Web Security The Internet Places Term Paper

Length: 10 pages Sources: 8 Subject: Education - Computers Type: Term Paper Paper: #58925443 Related Topics: Security Breach, Cybersecurity, Cyber Security, Computer Viruses
Excerpt from Term Paper :

Less satisfied knowledge dealing processes like keeping copies of old as well as unused spreadsheets which have several Social Security numbers instead of transmitting such data to long period and safe storage- persistently involve data at vulnerable stage. (Schuster 140-141)

Security concerns are associated with primarily to the system security, information security and also to Encryption. Taking into consideration the system security, it is applicable that what is pertinent to make sure that a system is quite secured, and decrease the scope that perpetrators could break into a website server and change pages. System security is a real responsibility particularly if one regulates one's owned Website server. (Creating Good Websites: Security)

There are two primary concerns in system security. One is in the application of passwords that ought to be selected and applied securely. But however protected a system could be, it is ordinarily exposed to the world if the password applied to reach it is diluted. Most of the systems adopt passwords for confining its accessibility. It is probable to attain a password in many manners like "guessing, social engineering, brute-force search, retrieving saved passwords, retrieving the shared passwords, sending Trojans as well as interceptions." (Creating Good Websites: Security) So far as guessing is concerned if one selects a specific easy password like the maiden name of mother, name of the pet, preferred sports team then it is convenient in case of hackers to know the password. Taking into consideration the brute-force searching, there are the programs that can attempt several passwords, to illustrate by using each word available in a dictionary. (Creating Good Websites: Security)

Another technique of social engineering often enables to deceive individuals into showing passwords, to illustrate by telephoning and making it believe to be the Internet service provider or an executive of an organization. Another concern is of retrieving stored passwords. Often people save passwords within their computer files, inside their diaries and so on. In such case the password could be easily attained by someone having physical accessibility. There also prevail the techniques of retrieving shared passwords. While the same password is applied for various systems, anyone who attains the password for a single system has it already for others as well. Then there prevails methods of installation of Trojans. There are software programs of 'trojan horse' that automatically are installed even without the knowledge of user, just reviewing the keystrokes. These are also sometimes linked with computer viruses. (Creating Good Websites: Security) the hacker transmits a 'special offer' or something similar by email in order to deceive recipients into browsing a site involving a malicious downloader. The file to be executed would try to creep in the additional Trojans, a system that my be frequented several times to assist and disable all of the security mechanisms available, prior to its attempt in putting in a spyware, which would have by then an improved scope of success. (USA is the worst culprit of it security breaches)

Microsoft Windows persists in to be the primary object for perpetrators, with website criminals growingly downloading Trojan horses instead of in comparison to mailing worms in massive amounts to debase the website system. In the year 2006, there had been a decline in the application of conventional spyware, and substituted by several downloaders of Trojan. Data reveals that in January of the year 2006, spyware amounted for 50.43% of all of the affected email, while 40.32% were the emails connecting to websites involving Trojan downloaders. At the end of December 2006 the figures have been just vice versa. The Trojan downloader now accounts for 51.24% and the spyware-infected e-mails declined to 41.87%. This inclination appears to go on into the year 2007 and much later. (USA is the worst culprit of it security breaches) at last there is the issue of interception. If passwords are being transmitted along an unencrypted link it might be possible to intercept the password as it is under transit. (Creating Good Websites: Security)

The real software is another system security concern that forms the system. This software might have security holes as well as bugs which allow accessibility without a password. A crucial matter is that web servers are complex programs and regularly involve bugs that might under definite situations, permit hackers reach to a website system even if are not able to attain a password. Another issue is that security issues are sometimes involved in Web servers. Often such difficulties are comparatively of less importance, only permitting an assaulter to disable a website server till one can glue the issue. Regularly, even though, security concerns would permit hackers remarkable or complete...

...

