The internet has been very beneficial to business and home users. Home users of the internet have been given a new way to shop for goods. No, longer does grocery shopping or mall shopping have to take place in a brick and mortar building. Home users can now shop online in the comfort of their homes. Home users are also now able to communicate with other home users around the world thanks to the internet and its many online communication and social network applications. Home users have also been given another avenue for entertainment via the internet. Movies, games, and music can now be streamed to home users’ televisions, phones, and other electronic devices. Likewise, business users have also greatly benefited from the internet. The internet has now made the world smaller for business. Instead of selling goods to just local customers, businesses can now sell their goods worldwide. The internet also allows business workers the option of working from anywhere on earth outside of the office as long as they have an internet connection. Although the internet has made doing life and business much easier, it has brought the serious challenge of information technology security. Home and business users need to keep their personal information and business data secure. The internet has brought criminal activities that seek to exploit weaknesses in information technology security. The internet has introduced new threats to information technology security. First, email has become an easy avenue for cyber-attacks. Email is used in phishing schemes. “The individuals behind phishing emails are typically online criminals. They send out millions of these messages in the hope that a few recipients will act on them and provide their personal and financial information. Anyone with an email address is at risk of being phished. “ (Cisco, 2012) Email is also used to a propagate virus or malware infections. This cyber-attack happens when email is sent out with scripts or attachments that can hold malicious code. Once a user opens the attachment or allows the code to run on their computer, it is infected and can be possibly controlled remotely from the internet. Email can also be spoofed. Spoofing is when the attacker sends out email using another person’s identity. “A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information).” (Shinder, 2012) Next, the internet has also introduced attacks that can come from malicious web sites. One such attack is called web spoofing. “Web spoofing allows an attacker to create a “shadow copy” of the entire World Wide Web. Accesses to the shadow Web are funneled through the attacker’s machine, allowing the attacker to monitor all of the victim’s activities including any passwords or account numbers the victim enters.” (Felten, 1997) The World Wide Web can also be used as another carrier for malware to be loaded on to computers. This is called malware injection. “Malware injection is the act of inserting - or injecting - malicious code into a web page so that so that when Internet users browse the page their computer2 is infected with malware.” (Armorize Technologies Inc, 2009) Finally, the internet has also introduced intrusion attacks. Attackers will scan the IP addresses of anyone connected to the internet. The scans will look for any port that answers to a request. “A port scan helps the attacker find which ports are available (i.e., what service might be listing to a port). Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can
Class Assignment 8 – Internet Security Q1: What’s to worry about? When it comes to Internet Security, there's a lot to worry about. There are security risks that affect Web servers, the local area networks that host Web sites, and even innocent users of Web browsers. The risks are most severe from the Webmaster's perspective. The moment you install a Web server at your site, you've opened a window into your local network that the entire Internet can peer through. Most visitors are…
MATCHING A. A collection of compatibility fixes B. The application compatibility mechanism of last resort in Windows 7 C. Prevents Internet Explorer from logging a browser history D. Minimizes access to protected operating system resources E. A protocol that Internet Explorer uses to establish encrypted connections to servers F. A rules-based access control mechanism for applications G. A compatibility fix H. The process of discovering passwords and other confidential information…
Assignment 4: Internet Technology, Marketing, and Security BUS 508 Name August 24, 2012 Dr. Professor Assignment 4: Internet Technology, Marketing, and Security Marketing plays a large, pertinent key in the success of a product, and/or business. Excellent marketing creates brand awareness and a call to action for the target market. Even Not-for-profit organizations such as the Red Cross and the Boys & Girls Clubs of America use marketing to create awareness (Boone & Kurtz, 2012). Marketing…
Internet Technology, Marketing, and Security Duwan Dickerson Strayer University Contemporary Business BUS 508 Penny Wilkins, Ph.D. December 1, 2013 Evaluate the reasons Social Media Marketing has become exceedingly popular among businesses of all sizes. Social media first began as a way for people to communicate with one another about a various topics. Millions of people around the world use the Internet every day. The web has changed the way in which we…
Systems Analysis There are many types of operating systems that take advantage of the Internet. However, only three main operating systems that are widely used and these operating systems are Microsoft Windows, Linux, and Macintosh. To access the Internet these operating systems requires certain software which will allow the user to browse the Internet. The software which allows the computer to gain access to the Internet is known as browsers, and they have certain features that make them different and…
the airplane the know that they would not be able to communicate with the outside world. But all of that might be coming to an end with the introduction of wireless internet in many airplanes. Most airlines are now introducing, or are already offering Wi-Fi in their airplanes, but with all of the things to consider like the security treats, costs and disruptions for other passengers; we have yet to see how successful Wi-Fi in the sky is going to be. Wi-Fi being offered in airplanes will definitely…
WANG FONG ALS-162 12/5/14 With the development of the technology, some criminal individuals and groups begin to make use of the internet as a way to do online criminal activities. Since the information is available online, the criminals can use the internet in many kind of ways such as websites, chat rooms and discussion groups to steal the useful and valuable information that they need. From my personal experience, Chinese authorities block sites including Twitter and Facebook by the Firewall. When…
Network Security Product Review BullGuard Internet Security 2013 Despite the bulldog featuring firmly in its advertising, BullGuard is an outstanding Internet Security company that initially packages a bundle of deals with new PCs and has been a reliable Internet Security (IS) software for some years now. As we come up on the New Year the time has come to issue the newest version IS software 2013. This new version that also features BullGuard…
Response Paper on Network Security: VoIP Security on Data Network a guide Internet is now a way of life. Technology is pushing the boundaries of internet and redefining way of life. No matter, you are at work, in a restaurant, outdoors or relaxing at home – you are physically exposed to ever increasing unfamiliar networks and their users. Network security is extremely critical as our devices are connected with or without our knowledge. Its importance will only increase with rise of social networking…
Computer security and Network Security is the means by which business and governments are protecting against computer intrusions and attack to prevent loss of data, information and provided services. Everything is now on computers, peoples whole lives are documented on computers. Big business and the government rely on technologies that use computers, whether it is used for storage, a medium between the customers and themselves or actual work. With all this information and data being stored, transferred…