Internet Security Term Paper

Total Length: 1386 words ( 5 double-spaced pages)

Total Sources: 1+

Page 1 of 5

Internet Security

With the increasing awareness and use of the internet, organizations and individuals are facing newer security issues each day. Everyday people purchase goods on the internet and any hacking as a "joke" could cause the customer's credit card information to fall in the wrong hands. Misuse of such had been on a rise recently all over the world. Governments have now started to enforce strict internet laws to minimize such occurrences. It is unfortunate that internet being such a powerful tool which is used by millions to benefit them is being misused by some. "The Computer Security Institute released a study earlier this year in which 85% of respondents said they experienced a computer breach, with 64% serious enough to cause financial losses"( Tim Lemke, p.7). Many companies have started to produce high tech anti-virus and adware or spyware detectors. Such companies have made available their products online and for the benefit of the customers, they have provided them with a free trial or free demo version to get a feel of the product before they spent their valuable money to purchase it. However, not realizing that the availability of such trials and demos are for the benefit of the masses, hacker have started to crack these products and are providing it for free all over the internet at various websites. Because of this many such companies have faced losses and excellent products have been taken off the market. Internet has created many security issues as well particularly as far as hackers are concerned and an organization should be up-to-date with the security threats to prevent any mishaps.

Organization also face a threat from within the organization itself i.e. employees who know and are familiar with the computer system. "The U.S. Department of Justice's Computer Crime Unit contends that 'insiders constitute the greatest threat to computer systems'" (Scott Charney). The organizations need to take disciplinary measures and ensure that risks from within the organization are eliminated. However such disciplinary measures cannot be taken against outside hackers and thus the use of security tools like firewalls should be made. Firewalls are very important for any organization that has an internet access.
"A firewall prevents unauthorized access to data on servers that reside behind the firewall. Whether your organization has an existing network or is setting up a new one, firewall planning is extremely important" (Microsoft). A firewall enables the organization to monitor the data going out and coming to its servers. Unwanted traffic can be blocked thus any unauthorized attempts of an invasion from outside can be prevented and thus provides security to the organization's data. Email is a tool that cannot be blocked out by an organization and its use has far too many advantages rather than disadvantages. Many organizations that do not require a fully activated internet but do require services like email, should install firewalls that are particularly created for this function. These firewalls block out any other internet traffic apart from emails. Thus it limits it vulnerability. However those that do require all the components of the internet to be functional should also use firewalls to monitor and prevent attacks.

Email can also have harmful effect on an organization. One such factor is spam through email. "Ed Amoroso, CISO of AT& T, says that among the 2.8 million e-mails sent to his company every day, 2.1 million, or 75%, are junk" (Scott Berinato).Spam mailing costs organizations thousands of dollars and a lot of time of the employees get wasted in trying to delete the spam mail which would otherwise be used productively. "According to Worldtalk's Cost of SPAM Analysis, employee time lost to sifting through junk e-mail can cost a 5,000-person corporation upwards of $12,000 USD a day, not taking into account the possible bandwidth issues and the cost of network administration" (Dawn Harris). Moreover virus and spywares are also sent via email to users. A firewall cannot detect or protect a computer from internet viruses and it is highly important for an organization to have a top of the line anti-virus installed which is updated on a regular basis. Any infection by a virus or other malicious….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Related Essays

Social Media Postings and the Internet Privacy

internet security, hence useful in this research. Ayala D., (2017). Dealing with the Loss of Internet Privacy. Retrieved August 24, 2018 from https://www.proquest.com/blog/pqblog/2017/Dealing-with-the-Loss-of-Internet-Privacy.html This is an article from ProQuest written by a contributor who is an authority figure in the internet world since he is the ProQuest Director of global information security. With this exposure he systematically analyses what internet privacy is and its significance to organizations, how it can be achieved and what precautions need to be observed to avoid breach of internet security. This is an article that… Continue Reading...

Edward Snowden Essay

a computer user does online (Francheschi-Bicchierai, 2014). The NSA attempt to decode encrypted data and sabotage Internet security (Francheschi-Bicchierai, 2014). The disclosure that an NSA team of hackers exists and what techniques they use (Francheschi-Bicchierai, 2014). The NSA had access to the Google and Yahoo data centers (Francheschi-Bicchierai, 2014). The NSA routinely gathers private citizens’ text messages (Francheschi-Bicchierai, 2014) and likely has access to audio versions of telephone calls (Be very afraid, 2013). The NSA intercepts all telephone calls in Afghanistan and the Bahamas (Francheschi-Bicchierai, 2014). An NSA program routinely intercepts e-mails of non-U.S. persons outside the United States (Yoo, 2014). The disclosure of MonsterMind, an… Continue Reading...

Facebook Data Breach Essay

Media and Internet Security: The Facebook Data Breach Does Mark Zuckerberg Owe You Privacy? The Facebook Data Breach is Unethical, but Is It Illegal? Outline I.  Introduction II.  Body a.  What happened in the Facebook data breach. b.  How Facebook should be responsible for protecting users’ data. c.  Zuckerberg’s Senate Hearing d.  Cambridge Analytical and other data leaks e.  Steps Facebook is going to take to resolve/prevent this issue in the future III.  Conclusion- The long term effects this breach will have on the tech companies that collect your data Introduction In… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Internet Security" (2005, September 21) Retrieved May 21, 2024, from
https://www.aceyourpaper.com/essays/internet-security-67473

Latest MLA Format (8th edition)

Copy Reference
"Internet Security" 21 September 2005. Web.21 May. 2024. <
https://www.aceyourpaper.com/essays/internet-security-67473>

Latest Chicago Format (16th edition)

Copy Reference
"Internet Security", 21 September 2005, Accessed.21 May. 2024,
https://www.aceyourpaper.com/essays/internet-security-67473