StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internet Safety - Essay Example

Cite this document
Summary
The paper "Internet Safety" tells us about one of the primary objectives for the ever-growing internet and the concept ensures that not only content but the safety of the users, their very confidence to trust the online elements, requires to be protected…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Internet Safety
Read Text Preview

Extract of sample "Internet Safety"

Running head: INTERNET Internet Safety Introduction Internet safety is one of the primary objectives for the ever growing internet and the concept ensures that not only content but the safety of the users, their very confidence to trust the online elements, requires to be protected. The next section concentrates on the various online threats which require be focusing and exploring for exploring the knowledge base and devising methodologies for their defense. It concludes the very process through recommendations for improvement and ensuring the objectives for a safer virtual world. Enterprises and individuals use internet not just for communication but to avail the various activities like online business, transfer of important organizational data and large scale communication. The internet is vulnerable to several threats and the general requirements of safety of networks and systems of information can be formulated with the following four, interrelated characteristics: a. Disposal: With the term disposal we mean that the data are accessible and the services function, despite that by any chance disturbances, as interruption of catering, natural destructions, accidents or attacks. b. Verification of identity: Confirmation of declared identity of institutions or users (Bejtlich, 2006). For the verification of identity are required suitable methods for various applications and services, as are the electronic contracting of convention, the control of access in certain data and services (e.g. for the tale-workers) and the verification of web sites (e.g., for internet banks). It should also be included the possibility of anonymity, since a lot of services do not only need the identity of user but reliable confirmation of certain criteria of (called “anonymous credentials”), as the solvency. c. Integrity: Confirmation that the data have been dispatched, it is received is stored is complete and they have not suffered alteration d. Observation of secrecy: Protection of communications or stored given opposite interception and reading by not permitted individuals (Greene, 2004). It is particularly required for the transmission of sensitive data and she is one from the requirements that correspond in the concern of protection of private life of virtuous networks of communications. e. Firewalls It is a device which permits, restricts computer traffic in accordance to the security policies enforced in the business rules. Firewalls are either implemented through hardware, software, or both. They work best in detecting attacks that could enter or leave your system through an open port, such as worms and some Trojan horses. They do not scan the fragmented packets so in that way male wares attached to e-mails are still threats inside your network. Figure 1 : Firewalls (Source:http://webhelp.esri.com/arcgisserver/9.2/dotNet/manager/graphics/firewall.PNG) f. Routers It is a device which functions as a networking component for storing and forwarding of packets to another network from that of senders. Figure 2 : Routers (Source: http://www.smallnetbuilder.com/images_old/myimages/howto/two_routers.jpg) g. Gateways It is an excellent network device which functions for communication with various types of networks with a different architecture and protocol usage. Figure 3 : Gateways (Source:http://www.2n.cz/images2/obrazek_click/528/thumbnail.jpg) Types of attacks a) Interceptions of communications. The electronic communications can intercept and the data can be copied or modified. Interception it can be realized with various ways. Potential damage: The outlaw interception can cause damage, so as much violation of private life of individuals, what via the exploitation of data that they have been intercepted (Panko, 2004). Likely solutions: Defense against interception can emanate with the encryption of data that is transmitted via the network. b) Not permitted access in computers and networks of computers (hacking, cracking) The not permitted access in computer or in a network of computers is usually realized malicious with the intention of copy, modification or destruction of data. Potential damage: The not permitted access has occasionally as motive mental challenge and no speculation. The protection at the not permitted access in personal information, included economic information, banking accounts and data of health, constitutes right of individuals (Thomas, 2004). Likely solutions: The most common method of protection against not permitted access is the installation of a firewall. However, with this is provided limited only protection and also it should be supplemented by other controls of safety, as the recognition of attacks, the detection of access and the controls in the level of application (included “intelligent cards "). c) Denial of Service That is to say challenge of network collapse because of overloading. The networks are to a large extent digitized and are checked by computers. The most common reason of perturbation of network existed at the past the damage in the system of computer that checks the network, while the attacks against network were directed mainly to their in question computers. Today, most attacks exploit weaknesses and liabilities of constitutive elements of network (functional systems, routers, switches, DNS etc). The attacks can receive various forms: a) Attacks against DNS, b) Attacks of routing, c) Attacks of refusal of benefit of service. d) Potential damage: The interruptions are detrimental for certain web pages, since the enterprises are based continuously more on the unhindered disposal of their network places for their commercial transactions. Likely solutions: The attacks in DNS servers are faced firstly easily with the extension of protocols DNS, e.g. using secure extensions DNS that is based in public keys’ cryptography. Much difficult is the defense against attacks at the system of routing. Internet has been drawn for maximization of flexibility in the routing, while with this way is limited the probability of loss of service in the event that collapses a part of infrastructure of network. There are not effective means for sure protocols of routing, same in routers. The volume of transmitted data does not allow in detail infiltration, since the verification would cause immobilization of networks. For this reason, the networks execute only basic infiltration and operations of control of access, while the most specialized operations of safety (e.g. control of identity, integrity, encryption) are placed in the limits of networks, that is to say in the terminals and in the servers of the networks that function as terminal points (IETF, 2007). Conclusion The introduction of public key infrastructure, cryptography, digital signatures and biometric passwords has saved us a lot in safeguarding the content and data from malicious intenders. It has strengthened online businesses to safeguard their data and imbibe trust and confidence in internet activity and its use. References/Bibliography Bejtlich, R (2006). Extrusion Detection: Security Monitoring for Internal Intrusions. Addison Wesley. Greene T. C (2004). Computer Security: for Home and Small Office. Apress. IETF (2007). Transport Level Security. Retrieved 16, December 2007 from http://www.ietf.org/html.charters/tls-charter.html Panko, R.R (2004). Corporate Computer and Network Security. International Edition, Pearson Prentice Hall. Thomas, T (2004). Network Security First-Step. Cisco Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Internet Safety Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1552124-internet-safety
(Internet Safety Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/miscellaneous/1552124-internet-safety.
“Internet Safety Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1552124-internet-safety.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internet Safety

CIPA/Children's Internet Protection Act

The restrictions are composed of Internet Safety policies and technology.... The E-rate program cannot offer discount on internet access that make it affordable to schools or libraries unless they certify, they have Internet Safety measures.... In October 2000, Congress passed the Children's Internet Protection Act (CIPA), which requires schools and libraries that receive federal funds for discounted telecommunications, Internet access, or internal connections services to adopt an Internet Safety policy and employ technological protections that block or filter certain visual depictions deemed obscene, pornographic, or harmful to minors....
6 Pages (1500 words) Research Paper

Internet safety & appropriate use of digital technology

Internet Safety & Appropriate Use of Digital Technology Author's name Institutional Affiliation Introduction The society has in the past three decades witnessed the development of technology through innovation and inventions of different kinds of products and services.... hellip; Today, not only the adults use them, but the younger generation has become very exposed to the digital information and technology, right from their home setups, classrooms in schools, and in their social lives....
5 Pages (1250 words) Essay

Copyright and Student Use

hellip; In the conclusion part the Internet Safety issues especially with respect to children and parents are also discussed. Copy right protection is given for original works and it is not associated with a common idea, process, practice, methods and innovations.... 005)One of the toughest challenges faced today is to safeguard children from the negative influence of internet without sacrificing the right to receive information.... Nowadays more parents are worried about their children using internet for wrong purposes....
3 Pages (750 words) Essay

Internet Safety: How to Protect Yourself

This paper "Internet Safety: How to Protect Yourself" discusses how to protect an organization network that has a connection to the internet.... hellip; The results show the security issue includes vulnerability and social engineering and how it becomes a threat to any organization which has a connection with the internet.... With the advanced technology that we have right now, a security issue has become an essential problem for any organization, which uses the internet, around the world....
15 Pages (3750 words) Case Study

Sprint Wireless Service RECYLING Program

The company also shows it corporate social responsibility by taking steps towards the promotion of free Internet Safety resources for children.... Customers either can get their due credit from the company through bill credit or can gift it to the Sprint project Connect to fund for the Internet Safety program....
2 Pages (500 words) Essay

Online learning for students and/or teachers

In curbing some of the issues concerning Internet Safety, there are institutes, which are developing literature that addresses Internet Safety, responsibility, and social and ethical issues.... The institutes are Responsible Netizen based at the University of Oregon and Bertelsmann Foundation, which provide vital information on Internet Safety.... All education stakeholders and institutions are required to evaluate the effectiveness of their Internet Safety policies....
2 Pages (500 words) Assignment

Benefits of YouTube

Department of Justice launched the ‘National Internet Safety Awareness and Parental Empowerment Program'.... This underscores the need for Internet Safety a move that has been endorsed by many governments and parents across the globe.... Previous studies indicate that Internet Safety produced considerable positive outcomes as sexual solicitation among teenagers has decreased tremendously since inception of the intervention.... According to Tynes (2007), Internet Safety on teenagers should only go to a certain extent so as to avoid denying them of the psychosocial, educational and emotional benefits offered by the internet....
10 Pages (2500 words) Essay

Information Systems Education and Internet Safety

The main purpose of the author in this paper "Information Systems Education and Internet Safety" is to give the reader a conceptual framework of how Internet Safety has been excessively used on teenagers hence deterred many benefits that come along with it.... Internet Safety survey: who will protect the children?... The article is quite precise and direct and directly gives the steps that can be undertaken to ensure the safety of the internet for teenagers....
4 Pages (1000 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us