This website uses cookies to ensure you have the best experience. Learn more

Independent Research Paper Internet Security

1847 words - 7 pages

Independent Research Paper-Internet Security

Using the Internet today, there are numerous ways to stay connected to other people also using the Internet. You can use e mail, chat rooms, and the most popular, Instant Messaging. The risks of using e mail have always been evident. Receiving and downloading e mails and attachments from people you do not know always carried the risk of downloading and infecting your computer with one or several viruses that could possibly destroy your computers operating system.

On a personal computer, the cost of having your computer destroyed due to a virus would be at the most several hundred to a thousand dollars, depending on whether the whole computer needed to be replaced. But on a computer connected to several or hundreds of other computers, such as a computer would be at a business or company, the potential to ruin hundreds of other computers, causing the loss or potential theft of confidential and very important business oriented information is very high.

Software vulnerabilities leave your business vulnerable to serious downtime. But patching can be time-consuming and expensive to maintain. Organizations need an effective patch management program that protects critical assets and makes business sense.

For the past couple years, e mail is a very popular way to conduct company oriented business and to distribute important information. Today, however, Instant Messaging is becoming an ever more popular way to conduct meetings and to pass information.
Monitoring of e-mail is now corporate policy for most institutions, but regulatory pressure has yet to be extended to IM conversations that happen on free, public networks. “There are about 60 published IM vulnerabilities”, according to Eric Chien, chief researcher at Symantec Security Response in Dublin. “Those range from security holes that could be used to crash IM clients in denial-of-service attacks, to those which allow attackers to install and run malicious code remotely on computers running the vulnerable IM clients.”

Although the information passed over Instant messages may not be of any importance to anyone else, when companies such as banks use this type of network to conduct important transactions, not only information, but often high amounts of money are at risk.

The sophisticated techniques of hackers that are used to infiltrate computers through e mail, are now being adapted to help hackers send virus files or Trojan Horse programs to IM users or capture a user’s list of IM buddies. These files are called Application Programming Interfaces (APIs) which can be purchased from major suppliers and used to create an IM worm.

Another aspect of IM worms and viruses that attracts many hackers to this type if hacking, is that it is faster, simpler, and more effective. Unlike those worms, IM worms do not need to scan the internet for the IP addresses of vulnerable systems, a process that greatly slows the spread of traditional...

Find Another Essay On Independent Research Paper-Internet Security

The Internet Evolving Dissident Journalism - Emerging voices - Research paper

1863 words - 8 pages 1 Devon Imrie The Internet Evolving Dissident Journalism Emerging Voices Monday, November 28, 2016 The Internet Evolving Dissident Journalism The Internet has evolved into a platform where mass amounts of people gather and share what’s important in their lives. With so much information being passed around daily it’s important that between finding out if the Raptors won and who Drake is dating now, that major social issues are being shared. The

Internet And Information Technology - Inti International University - Research Paper

1393 words - 6 pages can't control access to information… " The point of controlling access to the new developments is not whimsical to Asia alone. An attempt in 1996 by the United States government to blacklist "revolting" materials on the Internet was rejects by a US chose judge who chose that the Internet justified security from government sanctioning. The US government however indicated it would ask for the choice. At issue here is the test posed to solitary

Information Security: Introduction to Research Paper Regarding e-government Security Weakness

535 words - 3 pages & Chau, 2005); (Hwang, Li, Shen, & Chu, 2004) (Lambrinoudakis, Gritzalis, Dridi, & Pernul, 2003) (Wimmer & Von Bredow, 2002). The first issues on security coming in mind regard of course technical aspects. Security aspects not only regard technical issues. Instead, these need careful investigation from a socio-technical viewpoint as well (Wimmer & von Bredow, 2001). In this paper, we will carry out a systematic review of the existing literature on e

Security Expansions and Enhancements Following September 11 - English Literature and Composition - Research Paper

1162 words - 5 pages Jensen 1 Lily Jensen Ms. Frauenholz Academic English 12 12 October 2017 Security Expansions and Enhancements Following September 11 On September 11, 2001, Americans witnessed a new depth of terrorism that amounted to the destruction of the World Trade Center, a gaping hole in the Pentagon, and a plane crash in Shanksville, PA. Devastation fell over America, but despite the series of terrorist attacks, “more than 263 government organizations

Research proposal on predictors of Internet addiction among Shanghai undergraduates

2009 words - 8 pages Internet addition test. CyberPsychology & Behavior. 7(4): 443-50.Lu, H.P. and Wang, S.M. 2008. The role of Internet addiction in online game loyalty: an exploratory study. Internet Research. 18(5): 499-519.4. Brief explanation of the three research papersThe research paper conducted by Young (1996) mainly talked about the Internet addiction as a new clinical disorder. It investigated the existence of Internet addiction and the extent of problems

