• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet Security and Privacy ThreatsIntroductionIn this day and age technology plays a part in our everyday lives

Extracts from this document...

Introduction

Running Head: Internet Security and Privacy Threats Internet Security and Privacy Threats University of Phoenix Tiffany York E-Bus 400 Mark Merkow 06/15/2005 Internet Security and Privacy Threats Introduction In this day and age technology plays a part in our everyday lives. It's a wonder how we functioned without the internet, or the debit card, or cell phones. These are everyday conviences that have truly helped to make our lives better. But with all of this "convience" there comes a price to pay. With us being so connected we also become more vulnerable. In this paper I will discusses some of the newest internet security concerns for both consumers and buinesses as well as discuss some privacy concerns as it pertains to online banking. Phishing and Pharming Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants. ...read more.

Middle

Computer systems that are already compromised continue to be used to carry out new directions and overtake other unprotected computers. Some Internet security experts said the best way to defend against these threats is to adopt a layered security approach. Layering protection protects five key access levels within an IT environment. These include the perimeter, the network hub, the host file, the network application and the stored data. Within an enterprise environment, protection should include intrusion detection and prevention (IPS) software, as well as vulnerability management software. Another essential security component, according to experts, is an endpoint compliance policy used in conjunction with a hardware firewall, antivirus software and a Virtual Private Network. Privacy Concerns For Consumers Internet banking has grown steadily since it became an option for household banking customers 10 years ago. The 10 biggest U.S. banks alone had more than 34 million customers turning to the Internet at the beginning of this year, a more than 50 percent increase from last year. ...read more.

Conclusion

What could go wrong? If your Internet bank account is compromised, here are some ways you could be defrauded: Unauthorized withdrawals: A thief could log on and initiate a wire transfer or use an online bill-paying service to issue checks. Identity theft: Someone could use details gleaned from your online bank account to set up new credit accounts in your name. Details commonly viewable on online accounts include name, address and phone number. Check images might include a driver's license number or Social Security number. Online accounts also might contain payment details revealing who your employer is and what credit cards you hold. Check fraud: Combining offline and online theft, a criminal can get check images from your online account and use them to create new checks in your name. Conclusion In conclusion, the best advice that I can arm anyone with to combat those relentless theives and hackers is to be aware and be smart! Make it a point to stay up on new ways to protect yourselves. Your identity is worth protecting. ?? ?? ?? ?? Internet 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. "Does Technology have an essence? Define what this might be and critically assess how ...

    Rutsky seems to appreciate this where he explores the "techno-cultural unconsciousness": "technology is neither an external instrument nor simply a threatening, uncontrollable other, but a promising generative process that, however monstrous or alien it may seem, is already ongoing within us."

  2. Campaigner for Digital Privacy Rights.

    Right now there is, unfortunately, a lack of awareness about how extensively personal information that has been collected is used on the Net and to whom this information is shared. Most don't realize the vast information sharing chain that exists once a company or governmental agency obtains your personal information.

  1. Impact of Internet on Plagiarism. This paper aims to explore the reasons behind ...

    There are several ways to develop critical thinking abilities though it is not possible to simply learn them. Every assignment can be broken down into logical chunks which encourage thinking and analysing on the students' part. Students can also participate in class room discussions to the maximum possible extent to understand various viewpoints and relate them to one's own views.

  2. Nations today, most commonly such as China, Iran, and Burma has become infamous for ...

    only allow citizens access to websites that lean in favor to the bias of the government. This includes the restriction of website's of the government's party in power opposition in Thailand, and the restiction of access to minority religious websites in Pakistan.2 However, China remains the world's most infamous user

  1. Free essay

    Music Distribution in the Digital Age

    Artists featured are from record as well as independent labels. Our understanding of economies relating to the international music industry has hence altered, as it seems far more viable that local artists will succeed without having to offer a unique persona to a record company in order to be offered

  2. Nagoya, 2005 Aichi Expo

    The impact could be felt immediately because more than 120 foreign governments and international organization have already decided to participate in the exposition. For that reason, Japan's advancement in technology has created a buzz all around the world will its fascinating technology.

  1. ICT Report 3D

    They can also use the internet to contact friends and family abroad via e-mail or instant messaging. Another use of the internet is setting up insurance online, especially since many insurance providers offer cheaper fees online. Students who lack the access to the internet at school or home might need

  2. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    This undoubtedly showcases society at both macro and micro scales through the internet has become increasingly active in tackling social issues we ignored in the past. The emergence of Twitter movements as BlackLivesMatter and Feminist Culture aided by the Freedom of Information Acts highlights the internet today taken on a prominent role in the fight for equality (Sheldon, 2011).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work