Verified Document

Internet Security Term Paper

Internet Security With the increasing awareness and use of the internet, organizations and individuals are facing newer security issues each day. Everyday people purchase goods on the internet and any hacking as a "joke" could cause the customer's credit card information to fall in the wrong hands. Misuse of such had been on a rise recently all over the world. Governments have now started to enforce strict internet laws to minimize such occurrences. It is unfortunate that internet being such a powerful tool which is used by millions to benefit them is being misused by some. "The Computer Security Institute released a study earlier this year in which 85% of respondents said they experienced a computer breach, with 64% serious enough to cause financial losses"( Tim Lemke, p.7). Many companies have started to produce high tech anti-virus and adware or spyware detectors. Such companies have made available their products online and for the benefit of the customers, they have provided them with a free trial or free demo version to get a feel of the product before they spent their valuable money to purchase it. However, not realizing that the availability of such trials and demos are for the benefit of the masses, hacker have started to crack these products and are providing it for free all over the internet at various websites. Because of this many such companies have faced losses and excellent products have been taken off the market. Internet has created many security issues as well particularly as far as hackers are concerned and an organization should be up-to-date with the security threats to prevent any mishaps.

Organization also face a threat from within the organization itself i.e. employees who know and are familiar with the computer system. "The U.S. Department of Justice's Computer Crime Unit contends that 'insiders constitute the greatest threat to computer systems'" (Scott Charney). The organizations need to take disciplinary measures and ensure that risks from within the organization are eliminated. However such disciplinary measures cannot be taken against outside hackers and thus the use of security tools like...

Firewalls are very important for any organization that has an internet access. "A firewall prevents unauthorized access to data on servers that reside behind the firewall. Whether your organization has an existing network or is setting up a new one, firewall planning is extremely important" (Microsoft). A firewall enables the organization to monitor the data going out and coming to its servers. Unwanted traffic can be blocked thus any unauthorized attempts of an invasion from outside can be prevented and thus provides security to the organization's data. Email is a tool that cannot be blocked out by an organization and its use has far too many advantages rather than disadvantages. Many organizations that do not require a fully activated internet but do require services like email, should install firewalls that are particularly created for this function. These firewalls block out any other internet traffic apart from emails. Thus it limits it vulnerability. However those that do require all the components of the internet to be functional should also use firewalls to monitor and prevent attacks.
Email can also have harmful effect on an organization. One such factor is spam through email. "Ed Amoroso, CISO of AT& T, says that among the 2.8 million e-mails sent to his company every day, 2.1 million, or 75%, are junk" (Scott Berinato).Spam mailing costs organizations thousands of dollars and a lot of time of the employees get wasted in trying to delete the spam mail which would otherwise be used productively. "According to Worldtalk's Cost of SPAM Analysis, employee time lost to sifting through junk e-mail can cost a 5,000-person corporation upwards of $12,000 USD a day, not taking into account the possible bandwidth issues and the cost of network administration" (Dawn Harris). Moreover virus and spywares are also sent via email to users. A firewall cannot detect or protect a computer from internet viruses and it is highly important for an organization to have a top of the line anti-virus installed which is updated on a regular basis. Any infection by a virus or other malicious tools can cause…

Sources used in this document:
REFERENCES:

(1) Tim Lemke -- Article Title: Internet Security Threat Up, Panel Told. Newspaper Title: The Washington Times. Publication Date: July 17, 2001. Page Number: 7.

(2) Microsoft -- Securing Your Infrastructure. [Online website] Available from: http://www.microsoft.com/technet/prodtechnol/exchange/guides/E2k3TransnRouting/2acd17a0-2d1e-4beb-87b8-46c296597bcb.mspx [Accessed on: 21/09/2005]

(3) Scott Berinato -- How To Save The Internet. [Online website] Available from: http://www.cio.com/archive/031505/security.html [Accessed on: 21/09/2005]

(4) Dawn Harris -- Factual Data Reveals 31% of Corporate Internet E-mail Exchange Could Cause Legal Liability, Financial Loss and Disruption of Network Services. [Online website] Available from: http://www.securitymanagement.com/library/worldtalk0200.html [Accessed on: 21/09/2005]
(6) Alan Paller -- Consensus Minimum Security Benchmarks. [Online website] Available from: http://www.cisecurity.org/Documents/IA_CIS.pdf [Accessed on: 21/09/2005]
(7) Grant Gross - U.S. government looks to shape cybersecurity with new Oracle pact. [Online website] Available from: http://www.computerworld.com/securitytopics/security/story/0,10801,85264,00.html [Accessed on: 21/09/2005]
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Internet Security Measures an Assessment
Words: 3999 Length: 10 Document Type: Term Paper

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well

Internet Security for Wi-Fi Hotspots in Configuring
Words: 583 Length: 2 Document Type: Essay

Internet Security for Wi-Fi Hotspots In configuring the Wi-Fi router in our home previous to taking this course, the selection of 128-bit encryption was chosen, and keys created to ensure the security of the connection and network from outside use. As our home is in a densely populated neighborhood, our concern was the potential of a drastic reduction in performance given how many people could be on the connection potentially at

Internet Security Has Become a Big Topic
Words: 773 Length: 3 Document Type: Essay

Internet security has become a big topic in the last few years because every business and every person has, to some extent, allowed their information to be captured by the web. With businesses, it is necessary to keep certain records on the computer because it makes processing payroll and other critical issues much easier and more secure. Though it is true that computers can be kept much more secure than

Internet Security and Security
Words: 652 Length: 2 Document Type: Essay

Gallo, E. (2011). The Young Adult: Financial Education, Social Networking, and Internet Security. Journal of Financial Planning,24(10), 36-37. Retrieved from EBSCO Discovery Service Types of personal information that should raise suspicion if requested in email correspondence (using paraphrase). Email scams are common (Gallo, 2011, p. 36). One of the ways a person can prevent being suckered into a scam is by checking the full sender information, as a malicious sender can masquerade

Cookies and Their Impact on Internet Security
Words: 2543 Length: 10 Document Type: Term Paper

Cookies and Their Impact on Internet Security Cookies are tiny bits of information that is stored by a web site when a user enters its site. The next time the user enters that site; the user's browser sends the information back to the site (Andrews, 1996). A cookie is typically designed to remember and tell a web site some useful information about the user. For example, an online music store may uses

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now