Web Security the Internet Places Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Less satisfied knowledge dealing processes like keeping copies of old as well as unused spreadsheets which have several Social Security numbers instead of transmitting such data to long period and safe storage- persistently involve data at vulnerable stage. (Schuster 140-141)

Security concerns are associated with primarily to the system security, information security and also to Encryption. Taking into consideration the system security, it is applicable that what is pertinent to make sure that a system is quite secured, and decrease the scope that perpetrators could break into a website server and change pages. System security is a real responsibility particularly if one regulates one's owned Website server. (Creating Good Websites: Security)

There are two primary concerns in system security. One is in the application of passwords that ought to be selected and applied securely. But however protected a system could be, it is ordinarily exposed to the world if the password applied to reach it is diluted. Most of the systems adopt passwords for confining its accessibility. It is probable to attain a password in many manners like "guessing, social engineering, brute-force search, retrieving saved passwords, retrieving the shared passwords, sending Trojans as well as interceptions." (Creating Good Websites: Security) So far as guessing is concerned if one selects a specific easy password like the maiden name of mother, name of the pet, preferred sports team then it is convenient in case of hackers to know the password. Taking into consideration the brute-force searching, there are the programs that can attempt several passwords, to illustrate by using each word available in a dictionary. (Creating Good Websites: Security)

Another technique of social engineering often enables to deceive individuals into showing passwords, to illustrate by telephoning and making it believe to be the Internet service provider or an executive of an organization. Another concern is of retrieving stored passwords. Often people save passwords within their computer files, inside their diaries and so on. In such case the password could be easily attained by someone having physical accessibility. There also prevail the techniques of retrieving shared passwords. While the same password is applied for various systems, anyone who attains the password for a single system has it already for others as well. Then there prevails methods of installation of Trojans. There are software programs of 'trojan horse' that automatically are installed even without the knowledge of user, just reviewing the keystrokes. These are also sometimes linked with computer viruses. (Creating Good Websites: Security) the hacker transmits a 'special offer' or something similar by email in order to deceive recipients into browsing a site involving a malicious downloader. The file to be executed would try to creep in the additional Trojans, a system that my be frequented several times to assist and disable all of the security mechanisms available, prior to its attempt in putting in a spyware, which would have by then an improved scope of success. (USA is the worst culprit of it security breaches)

Microsoft Windows persists in to be the primary object for perpetrators, with website criminals growingly downloading Trojan horses instead of in comparison to mailing worms in massive amounts to debase the website system. In the year 2006, there had been a decline in the application of conventional spyware, and substituted by several downloaders of Trojan. Data reveals that in January of the year 2006, spyware amounted for 50.43% of all of the affected email, while 40.32% were the emails connecting to websites involving Trojan downloaders. At the end of December 2006 the figures have been just vice versa. The Trojan downloader now accounts for 51.24% and the spyware-infected e-mails declined to 41.87%. This inclination appears to go on into the year 2007 and much later. (USA is the worst culprit of it security breaches) at last there is the issue of interception. If passwords are being transmitted along an unencrypted link it might be possible to intercept the password as it is under transit. (Creating Good Websites: Security)

The real software is another system security concern that forms the system. This software might have security holes as well as bugs which allow accessibility without a password. A crucial matter is that web servers are complex programs and regularly involve bugs that might under definite situations, permit hackers reach to a website system even if are not able to attain a password. Another issue is that security issues are sometimes involved in Web servers. Often such difficulties are comparatively of less importance, only permitting an assaulter to disable a website server till one can glue the issue. Regularly, even though, security concerns would permit hackers remarkable or complete accessibility to the system and its data, server manufacturers release patches to their software when an error is detected. (Creating Good Websites: Security)

It is pertinent to note that a website server, and other key software like the operating system, be maintained up-to-date. This is also applicable to other important machines. To illustrate, if one discovers a virus on a home machine, that one apply to log onto the server, then one's password could be understood by hackers. Hence it is pertinent to maintain one's e-mail software on an up-to-date basis. One is susceptible to the trick of thinking that a specific server is secure since it reveals so or since it is devised by a huge company. However it is practically not the fact. To illustrate, the Internet Information Server of Microsoft is regularly hacked. Still another concern is that certain software's have several irrelevant attributes active that implies that if a hole is discovered having those characteristics, the website system would face threats even if the characteristics were not applied. Still another issue pertains to the 'Firewall' software. The 'Firewall' software dissuades reach to one's website server except through particular 'ports'. Irrespective of the fact that firewall software could be assisting in decreasing security threats, it is not a complete remedy since one is still susceptible to assaults that could prevail through the website server or in relation to other ports which one practically have to permit. (Creating Good Websites: Security)

