StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Online Security Issues - Solutions, Reasons and Counterarguments - Essay Example

Cite this document
Summary
The paper "Online Security Issues - Solutions, Reasons and Counterarguments" discusses that it is advisable that a person read the privacy policy first before registering with any social website or business corporation to ensure that their information will not be sold to others…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Online Security Issues - Solutions, Reasons and Counterarguments
Read Text Preview

Extract of sample "Online Security Issues - Solutions, Reasons and Counterarguments"

Essay Online Security Issues Internet/ Online Security Internet security is a part of computer security that is specifically related to the internet and involves aspects such as browser security and network security (applies to applications or operating systems); typically, the objective behind online or internet security is establishing rules and measures to use against attacks over the internet. Most people are not aware that the internet is a true representation of an insecure channel where a lot of information is exchanged leading to a high risk of intrusion or fraud; however, the issues have been increasing with the advancement in technology and the most common today affect money transactions, social websites, corporate security and personal privacy. Money Transactions When it comes to conducting money transactions online the main challenge is based on password management where the passwords that most people put in place are likely to be broken or hacked easy. However, this is not only an educational challenge but also an administrative one since the company under which a person is doing their transaction should be able to counter this (Bortz, 1). The common issue is that when the transaction is being conducted there is no sure way to determine if it is really that person doing it; additionally, with current authentication standards, often people take on faith that theyre being contacted by the "real" sender the message claims. Social Websites Concurrently, with social websites becoming more popular day after day, the chances and issues of insecurity continue to pile up too in terms of information and privacy concerns all over the world. Malevolent people have been attracted by the tome and easy access of user’s personal information available on social networking sites; surprisingly, the same technologies that attract users to participate also make the sites prone to infectious malware that can shut down an organizations networks or even steal credentials (Pelgrin 1). Common risks on social websites include phishing, spoofing and web application attacks that attempt to steal a person’s identity; the attacks are often successful due to the assumption of being in a trusting environment social networks create and the more information a person posts, the more information becomes available for a potential compromise by those with malicious intentions. Corporate Security It’s very advantageous conducting business online since it offers entrepreneurs a variety of recompenses and to be more convenient than other methods; despite the advantages, however, there are also some problems that can arise when doing business online. One may still be predisposed to deceitful hackers that infiltrate their system and steal customer’s private information even when there are deterrents such as creating a protected payment page for customer purchases and other money transactions (Joseph, 1). The information illegally acquired can be used to drain customer’s bank accounts or steal their identities hence putting the service provider to a disadvantage since most people fear this and don’t trust making purchases online; additionally, due to the pervasive nature of the Internet, issues such as copyright infringement are difficult to control. Personal Privacy Today, being completely anonymous online is nearly possible with the increase in the number of websites and people being involved; collectively, many internet users have experienced problems because others stole their personal information or otherwise took advantage of their visibility online. When a person is online they provide information to others almost every step of the way which in some instances needs to be connected and combined before a picture is revealed or a complete profile is made. Additionally, though it might not seem like a person is giving away much information, when one is browsing on the internet they are relaying personal information to the websites since the browser provides a person’s IP address to the site operators, which they use to track and identify them. By and large, most people use search engines to navigate the internet that astoundingly have and use the ability to track each and every of a person searches; moreover, they can also record ones IP address, the search items they used, the time of the search and other related information that they state in the privacy policy (Pelgrin 1). Solutions, Reasons and Counterarguments When it comes to money transactions and corporate security, one can take extra precautions to increase security; some of these provisions include; having a PIN on the device (cellphone or laptop) that one is using which adds an extra layer of protection, use an app that issues an immediate electronic receipt to track one’s behavior of spending money or choose a method that give a person at least a two factor authentication such as multiple passwords (Bortz, 1). Additionally, one can always request for reconcile statements regularly to match them up with the data they have on their phone or laptop; however, the best way to avoid these issues is reporting security and payment problems right away as recommended by the Electronic Fund Transfer Act (Joseph 1). Generally, it is advisable that a person read the privacy policy first before registering with any social website or business corporation to ensure that their information will not be sold to others. The second measure is never giving out password or user ID information online unless one knows who they are dealing with and why they need it for personal privacy purposes and others that would be used to set a person up for a cybercrime (Obringer 1). It is also for the best that a person keeps records of all their internet transactions, only use credit cards for all online purchases and if there are any purchases made check for confirmation e-mails or other communications on the same. Other solutions and precautions of enhancing online security measures are ensuring that the computer used to connect to the internet has proper security measures and use caution when clicking a link to another page or running an online application. Passwords used online should be unique and the idea of using the same password on all accounts increases the vulnerability of these accounts; furthermore, for social websites one should be careful who they add as a friend or the pages that they join. One should also use discretion before posting information or commenting for content or communications on government-related social networking pages may be considered public records; besides all that, one should configure settings since some of the default settings for sites may allow anyone to see a person’s information or post information to their page. Works Cited Bortz, Daniel. How Safe are Online Payments: Money Rankings and Advice. 2012. Web. September 15, 2014 < http://money.usnews.com/money/personal-finance/articles/2012/05/02/how-safe-are-mobile-payments > Joseph, Chris. Problems of Doing Business on the Internet: Business Technology and Customer Support. 2014. Web. September 15, 2014 < http://smallbusiness.chron.com/problems-doing-business-internet-328.html > Obringer, Ann. How Identity Thief Works: Internet Transactions. 2014. Web. September 15, 2014 < http://money.howstuffworks.com/identity-theft4.htm > Pelgrin, William. Security and Privacy on Social Networking Sites: Information Sharing and Analysis Centre. 2010. Web. September 15, 2014 < http://msisac.cisecurity.org/newsletters/2010-03.cfm > Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Online issue Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Online issue Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1657273-online-issue
(Online Issue Essay Example | Topics and Well Written Essays - 1000 Words)
Online Issue Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1657273-online-issue.
“Online Issue Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1657273-online-issue.
  • Cited: 0 times

