StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Usage of the Internet by a Number of People - Research Paper Example

Cite this document
Summary
The paper describes the usage of the internet has multiplied manifold. This by itself leads to a number of ways by which the world might find ways of cheating or robbing an honest person. While vulnerabilities are exploited mostly by people who want to make money there are also others…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
The Usage of the Internet by a Number of People
Read Text Preview

Extract of sample "The Usage of the Internet by a Number of People"

Network Security Introduction 'Every computer is a Network' - So the saying goes. Every computer because it is connected to the internet or to the local intranet has become a part of the network. This makes the PC as much susceptible to the vulnerabilities of the network as any other network might be. The nature of the vulnerabilities that a location is exposed to is remarkable. The usage of the internet has multiplied manifold. This by itself leads to a number of ways by which the world might find ways of cheating or robbing an honest person.

While vulnerabilities are exploited mostly by people who want to make money there are also others, who do it for the entertainment. The internal vulnerabilities are to be countered so that possession of one is not used by the other. The need for the Security The PCs in the school are used by a number of people including students and staff. But there are at least ten times more students who use the computers compared to a staff. Students in a school are to be exposed to learning exercises in the internet and not to the other derogatory experiences that one might get on the internet.

Internet is a source of both good and bad. It is the duty of the person to segregate them and use them as he deems fit. However, in the case of the students, on many occasions, they may not be in the right position to identify whether what they are doing is right or wrong. Therefore, the responsibility lies with the staff to ensure that they educate themselves appropriately and not in any other way. The security in School The security in school is therefore, very important. One, to ensure that no viruses or worms come into the system; secondly, this is also to ensure that there is no unsolicited visitor into the network.

Thirdly, the security should also ensure that the students are provided access to those that they are allowed to see and are not provided permission for those that they are not allowed to. This security is implemented in the school using the following: 1. Hard firewall has been provided at the entry of the internet in to the school campus. This protects the network from unsolicited visitors over the network; hacking is stopped by this process. There is no intrusion detection software that has been put in place since the vulnerabilities foreseen does not show a large probability of people making unsolicited visits breaking through the firewall. 2. An online anti-virus, anti-worm and anti-Trojan system has been implemented on the network.

This works on one of the servers and uses a thread to keep track of the file transfers and communications to ensure that there is no virus movement or signature. 3. The firewall also provides for settings to stop access to specific certifications in the sites accessed. This is set appropriately to ensure that the students do not access the unwanted web sites. In the school, the students are not allowed to access even the mail based websites since that would start off a new communication channel. 4. Internal vulnerabilities are countered by employing appropriate password protected network and continue maintaining it that way.

Conclusion Therefore, school is also vulnerable and might get hacked; spoofed or such other damaging mechanisms might be employed to collect information from the school and its students / staff. The security in the school with regard to the virus, worms and Trojans would be to counter them with the utmost severity to stop them when they do occur. For the others, adequate security depending upon the level of protection sought. References 1. Equiinet, 2005, Network Security in schools, available at: http://www.equiinet.com/securepilot/networksecurity/Equiinet_Security%20Report_colour.pdf 2. Robert Brumfield, 25 Oct 2005, Schools need Improved IT Security, eSchool News online, available at: http://www.

eschoolnews.com/news/showstory.cfmArticleID=5923

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Usage of the Internet by a Number of People Research Paper”, n.d.)
The Usage of the Internet by a Number of People Research Paper. Retrieved from https://studentshare.org/technology/1525049-network-security-college-essay
(The Usage of the Internet by a Number of People Research Paper)
The Usage of the Internet by a Number of People Research Paper. https://studentshare.org/technology/1525049-network-security-college-essay.
“The Usage of the Internet by a Number of People Research Paper”, n.d. https://studentshare.org/technology/1525049-network-security-college-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Usage of the Internet by a Number of People

Facebook as a New Media

Motivational access for the internet and the Facebook is the main hindrance in many countries.... hellip; According to Lister et al (2003), new media – including computers, the internet, digital cable, satellite television and DVD recorders - is distinguished from the traditional mass media like newspapers, television and radio – which engages in a one-to-many communication process – through the characteristics of digitality, interactivity, hypertextuality, dispersal and virtuality....
8 Pages (2000 words) Essay

The Concept of the Interface Design Factors

The number of people using internet for banking is pretty limited.... This research will discuss the interface design factors that influence the usability of the internet websites with specific thrust on internet banking.... While most of the people make use of the internet banking to look up their balances and to see whether the expected credit or debit has taken place.... The usage spread in UK also indicates the design of the internet and the sites thereof, are dependent on the psychology of the human beings using the same....
5 Pages (1250 words) Assignment

Arguments Supporting Social Networking as Risky

The digital world is pushing an increased number of people into second lives.... The masses have to battle with privacy of their information, as… The web traffic information directed to college students, business, and online companies report a huge number of visitors sharing different types of information.... people share various data without For example, information shared involves personal photos taken from smartphones and computers that are GPS embedded allowing other people to determine the individual's location....
10 Pages (2500 words) Essay

Internet Usages Affect People's Tourism Booking And Decision-making

This paper talks that marketers have the access to technology with the advent of the internet to customize products and communicate directly with the smaller target market.... hellip; This essay will cover the influence of the internet and consumer behaviour in the tourism industry.... the internet is an interactive medium unlike the traditional marketing.... It will be focusing on the reasons as to why people use the internet for planning travel and making reservations....
7 Pages (1750 words) Essay

The Older People and Internet Technology

the usage of Twitter is diverse and ranges from organizing revolutions to the illustration of breaking news like for revolutions.... Various internet usage researches explain that older people above 60 years form the fastest increasing demographic, in terms of accessing the internet (Gentle 2012).... The paper "The Older people and Internet Technology" describes that data presentation will be done through charts and graphs.... Social media enables organization stakeholders like older people to have a voice, based on their own terms (Benkler 2011)....
5 Pages (1250 words) Essay

The Internet as One of the Most Important Things in Our Study and Social Life

The moderate usage of the internet at 3-5hrs by the four groups indicates the growing reliance on the internet on various fronts.... … The paper "the internet as One of the Most Important Things in Our Study and Social Life" is an excellent example of a research paper on social science.... The paper "the internet as One of the Most Important Things in Our Study and Social Life" is an excellent example of a research paper on social science....
6 Pages (1500 words) Research Paper

How Blogs and Social Networking Have Altered Our Daily Usage of the Internet and the World Wide Web

… The paper “How Blogs and Social Networking Have Altered Our Daily usage of the internet and the World Wide Web” is an impressive variant of an essay on information technology.... The paper “How Blogs and Social Networking Have Altered Our Daily usage of the internet and the World Wide Web” is an impressive variant of an essay on information technology.... This is because there has been a shift in the usage of the two services at the wake of blogging and social networking (Freeman 2006, 118) ....
10 Pages (2500 words) Essay

Impact of Social Networks and Blogs on Peoples Internet Usage

This paper discusses the impact of social websites on people's usage of the internet.... The basic purpose is to analyze their influence on blogs and social networks on people's daily usage of the internet.... In this way, an organization can achieve popularity among a large number of people.... nbsp;The purpose of this paper is to analyze the impact of blogs and social media on the use of the internet.... nbsp;The purpose of this paper is to analyze the impact of blogs and social media on the use of the internet....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us