Internet Protection Essay, Research Paper
Internet Protection
Thesis: Specific solutions will help people to deal with security threats from Web criminals.
I.Introduction.
A. What makes the Internet so vulnerable to attackers?
B. Understand the term of “hacker.”
II.Four things hackers usually do and provide solutions.
A. Hackers take advantage of software bugs and solutions.
B. Spreading virus through e-mail and solutions.
C. Hacking business Web site and solutions.
D. Stealing credit card number and solutions.
III. Be a knowledgeable Web user and take personal responsibility.
A. Be aware of the rumors on the Web.
B. Apply security measurements to fit your need.
IV. Conclusion.
A. Logical appeal.
Internet protection
Internet security is something that has been a problem since the mid 90s. Millions of new users are connecting to the World Wide Web every year. The Internet transcends geographic locations, and is the first example of a true global village. Unfortunately for regular users of the Internet, much like the real world, criminals exist on the Internet as well. As we have entered the 21 century, specific solutions will help people to deal with the security threats from Web criminals.
First of all, let’s take a look at what makes the Internet so vulnerable to electronic mischief:
Unlike centralized networks operated by commercial online services such as Compuserve and Prodigy, the Internet is a decentralized system spread out cross millions of computers worldwide. Each of these machines has its own passwords and security procedures-or lack of them. In some cases, the Internet is only as strong as its weakest link, and intruders who break into one part of the system can rapidly gain access to much of the rest of it. ( Stallings 20)Electronic criminals, known as hackers, are the people who use this defect of the Internet to illegally gain access to enter another’s electronic system to obtain secret information or do damage on the network. Sometimes these criminals do seemingly harmless acts, such as just going into a computer system and observing, but at other times, they steal, destroy, or alter data through the Web. Before we can stop these crimes from happening, we must understand the four different things a hacker usually does to “hack” your computer and steal your information.
There is almost regular notice in the media about a “backdoor” or “bug” in a program, this is an error in the coding of the program that allows knowledgeable hackers to access the computer system of someone using that program. Most frequently we hear about this regarding a Word Wide Web browser, such as Microsoft’s Internet Explorer or Netscape Navigator. While most people associate Microsoft and Netscape with the United States, they are used internationally. Netscape and Microsoft both have large market shares in countries such as Canada and China, as well as throughout Europe. Therefore, it gives the hackers a chance not only to break into a site in America, but also most of the sites in the world through a software bug. On May 8, 1997, an online news service, News, reported that another bug had been found in Internet Explore. According to the article, “the glitch could allow a malicious Web site to execute any program on a user’s computer without permission, including delete files and upload private information” (Lash and Wingfield n.p.). It is very dangerous because this means, once you have connected to the Internet, the files on your hard drive are not safe any more. If the hackers are only interested in your secret files, they can upload them to the Internet first and access the information he or she has just uploaded. If the hackers are not only interested in your information but also want to do damage on your computer, the situation becomes even worse, they can just delete every program you have.
Fortunately, once the bug was known to the public, there was a patch (repair) available for it within a matter of hours. Microsoft may have an extensive track record of bugs and backdoors in their programs, but they have a great history of quick repairs as well. Therefore, here are my suggestions: First, people should regularly check the updates to their programs. If there are some new “patches” found, download and install them on your computer immediately. Secondly, it should be common knowledge for every Web user to know that you should always back-up your important files, either on paper or the disks that are separate from your computer. It is the most effective way to protect you against most of the attacks.
Hacking into a Web site such as a bank or a big company where you can make thousands or millions of dollars is the supreme goal for most hackers on the Internet. Usually only the hackers with enough experience and knowledge attempt to do this. The latest news is that one of the Microsoft’s internal computer networks was hacked by malicious attackers. According to that article, “Ira Winkler, a security analyst at Internet Security Advisors in Sevrena Park, Md., said the Microsoft hack ‘ appears to be a very complicated and successful attack.’ The hackers did a lot of work to do this without getting detected’”(Weiss & Rosencrance 6+).
Presently, the most common tool for a business Web site to deal with such a threat is to use a Firewall. As the name implies, a Firewall is the system to set up specifically to shield a Web site from abuse and to provide protection from attackers from other computers on the network. Although there are hundreds of different types of Firewalls available on the market, from my own experience, all Firewalls share two basic functions:
one, to block traffic, and the other, to permit traffic. Some Firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. The most important thing to remember is that a Firewall only works after you have designed an access control policy that best fits your needs. I believe the Microsoft break-in last month is probably not due to Firewall itself but a poor access policy. In theory, nobody can break a Firewall if you have a perfect access policy.
The third thing a hacker usually does is spreading virus. Computer viruses have been around for near two decades. Viruses came into mass public attention when hackers used the Internet to spread viruses worldwide in the 90’s. According to the National Computer Security Association in Carlisle, Pennsylvania, “there are six thousand known viruses worldwide and about two hundred new ones show up every month” (Booht 51). These viruses are spreading quickly and can destroy all information on a computer’s hard drive. Melissa, one of the most fast-spreading viruses found last March, spread to more than 100,000 computers in three days with one site reported to have received 32,000 copies of mail messages containing Melissa on their systems within 45 minutes.(Frequently asked questions about Mellisa Virus) “I Love You” is another virus that caused enormous damages last May. According to The New York Times on Nov 5, 2000, “it costs business an estimated $15 billion damage in a short period of time” (Legomsky 9+).
Since most viruses, including Melissa and “I Love You” are spreading by means of e-mail, installing protection on your e-mail system becomes the key point of preventing the virus. Most people run a program called virus scan, like McAfee’s Virus Shield, before opening their e-mail. Although it is easy to use and does prevent 95% virus on the Web, this technology could not possibly keep up with 200 new virus every month.
Jiang 5
I have downloaded a few viruses even after virus-scanning. Therefore, once again, remember the only way to keep your computer truly safe is to constantly back up everything that you do.
The last and most dangerous thing a hacker usually does is stealing people’s credit card numbers when they purchase online. When commerce is conducted over the Internet, a network is open to millions of potentially prying eyes. Hackers are able to intercept the data transfer and grab the information about people’s credit cards by taking advantage of some poorly secured sites. The main problem for e-commerce is that there are too many irresponsible sites so that as many as 75% of consumers are worrying about their credit card security over the Internet (McGeehan H.34+).
The best way to protect your credit card numbers is never use them over the Internet. However if you have to use one someday online, make sure it is not a debit card. “If someone gets your debit card number, they can drain all your bank accounts. With a credit card, you are protected after the first $50 of fraudulent use. You are not guaranteed that protection if you use your debt card;” cautions George Hellery, Senior consultant for Janus Associates (Delonardo 7+). Another important thing consumers need to think about is whether they are familiar with the company or not and what types of security measures they provide to protect you. Since there are too many irresponsible sites on the Internet, people should always buy their product from reliable sites like famous buy, or auction, etc.
The hackers sometimes may harm your computer severely, but at the other times, people are just frightening themselves by believing the rumors on the Web unconditionally. One perfect example is that of the virus hoax. According to The San
Jiang 6
Diego Union-Tribune on November 9, 2000, “A rising tide of warnings about nonexistent
computer threats is proving nearly as disruptive as the actual viruses. The hoaxes have become a kind of virus themselves, passed along with good intentions but sometimes swamping computer networks” (Wilson 5+). Give someone an idea and they will run with it, that’s the true result of the hoaxes. And unlike the real viruses, people will never find a “patch” for these hoaxes which will probably cause a chaos. Therefore, the only way to deal with a virus hoax is that people must be aware of the doubtful e-mails they are receiving and think independently.
Since people all have different reasons of being online, it is very important for people to know that they should apply security measures to fit their specific needs. For example, for most of the Internet users who don’t even have a home page, there is no need for them to install Firewalls because their Web site will never be attacked by hackers. And similarly, if you never use Netscape’s Navigator, of course you don’t need to fix the bugs in it. Understand what you need is a very important step to be a knowledgeable Web user.
In conclusion, since Internet security problems are no longer far from our daily lives, it becomes more and more essential for people to know what a Web crime is, the four things a hacker most frequently does, and the most important of all, specific solutions to deal with those threats. With the proper cooperation among knowledgeable Web users, responsible on-line companies, and software producers, the Internet will ultimately be a safe and enjoyable place to be.
Другие работы по теме:
Dsl Vs Cable Essay Research Paper 22
Dsl Vs. Cable Essay, Research Paper 2.2 Why focus on Internet access? Internet access has several desirable properties as an application to consider for exercising residential infrastructure. Internet technology is
Internet Structure Essay Research Paper The Internet
Internet Structure Essay, Research Paper The Internet connects nearly 400 million users worldwide and is an essential part of how we work, play, communicate, and conduct commerce. We use the Internet in ways that seemed unimaginable The term “Internet” refers to the global information system that — (i) is logically linked together by a globally unique address space based on the Internet Protocol (IP) or its subsequent extensions/follow-ons. (ii) is able to support communications using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite or its subsequent extensions/follow-ons, and/or other IP-compatible protocols; and (iii) provides, uses or makes accessible layered on the communications and related infrastructure described herein.”, either publicly or privately, high level services.
Internet Censorship Essay Research Paper Censorship of
Internet Censorship Essay, Research Paper Censorship of inappropriate material has been an issue with every form of mass media. Now the new and upcoming Internet is becoming the focus. Software makers and service providers are choosing what the public should see. Does this seem right? How can a stranger choose what another person or their family sees on the Internet? Parents and adults should choose what they and their children are exposed to on the Internet.
Addicted To Internet Essay Research Paper ADDICTED
Addicted To Internet Essay, Research Paper ADDICTED TO INTERNET In the past several years many people have been getting computer literate. As time passes by, people also have been getting addicted to their
Cyber Porn And Internet Privac Essay Research
Paper Cyber Porn and Internet Privacy Two computer ethic controversies There are many controversial questions about computer issues today but there are many debates with cyber porn and internet privacy. The Internet is accessed by millions of people everyday, especially children. Cyber porn is all over the Internet and can be accessed by anyone from anywhere whether in school, home, or on the job.
Internet Shopping Essay Research Paper Internet shopping
Internet Shopping Essay, Research Paper Internet shopping is one of today’s most popular activities for shopper people. Shopping on the Internet can make people relax and take their time to think about the product that they want to buy. Internet shopping is getting used to be more familiar to people in this society today’s.
The Internet Essay Research Paper Information has
The Internet Essay, Research Paper Information has long been sought out by many generations throughout time. It is a powerful tool that has often been hard to find, until the evolution of the Internet. The Internet has
Internet Privacy Essay Research Paper Introduction I
Internet Privacy Essay, Research Paper Introduction:- I have been using internet for the past five years. I have heard quite a lot about Credit Card Fraud’s,Internet Privacy,etc but i never really thought it was true. I thought it was just some bunch of amateur’s who didn’t really knew how to use the internet.
Internet Good Or Bad Essay Research Paper
The question that many people have on their minds is, “Is the Internet good or bad?” In this article, we will give you information so that you can make an educated decision for yourself. We will first concentrate on the bad issues of the Internet. Then, we will tell you the advantages of having the Internet. We hope this will help you make a good decision for your family or business.
Internet Search Essay Research Paper I recently
Internet Search Essay, Research Paper I recently took a workshop on how to use the Internet. I thought that writing an essay on ?how to use the Internet? would help me to remember what I learned
Internet Piracy Essay Research Paper In this
Internet Piracy Essay, Research Paper In this day and age where technology is rampant and advance, it is critical that we comprehend the possibilities that such technology has, no matter whether it is good or bad. From our very own households, we can now ?get connected? and experience this technology first hand.
The Internet Vs The Library Essay Research
Paper The Internet vs. the Library Overall, when one compares the Internet vs. the Library, the Library is superior. This is because, though it takes a bit longer to use, the Library has a standard information research tool; the Dewey decimal system. This organized system makes finding books simple, and with the added assistance of a librarian, finding information can be easy.
Education On The Internet Essay Research Paper
Education on the Internet In today’s society, the internet has become a very important learning tool. It is used for day to day activities, such as a place to look up research, a method of getting in touch with friends and family, and somewhere to go to find information about almost anything imaginable. The most popular uses of the internet include entertainment and education.
Ipv4 Vs Ipv6 Essay Research Paper Evan
Ipv4 Vs. Ipv6 Essay, Research Paper Evan Gilden 2/12/01 CIT/TCT 120 Ipv4 vs. Ipv6 Ipv4 is short Internet Protocol Version 4, the same goes for Ipv6. Most of todays internet uses Ipv4 witch is almost 20 years old. There has been one magor problem with Ipv4, it is running out of IP addresses (IP addresses are a unique identifirer for a computer on the internet).
America Online Essay Research Paper America Online
America Online Essay, Research Paper America Online To Unveil Flat Fee For Internet Access The Internet is becoming more popular and more widely used, and the Market for internet access is growing rapidly. To stay
Information Security Essay Research Paper Emerging Opportunities
Information Security Essay, Research Paper Emerging Opportunities and The Internet – Information Security by Margaret Headley “Using encryption on the Internet is the equivalent of arranging an armoured car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.” Gene Spafford, computer security researcher, Purdue University.