CHECK THESE SAMPLES OF Online Security Issues - Solutions, Reasons and Counterarguments

Online Security Threats Removal

This essay "online security" is about methods that are used by scammer and hackers to conduct cybercrimes.... However, there are lots of people who believe that solutions are insufficient and the issue of identity theft can not be resolved with them.... efore delving more into the details pertaining to the solutions for identity theft it is important to get some more information about the concept of identity theft.... So, it is clear that several threats linger in the world of the internet but online identity theft is one of the most prevalent issues....
6 Pages (1500 words) Essay

Petroleum Resources and the Economy of Angola

But in the case of certain African countries like Nigeria the petroleum abundance has proven to be a curse due to complex reasons.... etroleum is a finite resource, and besides this fact there are some negative environmental side effects that are valid reasons to discourage its use as the Ecology Center argue among other important facts about petroleum....
28 Pages (7000 words) Essay

The Concept of Cosmopolitan Democracy

Later on, other important issues such as global environmental problems, global justice system, crimes against humanity and economic and cultural globalisation added to the global peace concern.... Thus, Derk Bienen, another known theorist of cosmopolitan democracy, claims that in order to achieve these goals the UN must establish a second chamber consisting of members elected directly by people, the veto-right of the security Council should be limited, and the system of international courts has to be strengthened and reformed in a way to provide better protection for individuals....
7 Pages (1750 words) Coursework

Conflict and Migration

The essay concludes with the statement that conflict is one but not the only major reason for migration, portrays other reasons such as educational or economic benefits, which bring people to leave their home countries and seek opportunities abroad.... The second part treats the security risks faced by IDPs and refugees including the risks for communities, which is associated with migration.... Novak states in his 2012 article that 'by transforming a group of vassals and subjects into a body of citizens, the Declaration of Man and Citizen asserted in law the need to belong to a nation and a state as a pre-condition for accessing security, prosperity and protection', a notion that until now influences and defines the rights of refugees making crucial the distinction between citizen and non-citizen as engraved by law....
15 Pages (3750 words) Essay

The Problem of Cellular Phone Use while Driving in Ashville, North Carolina

Even though it is apparent that both the quantity and superiority of the wireless communication technology have developed remarkably over the last decade in Ashville, North Carolina (NC), there is little agreement whether this advances a considerably sufficient risk to traffic security to merit legislation in the local area....
6 Pages (1500 words) Research Paper

International Organizations

For instance, with the end of the Cold War, national priorities shifted towards international security.... This paper ''International Organizations'' is based on arguing about the effectiveness of international organisations, taking examples of different organisations and countries....
15 Pages (3750 words) Essay

The Internet Create More Serious Problems than it Solve

This case study "The Internet Create More Serious Problems than it Solve" will aim to delve into the fact that the internet has brought more problems than solutions.... The advantages are so nice that it makes the application to be simple, fast, and educative.... However, its disadvantages when excessively used are worse than the advantages....
6 Pages (1500 words) Case Study

Reflective Journal in Communication Management

Bill O'Reilly of Fox News takes a stand on the recent immigration issues, particularly the comments of one of the presidential candidates, billionaire Donald Trump.... Bill O'Reilly of Fox News takes a stand on the recent immigration issues, particularly the comments of one of the presidential candidates, billionaire Donald Trump.... Bill O'Reilly of Fox News takes a stand on the recent immigration issues, particularly the comments of one of the presidential candidates, billionaire Donald Trump....
33 Pages (8250 words) Thesis
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us