This website uses cookies to ensure you have the best experience. Learn more

Internet Security And Confidentiality Essay

2102 words - 8 pages

Table of contents:

Aims: 2
Methodology: 3
Findings 4
Internet Security and Confidentiality: 4
User authentication: 4
Anti-virus protection: 4
Encryption: 5
Fire walls: 5
The range of service offered by ISPs: 6
The cost of the different packages: 6
Functionality: 6
Capacity: 6
Internet Connection and Access Methods: 7
Three broadband packages: 9
Vodafone simply broadband: 10
Unlimited 70Mb & Talk (Anytime) 10
Recommendation: 11
Conclusion: 12
Bibliography: 13


My aims are to require my evidence that will show me to understand of broad range of my learning outcomes in my project brief.
I will have to show the use of the software browser package. I will do my research using search engines to find out about:
• Security and confidentiality on the Internet
• Range of services are offered by ISPs
• Methods of the Internet connection for home and business users
• Based on my analysis of the findings, I will recommend the methods of connecting to Internet.
I will produce a report of the findings including the details of my Methodology, findings and URLs of websites used in the bibliography.


For this research, I used primary and secondary sources to carry out my report for this information.

Then I asked used primary sources to ask people, shops about the broadband packages, in the meanwhile, when I was asking about broadband packages, I used secondary sources to look up more website on broadband packages.

My secondary research was some websites on where I got my information, also I listed the websites.
The internet can sometimes be wrong, so don’t believe in everything, but most of the time the internet is the best method of researching but you will have to be careful with the resources like (e.g. BBC or News Channels).


Internet Security and Confidentiality:

User authentication:
What you know:

Authentication methods are password; you have to keep the password and codes secret, don’t be telling no one what is you pin numbers.
The cost is very low and easy to carry out of this information systems.
What you have:
Most people in business would have keys for security reason for doors or drawers; also they might have swipe cards or USB tokens. Each one would have individual cards, tokens or keys. If they are lost, stolen or even damaged, they will not be able to use them.
Compare these methods with passwords it cost nothing to issue a new password or a pin.
What you are:
A person who verified a security identity like a fingerprint or eye scanner so another person will not be able to get in without you.
Some people would also have set for security is a voice recorder or a signature.

Anti-virus protection:

How can I protect my computer against virus when people is online, make sure don’t click on anything if you don’t know what it about because that might cause a virus. Fortunately, preventing or getting rid of computer viruses is usually...

Find Another Essay On Internet Security and Confidentiality

Internet and a Business' Information Security

1945 words - 8 pages business. Customers would also be concerned that any of their personal information could be sold to other companies, with whom they have no business relationship whatsoever. As a result, the need for privacy policies has become an integral part of a company’s network security. One of the most common lines of defense that are incorporated in our world today, for both personal and commercial internet connection is firewalls. Firewalls are a type

Cryptography and the Issue of Internet Security

937 words - 4 pages questioning the fact that both the growth of the Internet and the number of sensitive transactions which occur on it are exponential. In order to ensure the safety of Internet transactions, whether public or private, methodologies must be identified to safely and effectively encrypt information. Two methodologies are particularly associated with the issue of Internet security and deserve both an explanation and a contrast. These two methods are TCP/IP

Threats to Internet Privacy and Security

950 words - 4 pages The Internet presents various challenges in the realms of privacy and security. Such threats originate from obvious sources such as hackers and malware, but threats come from less obvious sources as well; employees, government agencies, and even one’s self through lack of knowledge or vigilance. Privacy, as explained by Lawrence Lessig (2006), “from the perspective of law, is the set of legal restrictions on the power of others to invade a

Security And Privacy On The Internet

1470 words - 6 pages Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and

Lack of Internet Security and Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions

What are the security problems and solutions of the Internet?

1356 words - 5 pages education, publication and article postings allow us learn more than what we get from text book, and a lot more. As Internet plays more important role in our daily life comparing to its initiation, some keen groups are ringing our bell, hackers, and theft of data, crackers. These people are all associated with a term ¡§security¡¨. It is not difficult for general publics to point out two of the security issues, security of online transaction and

Influence and affect the Internet places on IT Security

784 words - 3 pages Influence and affect the Internet places on IT Security Organizations in today's high technological atmospheres, are becoming ever more reliant on their information systems. The threats are steadily increasing toward information systems from criminals and terrorists. Information is an area that many organizations will identify in their operation as needing protection as part of their system of internal control.The news is filled with articles

The threat of internet security and its effects on electronic commerce

2078 words - 8 pages The threat of Internet security is an issue of growing concern. In the last decade, the number of people using computers on a regular basis has exploded. For quite some time now, computers and the Internet have been a source of entertainment and education, and not until recently have become a means of doing business. At the same time the Internet has also been a fertile ground for fraud. The absence of global regulation, a general lack of


674 words - 3 pages Internet privacyThe concise oxford dictionary defines privacy as being withdrawn from society or public interest. Privacy is the claim of individuals, groups or institutions to determine for themselves when and to what extent information is communicated to others. In the past two years, the world of communications has experienced a revolution as computers across the world have learned to speak with one another.The impact of personal privacy is

Internet Protocol Security (IPSec) for Backbones

1245 words - 5 pages for the secure transmission over the internet . IPSec is mandatory for IPv6 and optional for IPv4 deployments .But as the IPsec provides authentication, confidentiality and integrity of the internet protocol (IP) packets but it slows down the transmission devices and where there is huge transmission of data like in Gbps at the backbone networks, the performance of the transmission devices is highly effected . So to improve the transmission rate

IP security

1417 words - 6 pages IP SECURITY IP SECURITY Internet Protocol Security (IPSec) is a framework of open standards for ensuring secure private communications over IP networks. Based on standards developed by the Internet Engineering Task Force (IETF), IPSec ensures confidentiality, integrity, and authenticity of data communications across a public IP network. IPSec provides a necessary component for a standards-based, flexible solution for deploying

Similar Essays

Internet And Internet Security Essay

1127 words - 5 pages about Internet security because over 53% of America's households are now connected to the Internet. America has been altered by the Internet because it opens up new dimensions or communication. It is much faster and much more efficient then going to a library. I selected this event because nobody knows very much about it. People need to be informed!

Internet Privacy And Security Essay

1113 words - 5 pages Technology is great in so many ways. It has provided us with more communication access, access to knowledge at our finger tips, and so much more. Technology has overall made life easier, but maybe too easy, and has made things a lot less private. This results in us having to be extra careful with security on the internet. Internet security is important to protect our privacy, protect us from fraud, and from viruses that could destroy a piece

Viruses And Internet Security Essay

2763 words - 11 pages Viruses and Internet Security Since the creation and development of the Internet, hackers and intelligent software developers have been able to spread viruses that cause great harm to corporations and households. The Internet has been the gateway for hackers into their journey of obstruction. For example, through the loopholes of Microsoft’s IIS services on its server operating system packages, hackers have been able to open “backdoors

Why Are Security, Confidentiality And Control Important To An Online Magazine

1130 words - 5 pages Given the above definitions the most important features would be Confidentiality, Access Control, Integrity and Availability. The few selected, were chosen given that the nature of the business is an online magazine additionally they were chosen because a good designer should be able to derived the others. It also stated that the user will be required to choose a username and password so access control was mandatory. Confidentiality