StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Risk of Using the Internet - Essay Example

Cite this document
Summary
In this modern day and age, computers have revolutionized the way people interact with one another. Of the many developments in computer technology, the internet is likely one of the most significant to surface in the past few decades. The internet gives users the opportunity to research, communicate with others, and conduct monetary transactions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
The Risk of Using the Internet
Read Text Preview

Extract of sample "The Risk of Using the Internet"

Download file to see previous pages

Following this, the safety of one's self is also given great importance. With the internet, there are no such physiological needs that need to be fulfilled and it follows that the next concern would be security (Lester & Resnick, 2003). Often, people question the safety of the internet in various aspects. Is the internet truly safe Before tackling this issue, it is necessary to have a background on the internet. The internet is not simply about browsing through sites in the World Wide Web. It is a global network of computers and electronic devices which provides an avenue for these devices to exchange information.

In fact, any such device connected to the outside world through a network may be considered part of the internet. There is no doubt that most companies and even individuals use the internet in one way or another. Unfortunately, the widespread use of the internet also makes it suitable as an accessory for crime. Computers and the internet may make one's life more convenient but they may also put one's privacy in danger. Most people are unaware that their computers may be under attack from simply surfing the internet.

Computer users are inclined to think that they are anonymous and their identities are completely secure. However, this is not always the case. As a matter of fact, each computer is actually assigned with a unique address referred to as an internet protocol (IP) address. It is similar to a home address in the sense that it may be used to locate a computer within the internet. In fact, a computer may be likened to a house which typically has a front and back door. While the occupants of the house almost always ensure the security of the front door, the other door may be neglected.

Similarly, a hacker only needs to locate an open backdoor to break into a system. Computer users will not even notice that a hacker has established a connection to their system. A well-equipped hacker can do anything without the need to be in close proximity to his target (Branigan, 2005). Moreover, hackers can collect information from a computer within a short span of time. Personal information including passwords to secure accounts may be acquired, effectively compromising the privacy of the user.

Even with the presence of a firewall to protect the system, there are several more ways to infiltrate a computer. These include the use of viruses and the exploitation of bugs present in some web browsers. Any downloaded content involves the risk of getting one's computer infected (Branigan, 2005). Programs which are acquired through the internet may be viruses or may contain viruses which then attack a computer. At the very least, these viruses may simply be annoying. However, in more complex attacks, these viruses can be used to collect private information from a computer which can then be used in malicious ways.

Anti-virus software provides both preventive and active protection against such risks. However, as Branigan stated, the virus scanning software is only as effective as its virus definitions. It is therefore important to update the said software frequently. Unfortunately, despite attempts at improving the performance of such software, virus makers are able to produce more resilient code.One of the most popular crimes over the internet is online fraud. Electronic mail is a fast way to communicate with other people and is quickly

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Risk of Using the Internet Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
The Risk of Using the Internet Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1527181-the-risk-of-using-the-internet
(The Risk of Using the Internet Essay Example | Topics and Well Written Essays - 1000 Words)
The Risk of Using the Internet Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1527181-the-risk-of-using-the-internet.
“The Risk of Using the Internet Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1527181-the-risk-of-using-the-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Risk of Using the Internet

Internet Business

For some businesses, using the internet is not just an extension οf their normal business, it is a matter οf survival.... The objective 'f this article is to evaluate the risks businesses face by using the internet in sales, advertising, and other online activities.... This paper tells that the internet has become the "research tool" οf choice for many people.... the internet has given consumers the ability to secure much οf what they need for work, recreation, education, etc....
14 Pages (3500 words) Essay

Perform qualitative risk analysis using probability and impact matrix technique for the identified risks

TechnicalLack of experienceUse more reliable methods like tutorials on the internet.... TechnicalLack of experienceMitigate:Use more reliable methods like tutorials on the internet.... eemLow  LowYellow4Difficult project modules integrationDifficulty in using the software and installing the application in the mobile devices.... Difficult project modules integrationDifficulty in using the software and installing the application in the mobile devices....
1 Pages (250 words) Assignment

The Internet of Things

However, the implementation of this concept is by human beings hence creating the risk of inefficiency that would have been unavoidable if the whole process involved computers only.... In addition, the inventorying and cognition of these unique codes is through the application of computers and the internet of Things Internet of things concept by Ashton Kevin describes unique objects that have identityqualities placed together with their virtual figures presented in an internet structure....
2 Pages (500 words) Assignment

Risk Management

Financial risk management emphasizes on the time and the means to evade the financial risks by using the specific financial instruments used in managing costly exposures to risk.... This is especially to firms using financial tools in managing exposure to risks.... risk analysis, evaluation and management are the phase where the degree of the threats and their nature are This data is often the first input to decision makers to gage whether risks should be avoided and the most suitable and cost-efficient risk management procedure....
8 Pages (2000 words) Essay

Arguments Supporting Social Networking as Risky

Despite the dangers associated with internet platforms, people still disclose massive quantities of personal information, which is a risky behaviour.... The digital world is pushing an increased number of people into second lives.... The masses have to battle with privacy of their information, as… The web traffic information directed to college students, business, and online companies report a huge number of visitors sharing different types of information....
10 Pages (2500 words) Essay

Risks of Using the Internet

"Risks of using the internet" paper takes into consideration the myriad risks internet users face from cybercriminal activity around the world, and by examining what governments and internet builders are doing to get rid of or alleviate these problems.... hellip; internet users must be vigilant enough to keep their computer's anti-virus software updated with the latest improvements.... It is probably wisest if internet discussion forums are restricted to adults, in the inevitable case that cyberbullying, trolling or other malicious predatory behavior takes place....
5 Pages (1250 words) Coursework

The Internet and Increasing Criminal Risks

This study analyzes the relationship of the internet to the increasing criminal risks with regards what roles that this tool plays in the negative occurrence.... The author concludes until countermeasures are put in place, the internet remains a major factor of increasing criminal activities.... It is, however criminality which benefits from the internet.... nbsp; the internet has brought along negative effects as well.... Some of the negativities attached to the internet include breaching of privacy, cyber-related crimes, exposure to explicit content, deterioration of social standards, time wastage, and the emergence of the wrong lifestyles to mention but a few....
10 Pages (2500 words) Term Paper

Cloud Computing and Three Service Types

xplanation of Cloud Computing and the three service typesCloud computingCloud computing is basically a model for allowing on-demand delivery of and access to computing resources such as application, networks, storage, servers and services over a network such as the internet (Mell & Grance, 2011, p.... It allows businesses and consumers to use applications (or software) that they need without the burden of installing and maintaining the applications as well as to access their data at any computer that is connected to the internet....
14 Pages (3500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us