This website uses cookies to ensure you have the best experience. Learn more

Threats To Internet Privacy And Security

950 words - 4 pages

The Internet presents various challenges in the realms of privacy and security. Such threats originate from obvious sources such as hackers and malware, but threats come from less obvious sources as well; employees, government agencies, and even one’s self through lack of knowledge or vigilance. Privacy, as explained by Lawrence Lessig (2006), “from the perspective of law, is the set of legal restrictions on the power of others to invade a protected space” (p.201). Cisco describes network security as the activities which protect a computer network to ensure “… the usability, reliability, integrity, and safety of your network and data” (n.d.). The two terms are closely related in Internet security, and as such, the threats outlined can be considered to have element of both privacy and security. The following is a brief analysis of a few common threats to Internet privacy and security.
Manned Threats
There are many threats that are manned attacks from a live hacker or hackers. IP spoofing is one such threat where IP packets are intercepted and altered by inserting a false source address into the packet header. The purpose of IP spoofing is to create false entries into network routers, creating valid entries for an invalid IP address, and is a precursor to further hacking techniques. A hacker can take control of an authenticated communication session by correctly guessing the session’s TCP sequence number, called a sequence number attack. The attacker intercepts a communication from the client to the server, guesses the next sequence number, and injects a spoofed IP address to go to the server. The server will then send an acknowledgement to the spoofed IP address (Joseph Migga Kizza, 2011p.72-73).
A hacker may attempt to directly break into a network by one of three classes of penetration attack; masquerader, misfeasor, or clandestine user (Joseph Migga Kizza, 2011p.89). A masquerader is someone who uses someone else’s credentials to gain access to a system. A misfeasor is “a legitimate user who gains access to system resources for which there is no authorization” (Joseph Migga Kizza, 2011p.89), and a clandestine user is a privileged user who abuses her privileges to evade security measures. Once access to a network is achieved, a packet sniffer can be used to monitor traffic as it traverses the network. A packet sniffer in conjunction with a network access interface set to promiscuous mode will allow a hacker to view packets traveling the network and delete or alter their contents. An example of a network attack by the use of a packet sniffer is a disgruntled employee who uses a packet sniffer to steal authentication information from within the organization, then later uses the stolen credentials to steal proprietary information to be sold on the black market.
Unmanned Threats
There are many threats to privacy and security on the Internet which are automated in nature or inherently insecure, and generally...

Find Another Essay On Threats to Internet Privacy and Security

Privacy in computers - the effects that unstable security systems can have on large businesses and the threats they deal to databases

650 words - 3 pages information at their own will. This moral right of privacy to an individual is breached and therefore forfeits its privacy.Private records and information that are obtained in computer databases require the best available physical and electronic security available. This will ensure that all data is only accessible to authorised users. Without adequate security, almost any user could log onto these private records and view them accordingly. This opens


674 words - 3 pages Internet privacyThe concise oxford dictionary defines privacy as being withdrawn from society or public interest. Privacy is the claim of individuals, groups or institutions to determine for themselves when and to what extent information is communicated to others. In the past two years, the world of communications has experienced a revolution as computers across the world have learned to speak with one another.The impact of personal privacy is

Internet Safety and My rights to Privacy

878 words - 4 pages bundle of software sounds great and is easily installed what did you give up? You turned control over to the software and most of the time at the default security settings. What this means is you are going to have to learn to work with it, when it should be learning to work with you. Sorry, they have not yet set it up to learn how you browse the Internet. You are going to have to do some adjusting. This means that if you visit web sites that do have

Internal Threats to network security

1754 words - 8 pages Internal Threats to Network Security The topic of network security is a reoccurring theme in today’s business world. There is an almost unfathomable amount of data generated, transmitted, and stored every day. Unfortunately the media and traditional reporting sources these days typically only focus on outside threats such as hackers. Many people completely overlook the insider threats that are present and can potentially pose and even

Internet and Internet Security

1127 words - 5 pages about Internet security because over 53% of America's households are now connected to the Internet. America has been altered by the Internet because it opens up new dimensions or communication. It is much faster and much more efficient then going to a library. I selected this event because nobody knows very much about it. People need to be informed!

Privacy and the Internet

3948 words - 16 pages listeners and who they may be is the responsibility of the person desiring privacy. Constant diligence in staying abreast of current threats (both technological and political) and available measures to reduce or eliminate those threats is the only way to maintain privacy. Summary Can personal privacy be protected on the Internet? Only if the user is aware of the potential risks to privacy and takes steps to counter those risks. The

Internet and Personal Privacy

856 words - 3 pages Internet and Personal Privacy In the world of today most records can be easily accessed by a home computer. Even Governmental records can be viewed. Some believe this has benefits, while others are screaming about invasion of privacy. Heated debates can go on for many hours about this topic. Each side has people who devote all their time and energy to see their side of the argument prevail. The Freedom of Information Act which was

Internet crime and privacy

1045 words - 4 pages Criminals that engage into internet crime can get rid of the old ski masks, and dangerous weapons, and simply arm themselves with a computer, a modem and an intelligent plan to rob a bank right from the comfort of their own homes.Is it really that easy to steal user identities, violate the so-called high-tech security of a bank and conduct transactions that would surrender millions, even billions of dollars? Internet crime is not confined to the

Steps To Effectively Respond To A Security Incident And Threats On A Wireless Network

1172 words - 5 pages Steps to Effectively Respond to a Security Incident and Threats on a Wireless Network Incident response is usually one of those security areas that tend to be impromptu—companies don't think about it until they have to. But that needs to change. In this paper I will discuss five steps - identification, containment, eradication, and recovery and follow up a business use to effectively response to a security threat and I will suggest four

Online Privacy and the Internet

1148 words - 5 pages do. The average, everyday citizen can only be more careful about what they broadcast on the internet, especially in regards to private information or sensitive photographs. In conclusion, the issue of online privacy appears to be a larger problem of balancing family and national security with protecting personal information. Parents are responsible for their children, as is the government responsible for defending the country against

E-commerce: Security and Privacy

2129 words - 9 pages E-commerce: Security and Privacy As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through

Similar Essays

Internet Privacy And Security Essay

1113 words - 5 pages Technology is great in so many ways. It has provided us with more communication access, access to knowledge at our finger tips, and so much more. Technology has overall made life easier, but maybe too easy, and has made things a lot less private. This results in us having to be extra careful with security on the internet. Internet security is important to protect our privacy, protect us from fraud, and from viruses that could destroy a piece

Threats Posed By The Internet To Personal Privacy

1034 words - 4 pages :// Awareness Network (2005). Cyber Marketing and Personal Privacy on the Internet. Retrieved August 20, 2005 from and World Report Survey (2000). Threats to Information. Retrieved August 23, 2005 from www.usnews/article/

Security And Privacy On The Internet

1470 words - 6 pages appropriate to use for a particular system. The software which I have described in above is most effective for end-user and is relatively easy to install and configure. With these programs and basic knowledge about threats of security and privacy issue on the Internet, one could feel less vulnerable and use Internet with confidence. References Zaharchenko, A. (2002, December 24). Futurology without future. Retrieved March 14, 2005, from http

Lack Of Internet Security And Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions