We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Internet security - Essay Example

Comments (0)
Summary
Internet security has become one of the most discussed issues in this era of information technology.The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business…
Download full paper
GRAB THE BEST PAPER
Internet security
Read TextPreview

Extract of sample
Internet security

Download file to see previous pages... Internet security has become one of the most discussed issues in this era of information technology. The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business.The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be embraced even from unlikely quarters with government adopting concepts such e-governance.The growth in the use of Internet has however presented enormous challenges. Like all other systems in the society, Internet is required to operate within the precincts of law. There are very few laws that govern Internet use and especially the conduct of e-commerce. Different countries have laws and policies on information and also the industry has its governing rules and regulations that are seen as measures to protect users and ensure that Internet is a mutual medium of doing business. Internet presents many challenges to security in that the Internet has become an avenue or tool of war. From infringement of privacy, to cyber crime and defrauding, Internet is causing economies losses in terms of risks and challenges.However of all challenges facing the Internet sector nothing threatens the half a century old communication technology than cyber crimes. Other security threats such as virus threats, software threats and hacking are rampant, have become very rampant and cost business billions of dollars. Viruses are one of the earliest forms of security intrusions. To curb these viruses many anti-virus software have been designed to overcome the problem with software being designed that are capable of detecting virus and cleansing the system of the viruses before the virus can attack and meddle with the system.
The anti-virus software is capable of even blocking the computers from spy wares that have also become a rampant form of Internet insecurity. There have also been inventions in form of software that are installed in computers to protect the system from malicious people who are interested in stealing sensitive data such as bank information. Overall such software are security measures geared at protecting the computer system from worms, spy wares, Trojan horses, and identify identity theft software.
There is a continuous need in the industry for a continuous study of the vulnerabilities the industry is exposed to, a need for constant upgrading of the network systems to stay ahead of hackers and other forms of security threats to internet, continuous research aimed at developed view forms of technologies, which are less vulnerable to security threats. To improve security there is a need for system designers, system administrators and decision makes to come up with tough policies and security related procedures which should make it very hard for hackers and cyber criminals to penetrate computer systems. Designers should aim at producing strategies that will effectively put under control the Internet use. Such measures can include invention of effective Internet monitoring tools, increased use of security analysis tools as well as an increased use of hard-to-crack passwords and firewalls (Flynn, 2001).
It is a fact that Internet is a world wide connection of networks makes it accessible to users regardless of national, regional and geographical boundaries (Flynn, 2001). Therefore this increasing freedom to access information and data has presented the greatest headache to lawmakers, governments, and regulatory bodies. It is clear that the battle against cyber crime and all other forms of Internet insecurity is being won. Therefore it is most unlikely that Internet will be brought to heels. There is optimism that long lasting solutions will be found to ensure that e-commerce, and indeed all other forms of online transactions do not fail as a result of a few crooks, criminals and syndicates who are keen on ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Internet Security
Web Security. Web security or internet security is a subdivision of computer science, which precisely shares the internet, and typically encompasses the browser safety but similarly the network security. Web safety correspondingly comprises additional presentations or operating systems.
5 Pages(1250 words)Essay
Network and Internet Security
As the author of the essay states, session keys are used to ensure that communication between two parties can be initiated when needed and terminated when there is no use of it. Besides, on of the main benefit of the session keys is that they limit the number of attacks on a system by making it difficult to attack a system.
6 Pages(1500 words)Essay
Network and Internet Security
It is also eliminated when the session is over. Session keys are characteristically symmetrical and uncomplicated as concerns cryptography. This plainness would normally be a chief disadvantage of applying the key. However since several keys are utilized instantly and the keys aren’t utilized for long, it does not create much crisis (Carver, 2007).
4 Pages(1000 words)Essay
Internet Security Essay
The virus spreads and corrupts the whole computer of the other user. Hacking is another big potential problem; it can be restricted by setting a long password. The password must be long enough to ensure the safety of the data in a computer. In addition, there is a computer security that is part of information security which can be applied to the computer to protect it from any spam or viruses.
4 Pages(1000 words)Essay
Internet Security
There are some instances when finding on-ground support is not easy enough to obtain especially for those owning small businesses online. Likely, seeking the help of professional individuals in the field of information technology does cost something, and practically, this amount is not quite a considerable amount that small business owners would like to pay.
7 Pages(1750 words)Essay
Global Internet Security
With every beneficial invention, there are also disadvantageous aspects. Because of internet, there are many global internet security concerns. Global internet security is a concern for all the world because due to internet, where people have gained many benefits, there are also many disadvantages such as internet fraud, loss of security and privacy, virus attacks, spamming, threat to data protection and computer misuse.
14 Pages(3500 words)Essay
Internet Security: Awareness is Key
he risks that organizations face in advanced technological communications structures, one would be made aware of the factors that expose enterprises to network security breach. The origins of the internet dates back to as early as 1960s. Its evolution changed the course of
15 Pages(3750 words)Essay
Internet Security
e in the concept of globalization because it is because of internet that the world has become a globe where people can correspond with one another in a very less time. With every beneficial invention, there are also disadvantageous aspects. Because of internet, there are many
7 Pages(1750 words)Essay
Internet Security
The four aspects of security are regarded as Privacy, Authentication, Integrity and Nonrepudiation. Privacy is related with how Facebook users prevent disclosing their respective information to people who are unwanted and have no say
2 Pages(500 words)Essay
Network and Internet Security
These encryption techniques are categorized into public key encryption and single key encryption. The public key encryption is intended to use two keys; one private key and another public key.
4 Pages(1000 words)Essay
Let us find you another Essay on topic Internet security for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us