Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Internet Security - Online Essay

Internet Security


The Internet is the community of the future, but if security measures are not put in place and enforced, then it will become more of a slum and less of a community. The primary question is, therefore, who has the obligation to put these security measures into place? Is it the individual users of the computers and the Internet? Is it the responsibility of the companies that develop the different computer applications to place certain security measures in place? Or is it the responsibility of the governments of the world to unite and create rules and regulations that secure the Internet and guard the citizens of the world from the malicious activities of the hackers? In my opinion, the ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

the Internet. Sometimes they do seemingly harmless acts, such as just going into a computer system and observing, but at other times, they steal, destroy or alter data. On some occasions, these cyber-felons perform even more malicious acts, such as infecting systems with "viruses," computer programs that "infect" the systems by latching onto other programs and eventually destroying them. Another favorite activity of the hacker is to gain access to the computer system and then manually either delete files or cause the computer to do "strange" things, such as placing messages on the screen that either make no sense or have an unusual meaning. Before we look at who has the responsibility to protect the end user, we must first look at what the truth is behind all the "security breaches." There is almost regular notice in the media of a "backdoor" or "bug" in a program: an error in the coding of the program that allows the knowledgeable hacker to access the computer system of someone ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

PowerPoint has been installed on the individual computer system. That important item of information failed to make it into the more mainstream reports, such as the television news, leaving the uninformed worried about a "glitch" that had no affect on them. This caused thousands of people to hurry onto the Internet to find a patch to the "glitch," thereby slowing down the connections to the Internet. More recently, on June 12, 1997, the Associated Press reported on a bug in Netscape's Navigator web browser. According to the article, the glitch "lets Web site operators read anything on a hard drive of a personal computer logged onto the site." PC Magazine and CNNfn ran their own tests for ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Internet Security. (2008, July 16). Retrieved October 9, 2024, from http://www.essayworld.com/essays/Internet-Security/86862
"Internet Security." Essayworld.com. Essayworld.com, 16 Jul. 2008. Web. 9 Oct. 2024. <http://www.essayworld.com/essays/Internet-Security/86862>
"Internet Security." Essayworld.com. July 16, 2008. Accessed October 9, 2024. http://www.essayworld.com/essays/Internet-Security/86862.
"Internet Security." Essayworld.com. July 16, 2008. Accessed October 9, 2024. http://www.essayworld.com/essays/Internet-Security/86862.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 7/16/2008 12:23:28 PM
Category: Science & Nature
Type: Premium Paper
Words: 4156
Pages: 16

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Internet Security
» Internet Security 2
» Internet And Internet Security
» Internet Sequrity
» Online Banking Security
» Internet Firewalls
» Internet 2
» Data Security
» The Arrival Of The Internet
» Internet Censorship Laws
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved