• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet Security and Privacy ThreatsIntroductionIn this day and age technology plays a part in our everyday lives

Extracts from this document...

Introduction

Running Head: Internet Security and Privacy Threats Internet Security and Privacy Threats University of Phoenix Tiffany York E-Bus 400 Mark Merkow 06/15/2005 Internet Security and Privacy Threats Introduction In this day and age technology plays a part in our everyday lives. It's a wonder how we functioned without the internet, or the debit card, or cell phones. These are everyday conviences that have truly helped to make our lives better. But with all of this "convience" there comes a price to pay. With us being so connected we also become more vulnerable. In this paper I will discusses some of the newest internet security concerns for both consumers and buinesses as well as discuss some privacy concerns as it pertains to online banking. Phishing and Pharming Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants. ...read more.

Middle

Computer systems that are already compromised continue to be used to carry out new directions and overtake other unprotected computers. Some Internet security experts said the best way to defend against these threats is to adopt a layered security approach. Layering protection protects five key access levels within an IT environment. These include the perimeter, the network hub, the host file, the network application and the stored data. Within an enterprise environment, protection should include intrusion detection and prevention (IPS) software, as well as vulnerability management software. Another essential security component, according to experts, is an endpoint compliance policy used in conjunction with a hardware firewall, antivirus software and a Virtual Private Network. Privacy Concerns For Consumers Internet banking has grown steadily since it became an option for household banking customers 10 years ago. The 10 biggest U.S. banks alone had more than 34 million customers turning to the Internet at the beginning of this year, a more than 50 percent increase from last year. ...read more.

Conclusion

What could go wrong? If your Internet bank account is compromised, here are some ways you could be defrauded: Unauthorized withdrawals: A thief could log on and initiate a wire transfer or use an online bill-paying service to issue checks. Identity theft: Someone could use details gleaned from your online bank account to set up new credit accounts in your name. Details commonly viewable on online accounts include name, address and phone number. Check images might include a driver's license number or Social Security number. Online accounts also might contain payment details revealing who your employer is and what credit cards you hold. Check fraud: Combining offline and online theft, a criminal can get check images from your online account and use them to create new checks in your name. Conclusion In conclusion, the best advice that I can arm anyone with to combat those relentless theives and hackers is to be aware and be smart! Make it a point to stay up on new ways to protect yourselves. Your identity is worth protecting. ?? ?? ?? ?? Internet 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. "Does Technology have an essence? Define what this might be and critically assess how ...

    Rutsky seems to appreciate this where he explores the "techno-cultural unconsciousness": "technology is neither an external instrument nor simply a threatening, uncontrollable other, but a promising generative process that, however monstrous or alien it may seem, is already ongoing within us."

  2. Campaigner for Digital Privacy Rights.

    Often, personal information can include name, address, email address, social security numbers, URLs for web sites you've visited, as well as other information that may have been built up about you in a profile. Consumers are, therefore, strongly encouraged to read privacy policies, be highly selective when offering their personal

  1. Impact of Internet on Plagiarism. This paper aims to explore the reasons behind ...

    There are several ways to develop critical thinking abilities though it is not possible to simply learn them. Every assignment can be broken down into logical chunks which encourage thinking and analysing on the students' part. Students can also participate in class room discussions to the maximum possible extent to understand various viewpoints and relate them to one's own views.

  2. Nations today, most commonly such as China, Iran, and Burma has become infamous for ...

    only allow citizens access to websites that lean in favor to the bias of the government. This includes the restriction of website's of the government's party in power opposition in Thailand, and the restiction of access to minority religious websites in Pakistan.2 However, China remains the world's most infamous user

  1. Free essay

    Music Distribution in the Digital Age

    a contract, and without the need for excessive wealth if they wish to manage their own music recording, promotion and distribution. Consumers have demanded that music be a free market due to the infinite amount of illegal downloads. Such economics demanded that a shift be made, thus music distribution funded

  2. Nagoya, 2005 Aichi Expo

    As shown on the table below: Single-crystal type: high conversion efficiency (13 - 20%), expensive (generating capacity: 30 kW) Polysilicon type: resembles single-crystal type in both conversion efficiency and cost (generating capacity: 200 kW) Amorphous type: low conversion efficiency (8 - 13%), inexpensive, high flexibility in terms of shape etc.

  1. ICT Report 3D

    to research for their coursework as the information in libraries is very limited so they can make use of internet cafes to surf the internet for the necessary data.

  2. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    This undoubtedly showcases society at both macro and micro scales through the internet has become increasingly active in tackling social issues we ignored in the past. The emergence of Twitter movements as BlackLivesMatter and Feminist Culture aided by the Freedom of Information Acts highlights the internet today taken on a prominent role in the fight for equality (Sheldon, 2011).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work