This website uses cookies to ensure you have the best experience. Learn more

My Internet Security Suite Application Essay

673 words - 3 pages

There so many malicious software on the internet. It is important to have software that can block and remove this malicious software. The name of the software would be called iSecurity Suite. I would develop a mobile internet security suite application for iPad. I want to protect the iPad against viruses, spyware, and use a firewall to prevent other people from gaining access to your iPad.
The first part of the application internet security suite is the anti-virus. This is an important software. It protect against viruses and other internet threats. Anti-viruses software removes and blocks viruses. There so many viruses on the internet and some iPad users think that think they do not need an anti-virus. But if your iPad is jail broken is it easier to download a virus. Apple has done a good job on protecting their software from viruses. But any device that goes on the internet should have an anti-virus. Hacker tends to target Microsoft ...view middle of the document...

Apple has become too content with its success, but did not think ahead. This is wrong because everyday cyber criminals are looking for ways of exploiting its operating system, and every operating system has its vulnerability.
Anti-Spyware software would be the second part of the internet security suite. This software protects against spyware. These types of software or hardware obtain information on people without their knowledge. There are reports of some incidents where spyware was found on iPads. For example, a key logger records everything a user types. By recording this information they can gain access to a user’s personal information. There are many types of spyware, so it is wise to have a suite that is bundled into one package. For instance, there was a bug in the operating system of iPhones and iPads that hackers could exploit. Advertisements that keep appearing on apps are called adware. They can be annoying because they keep popping up and can use up your iPad’s memory. These types of advertisement can be use to spy on iPad user’s internet activities. If anti-spyware software found a program on your mobile device, it would tell the user to remove the spyware from his or her device using the software.
The third part of my internet security suite is the firewall. This is the software or hardware that protects a person’s device from hackers gain access to his or her iPad without permission. It asks the user for permission before it allows a program to gain access to your iPad. This software makes it harder for hackers to gain control of your mobile device. For example, Zone alarm is a popular firewall that controls what comes in and out on a network a computer. Security protection is needed for mobile devices on the internet. A firewall also lets a person know about suspicious programs that are trying to access into his or her mobile devices or computers.
Security is important for iPads and other mobile devices. It is essential to have anti-virus, anti-spyware and firewall software for iPads. This internet security is important so that you can avoid malicious software. Software developers have to think ahead of hackers in order to survive in cyberspace.

Find Another Essay On My Internet Security Suite Application

Should a company select proprietary, open source, or free software for its most important business information systems?

838 words - 3 pages The debate over what type of software to use for important business information systems has been going on since computers were invented. In the early days of computers, open source and free software was riddled with security flaws and had nothing but problems. Commercially available software also had its issues, too, but at least you had someone to call if something went wrong - most of the time. Nowadays, even open source software has the

Understanding TCP/IP Essay

1732 words - 7 pages Introduction ? What is TCP/IP How TCP/IP works Application of TCP/IP Conclusions References Additional information: My report plan Understanding TCP/IP 1.0 INTRODUCTION This appendix discusses the TCP/IP architecture and provides a basic reference model that can help us to understand the importance of TCP/IP in the development of the Internet. It explains TCP/IP terminology and describes the fundamental concepts underlying the TCP/IP protocol

File Transfer Protocol: A White Paper

1336 words - 5 pages File Transfer Protocol (FTP) is an application layer protocol, which has the primary function of transferring data files between computers (Clark 2003). The protocol specification was originally developed in the early 1970s, and was published as RFC 114 in April 1971, by Abhay Bhushan. This occurred even before the Internet Protocol Suite – commonly known as TCP/IP or Transmission Control Protocol (TCP) and the Internet Protocol (IP) – was even

Policing The Cloud

2169 words - 9 pages Introduction Policing the cloud is a difficult task as the internet and web are very big places. In my essay I will cover the reasons for the need to police the cloud and how it is policed so i shall start with: Understanding Cloud Computing. Hacking - why it is done? - how its done? - who are hackers? Security and how it is implemented into Software as a Service Platform as a Service & Infrastructure as a service

Broadband Application Provider's View on FCC Rules for Preserving the Open Internet

