Internet security

Masters
Essay
Technology
Pages 8 (2008 words)
Download 0
Internet security has become one of the most discussed issues in this era of information technology.The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business…

Introduction

Internet security has become one of the most discussed issues in this era of information technology. The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business.The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be embraced even from unlikely quarters with government adopting concepts such e-governance.The growth in the use of Internet has however presented enormous challenges. Like all other systems in the society, Internet is required to operate within the precincts of law. There are very few laws that govern Internet use and especially the conduct of e-commerce. Different countries have laws and policies on information and also the industry has its governing rules and regulations that are seen as measures to protect users and ensure that Internet is a mutual medium of doing business. Internet presents many challenges to security in that the Internet has become an avenue or tool of war. From infringement of privacy, to cyber crime and defrauding, Internet is causing economies losses in terms of risks and challenges.However of all challenges facing the Internet sector nothing threatens the half a century old communication technology than cyber crimes. Other security threats such as virus threats, software threats and hacking are rampant, have become very rampant and cost business billions of dollars. Viruses are one of the earliest forms of security intrusions. ...
Download paper
Not exactly what you need?

Related papers

Network Security
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets…
Wireless Security in Businesses
Businesses' concern in taking wireless technology a stride ahead of chat is an international issue. Wireless security is at least as good quality as Internet security. Impending technologies and values will create wireless security better than wireline security. That's for the reason that security is being addressed in the early days of wireless communications. (Bill, 2004. 3) Wired security,…
Domain Name System Security Extensions
It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence.…
Internet Security Article
All these threats are linked to global internet security. I aim to research on the topic of global internet security.…
Global Internet Security
All these threats are linked to global internet security.…
Internet security
Internet security has become one of the most discussed issues in this era of information technology. The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business.The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be…
Internet Banking Master Essay
It will provide information regarding theinvestigation approach, method of data collection and analytical approach to be used in the study.…