- All Best Essays, Term Papers and Book Report

Security of the Internet

Essay by   •  July 2, 2012  •  Essay  •  605 Words (3 Pages)  •  1,322 Views

Essay Preview: Security of the Internet

Report this essay
Page 1 of 3

Internet security is a branch of electronic computer security specifically related to the World-Wide Web abbreviated as (www). Its fundamental focus is to establish rules and measure, to prevent potential attacks launched over the Internet. The Internet represents an insecure channel for exchanging information leading to a high probability of encroachment. "When information is read or copied by someone not authorized to do so, the effect is known as loss of confidentiality". (Bellettini, 2011). This is particularly true for banks and loan companies; debt collectors; business that extend credit to their customers or issue credit cards. When information is modified in unexpected ways, the consequence is known as loss of integrity. This means that changes are made to information, whether by mistake or tampering. Integrity is particular important for safety of financial data used for activities such as electronic cash in hand transfers, air traffic control and financial accounting. "Information can be erased or become inaccessible, resulting in loss of availabilities". (Security, 1999). "Availability is often the most important concern in service oriented business that depends on information (e g, airline, train schedules) and other online service providers". (Security, 1999). Educational activity relies on a network connection or accessibility of the network itself is important to anyone who owns a business. When a user cannot acquire access to the network or specific services provided on the network, they experience a denial of service. Organizations employ authentication and authorization mandates on information so that it's only available to those who need it and who can be relied with it, Authentication is proving that a network user is whom he or she claims to be."This means something about the user that proves the individuals personal identity (such as a fingerprint) or evidence may involve something the user knows (such as a password), something the user can illustrate (such as a smart card)". (Cert,2011.&174) Authorization is the act of ascertaining whether a particular user (or computer system) has the right to carry out a certain activity, such as reading or running a program. Authorization goes hand in hand with authentication. Before carrying out the activity they are authorized to perform user must be authenticated. "Security has a strong influence when the means of authentication cannot later be refuted, the user cannot later deny that he or she performed the activity". (Sandra4211, 2010). A serious attack involves key components of the Internet infrastructure rather than specific systems on the Net; however, internet infrastructure attacks rare. Network name servers, network approach providers, and large-scale archive sits are examples of networked systems which many users depend on. "Widespread automated attacks can also jeopardize the infrastructure". (IT security



Download as:   txt (4 Kb)   pdf (64.9 Kb)   docx (10 Kb)  
Continue for 2 more pages »
Only available on