• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet Security and Privacy ThreatsIntroductionIn this day and age technology plays a part in our everyday lives

Extracts from this document...

Introduction

Running Head: Internet Security and Privacy Threats Internet Security and Privacy Threats University of Phoenix Tiffany York E-Bus 400 Mark Merkow 06/15/2005 Internet Security and Privacy Threats Introduction In this day and age technology plays a part in our everyday lives. It's a wonder how we functioned without the internet, or the debit card, or cell phones. These are everyday conviences that have truly helped to make our lives better. But with all of this "convience" there comes a price to pay. With us being so connected we also become more vulnerable. In this paper I will discusses some of the newest internet security concerns for both consumers and buinesses as well as discuss some privacy concerns as it pertains to online banking. Phishing and Pharming Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants. ...read more.

Middle

Computer systems that are already compromised continue to be used to carry out new directions and overtake other unprotected computers. Some Internet security experts said the best way to defend against these threats is to adopt a layered security approach. Layering protection protects five key access levels within an IT environment. These include the perimeter, the network hub, the host file, the network application and the stored data. Within an enterprise environment, protection should include intrusion detection and prevention (IPS) software, as well as vulnerability management software. Another essential security component, according to experts, is an endpoint compliance policy used in conjunction with a hardware firewall, antivirus software and a Virtual Private Network. Privacy Concerns For Consumers Internet banking has grown steadily since it became an option for household banking customers 10 years ago. The 10 biggest U.S. banks alone had more than 34 million customers turning to the Internet at the beginning of this year, a more than 50 percent increase from last year. ...read more.

Conclusion

What could go wrong? If your Internet bank account is compromised, here are some ways you could be defrauded: Unauthorized withdrawals: A thief could log on and initiate a wire transfer or use an online bill-paying service to issue checks. Identity theft: Someone could use details gleaned from your online bank account to set up new credit accounts in your name. Details commonly viewable on online accounts include name, address and phone number. Check images might include a driver's license number or Social Security number. Online accounts also might contain payment details revealing who your employer is and what credit cards you hold. Check fraud: Combining offline and online theft, a criminal can get check images from your online account and use them to create new checks in your name. Conclusion In conclusion, the best advice that I can arm anyone with to combat those relentless theives and hackers is to be aware and be smart! Make it a point to stay up on new ways to protect yourselves. Your identity is worth protecting. ?? ?? ?? ?? Internet 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. Cyber Ethics @ Computer Ethics

    When a transaction takes place, Who has jurisdiction? Who has the authority to apply law over the transaction? For example, if you buy a laptop in your local computer store, you know your legal rights. If the computer does not work when you take it home, and the store refuses to settle up, then you can probably take the dispute to your local small claims court.

  2. Moral and ethical uses in Information Technology.

    More than 200,000 complaints have been lodged by AOL users about the sexually explicit bulk advertisements, the company said. AOL sued Millennium and its Bloomfield Hills operators on March 28 in U.S. District Court in Detroit. "If it has an 'XXX' or dollar sign in the subject line, it has

  1. Nations today, most commonly such as China, Iran, and Burma has become infamous for ...

    of internet censorship, ranking the maximum of five stars by Reporters without Boarders and labeled as 'very serious'.3 Web page censorship in China have ranged from new sources that contain 'taboo' national topics such as the 1989 protests at Tianneman Square, sites supporting the Tibet liberal movement and the teachings

  2. What are the implications for individual identity in relation to the rise in Internet ...

    The health implications of such a life style are also obvious, spending all day sat in from of a computer screen isn't going to give any exercise of any sort, and the damage to eye-sight of spending hours and hours staring at a screen is high.

  1. The main ethical issues relating to Information Technology.

    hours a day online, either for his own pleasure or to investigate cases. ''About half of the people in these pervert chat rooms are cops,'' Folk said. McLaughlin disagrees. ''There's not enough police officers out there,'' he said. According to the search warrant, McLaughlin was surfing the Internet last month when he met ''KevininKy'' in a chat room called ''gayphonesex.''

  2. Free essay

    Music Distribution in the Digital Age

    This is legitimate as the company has licensed rights to distribute music from the large media conglomerates such as Universal, Sony, Warner and EMI, which together currently control the distribution of over 70% of the world's music (Jobs, 2007), while artists themselves do not receive fair compensation.

  1. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    In correspondence with this trend the EU in 2004 created a high tech crime agency against trans-border digital crimes (Yar, 2013). In America the Megan?s law database register was released online as a parent?s protection tool regarding the locations of convicted sex offenders (Bryne, 2010).

  2. What in your view, are the main problems involved in attempting to produce policies ...

    Murdock (2002) posits that ??internet access has become a basic entitlement of citizenship in the digital age? (Murdock, 2002 p386); however there are multiple dimensions of access and each requires its own legal prescription. The ?Big Four? new media issues: access to infrastructure, access to content, intellectual property rights and

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work