Verified Document

Internet Security, Risks Internet Security Presents Field Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security

In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing. There are many tools that are employed online that breach a user's privacy without their knowledge Dinev & Hart, 2005.

Web tracking software is used by malicious companies to access a person's online behavior and information, which the company will sell to other marketing companies. Corporations and government institutions are constantly been hacked for their information. Banks have lost millions as the hackers access customer accounts and withdraw funds illegally Dinev & Hart, 2005.

The reasons for these attacks could be system weaknesses, or user carelessness. A user who is not careful when browsing online could divulge information that can be used by a hacker to access sensitive information online.

Introduction

The way people live today has been revolutionized by the internet. Majority of activities like financial services, socializing, information access, entertainment, and product purchase all take place online. People are now relying on the internet for these activities and more due to its pervasive information collection and wide coverage. With continuous and frequent use people have come to trust the internet as a gateway to home, personal, and office convenience Dinev & Hart, 2005.

The internet is vulnerable to many risks due to its simple nature based on host servers and a host of backbones. The hosts will vary from personal computers to supercomputers that make use of different software and hardware. The main linkage in all these hosts is the Transport Control Protocol/Internet Protocol (TCP/IP). This is the protocol used for all communications on the internet Hansen, 2001.

It is based on the functionality that if a host has the TCP/IP it can access other computers that are using the same operating system and backbone. TCP/IP is an open technology, which exposes the internet to numerous pitfall and security risks.

Internet Protocol (IP) does not perform any authentication of data packets, which makes it vulnerable to attacks by malicious users. Without an authentication mechanism, IP's cannot determine the authenticity of the data packets submitted Dinev & Hart, 2005.

This makes it difficult to determine the originality of a data packet. Therefore, a data packet can claim it is from a specific address, but there is no way this can be determined to be correct. It is easy for a user to enter into a host and make changes to the content in the system. There been no check for criminal activities, crime on the internet and security breaches have continued to increase as the internet evolves. The internet has continued to grow spreading to all levels of human activities and business activity. When a price is attached to an internet breach, security issues become significantly noticeable Kannan, Rees, & Sridhar, 2007.

There are companies that have filed for bankruptcy, personal information released to public domains, business have lost money through espionage, and national databases hacked. These are some of the issues that have arisen due to internet security breaches Cavusoglu, Mishra, & Raghunathan, 2004.

Internet security continues to evolve as the internet continues to become more complex. Malicious people have become intelligent, can anticipate, and undermine the internet security measure been undertaken. This is why a majority of companies are today considering internet security to be part of their risk management strategy in order to avoid business and financial loss Straub & Welke, 1998.

Individuals using the internet have been forced to spend a lot of money on software that will prevent any theft of their information online. Even with all these measure in place quite often we hear of an internet security breach that results in losses worth millions of dollars Dinev & Hart, 2005()

The purpose of this paper is identifying the various types of internet security issues that are faced by businesses, consumers, individuals, and governments. The paper will attempt to provide solutions to the issues identified, and devise measures that can be used to ensure a safe internet environment. Readers will find information that they can use to understand the various approaches attackers employ to breach internet security. The nature of this...

Parts of this document are hidden

View Full Document
svg-one

Persons in the technology field will grasp all the concepts presented and find the information relevant. The paper has focused on the major problems, but there are other prevailing problems that pertain to internet security that have not been discussed.
Different internet security breaches

Anyone who uses the internet is prone to privacy and security risks Miyazaki & Fernandez, 2000.

The risks a person is prone to increase as new technologies are developed and introduced. This is because new technologies mostly have bugs that malicious people can exploit. This makes it difficult for the antivirus software a person uses to keep up with the technologies. It has been established that not all hacker events are reported. This may be due to the negative effect such reporting could have on the individual or company Cavusoglu et al., 2004()

Denial of Service (DoS)

Companies have firewalls that are outdated and their network perimeters focus only on certain security breaches, which does not cover all the internet security aspects. Malicious individuals are always looking out for weaknesses in the corporate security systems Hansen, 2001.

Denial of Service is type of attack that generates malicious traffic, thus denying genuine user requests to the network any service. This attack starts by sending a worm, bug, spyware, or virus to the host computer using spoofed addresses. The host computer will respond to these requests assuming that the requests are genuine, which will in turn result in too many requests been served by the host computer Grazioli & Jarvenpaa, 2003.

Once the program has received a response it will continue to submit requests to others on the network. The network will be slowed down due to the amount of requests that the program will be submitting. In other instances, the network can fail to respond completely, which would deny genuine users access to the network services. The Welchia and Blaster worm are some type of DoS attacks that have resulted in the shut down networks. The worms were able to infect hundreds of private networks as they were able to reproduce themselves. Companies have suffered great losses due to these actions Hansen, 2001()

IP spoofing

IP spoofing is the most basic and common security breach. This breach involves a host claiming to have an IP address that belongs to another host. As different systems are all connected to the internet, there is only one way of identifying each computer system, which is the IP address. Using the IP address, the receiving computers are able to identify and respond to the requests or data packets Juul & Jorgensen, 2003.

The attackers could device a method of spoofing IP addresses and send data packets to the host computer. The data packets would require the host to perform certain actions that might be harmful or malicious. There are applications that will permit IP addresses to login and access the host or server. This would pose a great risk as the attacker could gain access to all the information and traffic that the host computer services Needham, 2003()

Spyware and web trackers

According to Kannan et al. (2007)

, spyware has reached the epidemic level, and it will get worse as time passes. It is estimated that 95% of computers worldwide have been infected with spyware. The tools used for the removal of spyware are not as effective, and they only last a few months. With the release of a new spyware, there is a removal tool developed for removing only this spyware. Web trackers are used to track the browsing habits of users. Web trackers are used for marketing purposes in order to understand the behavior of website users. They can also be used to invade the privacy of individuals as they monitor all the users' activities online Dinev & Hart, 2005.

Web trackers have been devised by online companies for data collection without the user's knowledge. Some of the companies will sell this data to marketing companies who will target the users with their advertisements. These trackers may be harmless, but they have the potential to be abused by malicious individuals. An individual can purport to have a genuine web tracker, which they will use to obtain person information about a person. The information could be used for identity theft or even credit card theft.

There are many pop-up windows that bombard a user when they go online. Some of these pop-up windows contain spyware programs that will self install when a user clicks on a link Lee & Turban, 2001.

Spyware also comes in the form of emails. A spyware would be coded in the email message, when a user opens the email the program would…

Sources used in this document:
References

Anderson, R., & Moore, T. (2009). Information Security: Where Computer Science, Economics and Psychology Meet. Philosophical Transactions: Mathematical, Physical and Engineering Sciences, 367(1898), 2717-2727. doi: 10.2307/40485617

Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers. International Journal of Electronic Commerce, 9(1), 69-104. doi: 10.2307/27751132

Dinev, T., & Hart, P. (2005). Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact. International Journal of Electronic Commerce, 10(2), 7-29. doi: 10.2307/27751182

Grazioli, S., & Jarvenpaa, S.L. (2003). Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence. International Journal of Electronic Commerce, 7(4), 93-118. doi: 10.2307/27751079
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now