1978 words - 8 pages Policy Brief – First Draft Sandeep Nair – 103068647 Representing - Broadband Application Provider’s view on FCC rules for preserving the open internet Executive Summary This policy brief puts forward the point of view of the Broadband application provider regarding the open internet rules proposed by the FCC. The broadband application providers support the open internet rules, which states that the internet should be transparent and the access

The Current Version of the Internet Protocol IPv4

887 words - 4 pages is a conservative extension of IPv4. Most transport and application-layer protocols need little or no change to operate over IPv6. Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory specification of the base IPv6 protocol suite, but has since been made optional Multicasting is the transmission of a packet to multiple

Software

1663 words - 7 pages program that tied disparate PCs together and offered improved reliability and network security. By 1996 Windows NT was hailed as the likely standard for PC networking. In 1995, the Microsoft released Windows 95, which fully integrated MS-DOS with Windows and also the revolutionary Internet Explorer. Windows 95 was followed by Windows 98 and Windows 2000. The latest version of Windows, Windows XP was released in November, 2001. Linux: Linux

Operating System Proposal: Linux

2478 words - 10 pages security patches. According to Schroder (2013), “there are literally hundreds of different versions of the Linux operating system, from tiny embedded automotive and robotics systems, to nearly all of the Top 500 supercomputers. These are called distributions, because each one is a customized bundle that includes the operating system and productivity software, and they are freely distributed over the Internet. Most are free of cost, and there is

Internet Searches

2048 words - 8 pages Introduction Microsoft has historically been best known for its Windows operating systems and suite of Office products such as Word, Excel, and Outlook. Conversely, Google is best known for its internet search engine. As both companies strive for more market share and computer dominance, they are taking the approach of entering adjacent markets to their core competencies. Microsoft, abandoning the Live search engine that has taken a

Smartphones: Developers and Applications

817 words - 4 pages techniques they will use to protect the user’s information. In order for a developer and their application to be successful they must earn the trust of their users. I only covered one method of attack and reviewed a few countermeasures to evade a security breach. Developers must be aware of what attacks are currently being deployed and utilize countermeasures that will protect the user’s information across a suite of applications if the developer creates more than one application.

Evaluation of Tools against Hacking and Cracking

4288 words - 17 pages see the firewall. The specific IP addresses of networks located behind application proxy firewalls are hidden to the user.The firewalls can only protect traffic moving through them. If a user on the private network connects to the Internet in an alternate way, such as a dial-up connection, then security can be compromised. (McNamara, 2002)[Online]. Available at: becta.org.uk/subsections/foi/documents/technology_and_education_research

Similar Essays

Google Docs Essay

1415 words - 6 pages editing rights) or collaborators (have editing rights). Users also have the ability to download Google Docs in other formats, including; Microsoft office (Word, PowerPoint or Excel) or PDF. Google Docs may be published for public view as web pages. Google docs suite is essentially a web 2.0 application that allows users to edit documents stored on a google repository. In order to use google docs, users are required to register once before

The Downside Of Technology Essay

1956 words - 8 pages -notch, but I get it at a discounted rate and it suffices for my browsing behavior. When you go out to buy your AV, you certainly want to opt for the better ones in the industry such as Kaspersky or G-Data, but most of the paid ones would suffice and be adequate protection. You also want to make sure you get the full suite so that it includes everything including AV, anti-spyware, and firewall. I believe Rowan offers free Trend Micro Internet

What Is A Rich Internet Application?

1586 words - 6 pages /www.adobe.com/enterprise/partners/pdfs/sap_flex_aug31.pdf” Although the above diagram is an example of the framework used by Adobe Flash/Adobe Flex, the principle for a Rich Application is mainly the same for all Rich Internet Applications. A Rich Internet Application normally runs through the Internet Browser and does not require software installation to work. For security issues, the majority of Rich Internet applications run client side

Unix Vs Windows Essay

2119 words - 8 pages Internet by Stephen Shankland, a CNET News writer, I found that in 2005 Windows had "bumped" UNIX to get the top spot in server sales for the first time. Just this year Microsoft released its long awaited Windows Vista, but it hasn't been easy for Microsoft in OS market. I myself have been looking at MS Vista as a replacement for my aging XP system for home use. There is no way that UNIX would ever capture the market for personal home computers