Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Internet Sequrity - Online Essay

Internet Sequrity

Introduction

The Internet has revolutionized the way people live today. Activities ranging from access to information to entertainment; financial services; product purchase and even socializing all seem to take place online. Due to its wide coverage and pervasive information collection, millions of people are relying on the Internet for almost all kind of activities. And with frequent usage, they have also come to trust the Internet to provide a gateway for personal, home and office convenience. The basic simple structure of the Internet based on a host of backbones and host servers, however makes it vulnerable to many risks.

The hosts vary from supercomputers to personal computers ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

IPs do not perform robust mechanisms for authentication for packets of data that come onto the Internet. Without the authentication mechanism any data packet may claim it originates from certain address but there is no sure way to check the claim of the data packet. The most important fact is that the higher layer on the ISO/OSI Reference Model lack host authentication such as through cryptographic applications. For this reason it is easy for users to enter into any host and alter/change the content of other users' systems. Since there is no check for such criminal activities, Internet crime and security breaches continue to rise along with the evolution of the Internet.

Yet the Internet continue to grow at a tremendous speed, spreading far and wide pervading all levels of human activities from personal browsing to high definition business activity. Issues of security becomes significantly noticeable when a price is attached with Internet security breach. To name a few ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

is because as soon as new technologies are introduced, software and programs for compromising them are devised and used to hack them.

IP Spoofing and Session Hijacking

One of the most basic and common security breaches is when a host claims to have an IP address of another host. This kind of attack is called spoofing. Considering the different router access control lists of different systems are connected to the Internet, the only way for receiving computers to recognize its data packet is through the IP address. An attacker may devise and use techniques to spoof IP address and send packets to a host that require certain actions which may be harmful. In addition some applications ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Internet Sequrity. (2011, May 3). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Internet-Sequrity/98790
"Internet Sequrity." Essayworld.com. Essayworld.com, 3 May. 2011. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Internet-Sequrity/98790>
"Internet Sequrity." Essayworld.com. May 3, 2011. Accessed December 23, 2024. http://www.essayworld.com/essays/Internet-Sequrity/98790.
"Internet Sequrity." Essayworld.com. May 3, 2011. Accessed December 23, 2024. http://www.essayworld.com/essays/Internet-Sequrity/98790.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 5/3/2011 01:03:56 AM
Submitted By: sosophe
Category: Computers
Type: Premium Paper
Words: 5124
Pages: 19

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» A Comparative Study of Browning...
» Stand By Me: Review
» The Study Of Psychology
» Global Warming 3 --
» Falstaff's Role In Henry IV, Pa...
» And Then There Were None
» Nelson Mandela
» The Dark Side Of A Wonder Drug-...
» The Odyssey: Theme Of Homecomin...
» Comparing Swimming Lessons, No ...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved