the trend the internet threat. The article identifies that the threats to the computer is increasing with time. It also provides the analysis of the challenges faced by the users when dealing with the threats. The article is important to the users in terms of dealing with the challenges that are posed by the internet security. It provides important information to the users on how the challenges can be dealt with based on the past experience. The trend also provides information to the users regarding the threats and thus providing the information on how it should be dealt with. Shirey, W. (2007). Internet security glossary, version 2. New York: McMillan Publishers. This article discusses the issues of computer security in relation to the threats that are encountered by the users when operating the computers. It has a list of threats to the computers when using the internet. The article provides useful information on how each of the threat can be dealt with. This article is useful to the computer users as it provides the measures that they can take to deal with the computer threats. The impact of each threat has also been outlined in the article and hence providing important information to the users regarding the effects of the threat. Leavitt, N. (2011). Internet security under attack: The undermining of digital certificates. Computer Journal, 44 (12) 17-20. The article highlights the information regarding the importance of the digital certificates in relation to the internet security. It highlights how the digital certificates are important in terms of combating the internet security. However, the article also brings to light the fact that the digital certificates are being undermined. This article is important to the internet users as it creates awareness of the importance of the digital certificates to the users in terms of combating internet security. The concepts of the article also enlighten the users on the importance of obtaining genuine tools for dealing with the internet security. The article also highlights the consequences of not using the genuine certificate when dealing with the internet security issues. Brenden K. et al. (2013).Internet Security and Networked Governance in International Relations. International Studies Review 15 (1) 86-104. The writers of article give details about the issues of governance when dealing with the internet security. It highlights how the lack of governance is undermining the issues of dealing with the internet security. The article also explains how the internet security issues are more of voluntary due to the lack of proper governance. The information provided in the article is important to the stakeholders in terms of designing the governance structures that will help in the fight against the threats in the internet. The article also enables the stakeholders to come up with mechanisms that will lead to improvements in the areas of weakness. Some of the concepts highlighted in the article are closely related to those of householders. Tiwari, S. et al. (2012) Internet Security Using Biometrics. Technologies and Protocols for the Future of Internet Design 20 (12), 114. The writers of the article discuss the use of the biometric features when dealing with the internet security. The biometric security features are used to identify the users before they are allowed to use the computers. The article also explains ho the use of the biometric features is important in eliminating the unauthorized access and hence the protection of the information. The article provides important information to the users on how they the can utilize their biometric features to protect vital information in their computers. The users also benefit from the information provided by the article as it educates them on the advantages of using the biometric features to protect their data and how they ca eliminate the unauthorized access. Lichtenstein, S. (2012). Development of organizational internet security policy: a holistic approach. Statistical methods in computer security, 20 (5), 1-21. The author of the article provides information regarding the formulation of the policies that can be used for the purpose of dealing with the internet security. It also identifies some of the approach used by organizations when coming up with the policies for developing the internet security. The strengths and weaknesses of the policies are also provided in the article. The article is thus important to the organizations as it provides them with the information that can be used to come up with guidelines. The approach highlighted in the article can also be used by the organizations to correct their procedures in terms of developing the internet security policies. Carlsson, N. et al. (2010). Leveraging Organizational Etiquette to Improve Internet Security. Journal of Computer Communications and Networks (ICCCN), 6(2), 45-51. The organizational etiquette is important when dealing with the internet security within an organization. This is an important concept that has been highlighted in the paper. The authors of the article also identifies that the etiquette within the organization is important as some of the internet security issues are contributed by the employees. It therefore highlights some of the measures that the organizations can take to deal with the issues. The article provides important information to the organizations regarding how the etiquette issues should be enhanced. It also provides important information regarding the importance of the policies within the organization. The article has some similar concepts to that of Carlsson et al in terms of the policies within an organization. Sevan, K. et al. (2012). Awareness of security threats and legal responsibilities of internet connection and wireless broadcasting. AWERProcedia Information Technology and Computer Science, 2 (6), 41-45. The authors of the article identify the internet security issues in relation to the wireless broadcasting. It also identifies the legal issues in relation to the internet security. Some of the issues identified are important for the purposes of ensuring that the individuals are able to take legal steps when dealing with internet security. The legal responsibilities are also identified in the article. The article therefore provides important information to the users and how they can take legal responsibilities when dealing with the internet security. The concepts of legal responsibilities are also important to the users as it enables them to know the legal actions that they should take incase of the internet security threats. Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. New York: Academic press. The article discusses the concepts of computer crime in relation to the internet security. It identifies the issues of crime that are committed through the internet with the use of the computers. The article also identifies the steps that should be taken during the investigation of the computers that have been used to commit the crimes. It also attributes some of the crimes committed within an organization to the employees who are not ethical. However, the article gives some guidelines to be used when dealing with the issue. The article is important to the organizations and users in terms of dealing with the criminal activities that are committed through the use of the computers. The article is thus applicable to organizations which are facing the risk of security threats and criminal activities committed by the employees. References William, R. (2003). Firewalls and Internet security: repelling the wily hacker. Addison-Wesley: Longman Publishing Co., Inc. Householder, A. et al. (2002). Computer attack trends challenge Internet security. Computer Journal, 35 (4) 5-7. Shirey, W. (2007). Internet security glossary, version 2. New York: McMillan Publishers. Leavitt, N. (2011). Internet security under attack: The undermining of digital certificates. Computer Journal, 44 (12) 17-20. Brenden K. et al. (2013).Internet Security and Networked Governance in International Relations. International Studies Review 15 (1) 86-104. Tiwari, S. et al. (2012) Internet Security Using Biometrics. Technologies and Protocols for the Future of Internet Design 20 (12), 114. Lichtenstein, S. (2012). Development of organizational internet security policy: a holistic approach. Statistical methods in computer security, 20 (5), 1-21. Carlsson, N. et al. (2010). Leveraging Organizational Etiquette to Improve Internet Security. Journal of Computer Communications and Networks (ICCCN), 6(2), 45-51. Sevan, K. et al. (2012). Awareness of security threats and legal responsibilities of internet connection and wireless broadcasting. AWERProcedia Information Technology and Computer Science, 2 (6), 41-45. Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. New York: Academic press. Read More

 

Read More

CHECK THESE SAMPLES OF Computer Attacks and Internet Security

Computer Security and Risk Awareness

… The paper "Computer security and Risk Awareness" is a good example of a finance and accounting assignment.... The paper "Computer security and Risk Awareness" is a good example of a finance and accounting assignment.... Therefore, when designing a computer system in an organization a security system should be well chosen for the safety of sensitive information in the organization.... Nowadays this has not been a major problem due to the advancement of security systems that have been very effective in data protection....
9 Pages (2250 words) Assignment

State-Based Network Intrusion Detection System

This accounts for the need for security technology that can monitor systems and identify computer attacks.... Conventionally, to secure computer systems, programmers resorted to the creation of a protective “shield” – so to speak – around these systems by way of design security mechanisms such as firewalls (see Lodin & Schuba), authentication mechanisms, Virtual Private Networks (VPN).... Conventionally, to secure computer systems, programmers resorted to the creation of a protective “shield” – so to speak – around these systems by way of design security mechanisms such as firewalls (see Lodin & Schuba), authentication mechanisms, Virtual Private Networks (VPN)....
49 Pages (12250 words) Assignment

Review of Types of Security Threats and Software Tools Designed to Protect Computer

… The paper "Review of Types of security Threats and Software Tools Designed to Protect Computer" is a perfect example of a finance and accounting article.... In order to design the security of a system, it is necessary to understand the types of threats and attacks that can be mounted against a computer system, and how these threats may manifest themselves.... The paper "Review of Types of security Threats and Software Tools Designed to Protect Computer" is a perfect example of a finance and accounting article....
10 Pages (2500 words) Article

Activities for Systems Security

As a consequence, a number of issues with respect computer and data/information security are becoming imminent coupled by the efficiency of these IT resources.... It is therefore worth to note that computer systems security controls are important in today's world of computing.... As earlier mentioned, the security IT security issues of concern revolves around three main areas; physical, human, and electronic.... Physical security comes into focus as the computer equipment and other resources may be stolen by the staff, students, and/or other employees within the institution....
11 Pages (2750 words) Essay

Information Security Contemporary Issues

… The paper "Information security Contemporary Issues" is a wonderful example of a literature review on information technology.... The aim of this project is to look at contemporary issues in information security with the purpose of discussing threats and developments that have been witnessed in information security.... The paper "Information security Contemporary Issues" is a wonderful example of a literature review on information technology....
7 Pages (1750 words) Literature review

Security Issues in E-Commerce

To respond to this tendency, the problems of internet security in online trading and consumer websites have to be frequently assessed.... To respond to this tendency, the problems of internet security in online trading and consumer websites have to be frequently assessed and suitable measures formulated.... … The paper "security Issues in E-Commerce" is a great example of E-Commerce coursework.... The paper "security Issues in E-Commerce" is a great example of E-Commerce coursework....
9 Pages (2250 words) Coursework

Business Information Systems

Vulnerabilities of assets refer to the flaws in the assets of an organization; or in the words of Lenaghan and Onwubiko (2007), it is the absence of controls in security that could result in a breach in the security of the assets when they are exploited by threats.... Vulnerabilities of assets refer to the flaws in the assets of an organization; or in the words of Lenaghan and Onwubiko (2007), it is the absence of controls in security that could result in a breach in the security of the assets when they are exploited by threats....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us