Got a tricky question? Receive an answer from students like you! Try us!

Internet security - Essay Example

Only on StudentShare
Masters
Essay
Technology
Pages 8 (2008 words)

Summary

Internet security has become one of the most discussed issues in this era of information technology.The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business…

Extract of sample
Internet security

Internet security has become one of the most discussed issues in this era of information technology. The Internet has become a tool of business and more people are warming up to e-commerce. It is approximated that about 30 million people all over the world use Internet to transact business.The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be embraced even from unlikely quarters with government adopting concepts such e-governance.The growth in the use of Internet has however presented enormous challenges. Like all other systems in the society, Internet is required to operate within the precincts of law. There are very few laws that govern Internet use and especially the conduct of e-commerce. Different countries have laws and policies on information and also the industry has its governing rules and regulations that are seen as measures to protect users and ensure that Internet is a mutual medium of doing business. Internet presents many challenges to security in that the Internet has become an avenue or tool of war. From infringement of privacy, to cyber crime and defrauding, Internet is causing economies losses in terms of risks and challenges.However of all challenges facing the Internet sector nothing threatens the half a century old communication technology than cyber crimes. Other security threats such as virus threats, software threats and hacking are rampant, have become very rampant and cost business billions of dollars. Viruses are one of the earliest forms of security intrusions. ...
Download paper
Not exactly what you need?

Related Essays

Network Security
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets…
10 pages (2510 words)
Wireless Security in Businesses
Businesses' concern in taking wireless technology a stride ahead of chat is an international issue. Wireless security is at least as good quality as Internet security. Impending technologies and values will create wireless security better than wireline security. That's for the reason that security is being addressed in the early days of wireless communications. (Bill, 2004. 3) Wired security, though, fundamentally resulted from a hodgepodge effort to block holes after they were uncovered. …
6 pages (1506 words)
Internet Security Article
All these threats are linked to global internet security. I aim to research on the topic of global internet security.…
1 pages (251 words)
Global Internet Security
All these threats are linked to global internet security.…
14 pages (3514 words)
Internet Banking Master Essay
It will provide information regarding theinvestigation approach, method of data collection and analytical approach to be used in the study.…
7 pages (1757 words)