Challenges and Solutions to the Security and Privacy Concerns of MSNs

2124 words - 9 pages with security and privacy risks (Liang et al., "Efficient and Secure Protocol” 170). The recent privacy attacks include the leakage of sensitive personal information, unraveling of relationship cheaters, and Sybil assaults. The internet providers and independent organizations have done much research to find resolutions to this issue. However, they have not achieved much yet due to the constant evolution of social network applications. The problem

The Internet's Impact on Information Technology Security

1408 words - 6 pages global network relentlessly. As a comprehensive overview of the Internet's adverse impact on information technology security is beyond the scope of this paper, the following analysis will examine some of the issues many organizations currently face in securing their networks from pervasive and relentless Internet-based attacks.Network SecurityBy enabling Internet connectivity, organizations have opened their internal networks to various common

How Might the Internet Negatively Affect the Democratization of Authoritarian Regimes?

2307 words - 9 pages countries. It is a tool used in a specific social context, but it is not a cause of political change. And, while authoritarian governments have supported the use of the Internet for limited economic reasons, they have also increased censorship and regulation to ensure it does not become a threat to the status quo (MacKinnon, 32).This paper focuses on the negative uses of Internet by authoritarian regimes by outlining: how the emergence of the Internet

Information Security: Security Acts and Effectiveness

2438 words - 10 pages , the protection of information is critical to prevent unauthorized access to data. Governmental regulations and independent frameworks have been created in order to assist organizations in establishing the minimal requirements necessary to protect consumer information and organizational data. Organizations face constant threats to information security and it behooves an organization to abide and implement mandatory governmental requirements

Internet control and ownership in Malaysia (including bibliography)

2329 words - 9 pages "people-power" demanding political reform and whilst the government attempted to silence news accounts of these events, independent journalists, NGO leaders and students used the Internet to inform and to mobilize the growing public opposition throughout the country, ultimately leading to President Suharto's decision to resign (Eng, 1998).In the Philippines, political activists used cell phones with text messaging capabilities to mobilize "instant

Ethics on the Internet

2413 words - 10 pages started life in 1969 as the US Department of Defense Advanced Research Projects Agency network (known as ARPAnet). It was designed to provide a distributed, flexible and self-healing command network that would enable the US military to continue operating even if Soviet military missiles took out certain geographical locations on the network.Following its creation as a network for the American military, the Internet as it became called evolved into

Similar Essays

This Was A Research Paper For Intro To The Internet Class

943 words - 4 pages . This is great!I found a Stephen King newsgroup, and enjoyed reading the postings. There was an argument about the cost of The Green Mile. Because this novel was published in six installments it cost more than first edition hardcovers. This caused some controversy, and I was glad to see it bothered other people besides me. If I had Internet hookup at home, I would definitely spend some time in this newsgroup.I found much information by doing this research paper. I am glad I chose Stephen King because now I know how much is out there concerning him. I am sure I will use this information in the future.

Internet Privacy A Detailed Research Paper About Internet Security And Its Loop Holes...A Computer Sceinece Engineering Course Essay With Work Cited Pages

674 words - 3 pages Internet privacyThe concise oxford dictionary defines privacy as being withdrawn from society or public interest. Privacy is the claim of individuals, groups or institutions to determine for themselves when and to what extent information is communicated to others. In the past two years, the world of communications has experienced a revolution as computers across the world have learned to speak with one another.The impact of personal privacy is

Virtual Work, Security, And Privacy Iaas 600 Research Paper

1009 words - 5 pages laptop computers which can be stolen or lost easily. The textbook supports the previous statement by referencing the two unsecured AvMed Health Plans Inc. laptops that were stolen in 2010 and for which contained approximately two hundred and eight thousand customer’s health information and social security numbers (Workman, Phelps, & Gathegi, 2013, p. 44). Julie Tappero, the author of the article The Risks & Liabilities of Telecommuting

Virtual Work, Security, And Privacy Iaas 600 Research Paper

1215 words - 5 pages employee's are perpetrated by employers (Yanisky-Ravid, 2013 p. 6). Later the author asserts “the Internet has blurred the borders between social contexts and mixed the different situations, creating a blend, and sometimes a clash, of rights and wrongs (Yanisky-Ravid, 2013 p. 13). Then asks the question if it is okay to be terminated for a picture of an employee at a costume party posted on the Internet, whereas if the very same picture was still