Internet Legislation Essay Research Paper subject
Internet Legislation Essay, Research Paper subject = LAW title = Internet Legislation papers = Internet Legislation With the recent popularity of the Internet many topics concerning it have hit main
Filtering The Net Essay Research Paper Filtering
Filtering The Net Essay, Research Paper Filtering the Net Over the last several years many attempts have been made to put a limit on what can be viewed on the Internet. In 1996, it was the Communications Decency Act and in 1999 the Child Online Protection Act. Both were shot down because they were said to violate the first amendment right to free speech.
Computers Essay Research Paper Why We StartedInternet
Computers! Essay, Research Paper Why We Started Internet Mental Health is a free encyclopedia of mental health information. It was designed by a Canadian psychiatrist, Dr. Phillip Long, and programmed by his colleague, Brian Chow.
Napster Debate Essay Research Paper Napster DebateFor
Napster Debate Essay, Research Paper Napster Debate For a project in college eighteen-year old Shawn Fanning wrote a program for a way to download music off the internet. He later put the program on the internet and Napster was born. Napster is a program that allows you to download music on the internet. Since this program is free, many people have downloaded Napster.
Internet Advertising Essay Research Paper Internet AdvertisingInternet
Internet Advertising Essay, Research Paper Internet Advertising Internet Advertising is the way of the future and it is very evident since many companies and businesses have their own web sites and advertisements are located all over the World Wide Web. The Internet or World Wide Web is quickly becoming the most effective way for a business to advertise their products or services to customers.
Internet And Cyberspace Essay Research Paper My
Internet And Cyberspace Essay, Research Paper My research project tries to delve into commonly misunderstood or badly formed interpretations of the Internet. In this assignment I analyze common web terms such as the matrix, cyberspace, virtual reality and to an extent artificial intelligence. I explore the interpretations of people from a wide array of society with regard to these Internet concepts.
Internet For Dummies Essay Research Paper The
Internet For Dummies Essay, Research Paper The Internet is a huge network of computers spanning the lengths of this planet and is now started to bring in the surrounding area like space. Some computers share data like servers, others just surf the web as clients downloading the data. Public Internet began in the late 70?s, but that?s not what I?m going to teach you.
The Internet And World Wide Web Defined
Essay, Research Paper Christopher L. Isaacs 1010 ? Technical Writing Extended Definition 00 March 6th The ?Internet? and ?World Wide Web? Defined In recent years the Internet and World Wide Web (WWW) have become more and more popular as an information resource. Many people believe that the WWW is the same as the Internet.
Internet PC
’s: Next Wave Or Nonsense? Essay, Research Paper Internet PC’s: Next Wave or Nonsense? Call them what you will: Internet appliances. Network terminals. The whole
St Augustine Essay Research Paper Augustine of
St. Augustine Essay, Research Paper Augustine of Hippo (354-430 AD) took great pains to create and project a powerful image of himself beyond the churches and towns where he wrote and taught in Roman
The Internet 2 Essay Research Paper The
The Internet 2 Essay, Research Paper The Internet The Internet is a place with an infinite of possibilities. It is the biggest technological breakthrough ever created. The Internet symbolizes freedom. It is uncensored and unregulated by the government. And that is hard to come by these days. With the Internet anything is possible.
Internet Marketing Essay Research Paper Internet Marketing
Internet Marketing Essay, Research Paper Internet Marketing and Associated Topics Computers and the Internet are becoming faster and capable of new and exciting things every day. Through this evolution, businesses have begun to reach out to consumers in new, unprecedented ways. With the amazing growth of users of the Internet, and the enormous growth that is expected to continue, businesses are aware that there is tremendous potential to provide and promote products and services in previously inconceivable ways.
The Old Man And The See Essay
, Research Paper THE HISTORY OF INTERNET In the beginning of the 1970`s in USA was an older military network called ARPANET converted to Internetvork wish was a network between networks. Accept a few Universities
ECommerce Essay Research Paper ECOMMERCEApril 10 2000
E-Commerce Essay, Research Paper E-COMMERCE April 10 2000 E-Commerce Electronic commerce has its ups and downs for consumers. On one hand, online shopping holds the potential for more convenience and broader selections. On the other, it has bred confusion over the legitimacy of electronic records.