In respect of Information security, it implies that certain websites might save sensitive knowledge like the individual advantages and probably even credit card details of users. (Creating Good Websites: Security) During the period from February 2005 to July 2006, the individual particulars consisting of over 89 million details of U.S. citizens had become vulnerable. (Schuster 141) One need to evaluate the knowledge saved and operate that knowledge should be maintained secure. If one keeps personal data regarding other individuals, then one ought to generate the significance of that trend. To illustrate, an individual's name is normally not specifically important knowledge however if to illustrate one entails a confidential sources like knowledge regarding homosexuality, government information, it could be hazardous, if the knowledge is shown. (Creating Good Websites: Security)

The navy officials of the U.S. found that in June of 2006 individual particulars on about 28,000 sailors as well as family members were diluted when it came out in a website, igniting additional issues regarding the security pertaining to sensitive knowledge being that of federal staffs. As many as 5 data files of spreadsheets, incorporating names, birth dates and Social Security numbers of the navy sailors as well as their relatives were found available on a website. The prospective security threat was one of the many losses of significant personal data indicated in Washington in the year 2006. 5 other organizations and the D.C. administration had indicated same difficulties ever since the inception of May, 2006. (White A11)

The biggest security violation came out when the laptop as well as outside hard drive of the Veterans Affairs, U.S. Department were taken away from an Aspen Hill home. This was a theft which executives revealed had incorporated individual knowledge of about 26.5 million retirees as well as active-duty staff. The U.S. Agriculture Department also indicated in the year 2006 that data regarding 26,000 staff had been diluted by a hacker. (White A11) There are also illustrations of websites which have mislaid several credit cards; these cards are then applied for fraudulent activities. In a popular example, the website 'CD Universe' contained several details of stolen credit cards; these particulars were uploaded on to the net. Further certain websites contain data on their own behalf, not for the public, but which is nonetheless security-important. To illustrate, an organizational website would reveal financial data regarding the organization that must not be visible external to the organization. (Creating Good Websites: Security)

Encryption that makes it problematic for other persons to intrude into the data can be a crucial assistance to security. But we connections that are encrypted by means of a padlock icon present within the browser toolbar do not make certain that knowledge is held safely. Primarily, an encrypted message which is public-key and which is not safe, when the private key which…[continue]

Some Sources Used in Document:

"Creating-good-websites-:-Security" 

Cite This Term Paper:

"Web Security The Internet Places" (2007, May 07) Retrieved December 6, 2016, from http://www.paperdue.com/essay/web-security-the-internet-places-37879

"Web Security The Internet Places" 07 May 2007. Web.6 December. 2016. <http://www.paperdue.com/essay/web-security-the-internet-places-37879>

"Web Security The Internet Places", 07 May 2007, Accessed.6 December. 2016, http://www.paperdue.com/essay/web-security-the-internet-places-37879

Other Documents Pertaining To This Topic

  • Balancing National Security and Internet Freedom

    Balancing National Security and Internet Freedom Balancing Freedom The Four Factions of the National Debate This paper analyses the dueling philosophies of the pro-National Security vs. pro-Internet Freedom debate that has been a hot topic since the uprisings of the Arab Spring in January of 2011. On one side of the debate are the cyber security agencies, and the media property organizations that represent Hollywood; on the other are piracy advocates worldwide, along

  • Internet Changes Lives How the

    Whereas adult obesity rates have always been present, they have never been so high. What is more worrisome is that youth is becoming increasingly obese. The American Heart & Stroke Association conducted a study, for instance, in which it found the following data to be true: "Among children ages 2 -- 19, about 1 in 3 are overweight and obese (BMI-for-age at or above the 85th percentile of the 2000

  • Web 2 0 With a Focus

    0 is "…a broad name used for a number of different experiments that are being done in the research community" (Reddy & Goodman, 2002, p. 12). The emphasis here is in 'experiment' as Web 2.0 is a platform for the testing of new applications and innovation, as well as being an area for research and development in education and science. The differences in the way that Web 2.0 functions can be

  • Security on the Web

    Internet: Security on the Web Security on the Web -- What are the Key Issues for Major Banks? The age of digital technology -- email, Web-driven high-speed communication and information, online commerce, and more -- has been in place now for several years, and has been touted as a "revolutionary" technological breakthrough, and for good reason: This technology presents enormous new business opportunities. For example, by moving the key element of marketing

  • Internet Trust Certificates in Every

    Trust alleviates the apprehensions of insecurity that crop up when the retailer is not known, or the way the company will deliver the goods or services purchased. Building trust in e-commerce necessitates a clear indication of rigorous standards of security, data safeguard, transparency of data use, etc. (The effect of IT-based security on feedback mechanisms and trust building in online auction settings) Morgan and Hunt during 1994 indicate that trust

  • Security Issues Creating a Site

    Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The

  • Internet Censorship in America Censorship

    Internet censorship could also result in job losses since a court order may compel online search engines in America to block results or domain names. This could contribute to the instant death of some companies, particularly those with limited resources to fight potential legal cases. In addition, concerns have also been raised regarding the possibility of Internet censorship to weaken the protection provided by the Digital Millennium Copyright Act that


Read Full Term Paper
Copyright 2016 . All Rights Reserved