(Creating Good Websites: Security)

It is pertinent to note that a website server, and other key software like the operating system, be maintained up-to-date. This is also applicable to other important machines. To illustrate, if one discovers a virus on a home machine, that one apply to log onto the server, then one's password could be understood by hackers. Hence it is pertinent to maintain one's e-mail software on an up-to-date basis. One is susceptible to the trick of thinking that a specific server is secure since it reveals so or since it is devised by a huge company. However it is practically not the fact. To illustrate, the Internet Information Server of Microsoft is regularly hacked. Still another concern is that certain software's have several irrelevant attributes active that implies that if a hole is discovered having those characteristics, the website system would face threats even if the characteristics were not applied. Still another issue pertains to the 'Firewall' software. The 'Firewall' software dissuades reach to one's website server except through particular 'ports'. Irrespective of the fact that firewall software could be assisting in decreasing security threats, it is not a complete remedy since one is still susceptible to assaults that could prevail through the website server or in relation to other ports which one practically have to permit. (Creating Good Websites: Security)

In respect of Information security, it implies that certain websites might save sensitive knowledge like the individual advantages and probably even credit card details of users. (Creating Good Websites: Security) During the period from February 2005 to July 2006, the individual particulars consisting of over 89 million details of U.S. citizens had become vulnerable. (Schuster 141) One need to evaluate the knowledge saved and operate that knowledge should be maintained secure. If one keeps personal data regarding other individuals, then one ought to generate the significance of that trend. To illustrate, an individual's name is normally not specifically important knowledge however if to illustrate one entails a confidential sources like knowledge regarding homosexuality, government information, it could be hazardous, if the knowledge is shown. (Creating Good Websites: Security)

The navy officials of the U.S. found that in June of 2006 individual particulars on about 28,000 sailors as well as family members were diluted when it came out in a website, igniting additional issues regarding the security pertaining to sensitive knowledge being that of federal staffs. As many as 5 data files of spreadsheets, incorporating names, birth dates and Social Security numbers of the navy sailors as well as their relatives were found available on a website. The prospective security threat was one of the many losses of significant personal data indicated in Washington in the year 2006. 5 other organizations and the D.C. administration had indicated same difficulties ever since the inception of May, 2006. (White A11)

The biggest security violation came out when the laptop as well as outside hard drive of the Veterans Affairs, U.S. Department were taken away from an Aspen Hill home. This was a theft which executives revealed had incorporated individual knowledge of about 26.5 million retirees as well as active-duty staff. The U.S. Agriculture Department also indicated in the year 2006 that data regarding 26,000 staff had been diluted by a hacker. (White A11) There are also illustrations of websites which have mislaid several credit cards; these cards are then applied for fraudulent activities. In a popular example, the website 'CD Universe' contained several details of stolen credit cards; these particulars were uploaded on to the net. Further certain websites contain data on their own behalf, not for the public, but which is nonetheless security-important. To illustrate, an organizational website would reveal financial data regarding the organization that must not be visible external to the organization. (Creating Good Websites: Security)

Encryption that makes it problematic for other persons to intrude into the data can be a crucial assistance to security. But we connections that are encrypted by means of a padlock icon present within the browser toolbar do not make certain that knowledge is held safely. Primarily, an encrypted message which is public-key and which is not safe, when the private key which…

Sources Used in Documents:

References

Cavusoglu, Huseyin; Mishra, Birendra; Raghunathan, Srinivasan. The Effect of Website security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Website security Developers. International Journal of Electronic Commerce, vol. 9, no.1, Fall 2004. pp: 70-104.

Creating Good Websites: Security. http://www.leafdigital.com/class/topics/security / de Vivo, Marco; de Vivo, Gabrieal; Isern, Germinal. Website security attacks at the basic level. SACM SIGOPS Operating Systems Review, vol. 32, no. 2, April 1998. pp: 4-15.

Farmer, Melanie Austria; Hu, Jim. Microsoft not alone in suffering security breaches.

October 27, 2000, http://news.com.com/Microsoft+not+alone+in+suffering+security+breaches/2100-1001_3-247734.html


Cite this Document:

"Web Security The Internet Places" (2007, May 07) Retrieved June 22, 2021, from
https://www.paperdue.com/essay/web-security-the-internet-places-37879

"Web Security The Internet Places" 07 May 2007. Web.22 June. 2021. <
https://www.paperdue.com/essay/web-security-the-internet-places-37879>

"Web Security The Internet Places", 07 May 2007, Accessed.22 June. 2021,
https://www.paperdue.com/essay/web-security-the-internet-places-37879

Related Documents
Security on the Web
Words: 3164 Length: 8 Pages Topic: Education - Computers Paper #: 40603435

Internet: Security on the Web Security on the Web -- What are the Key Issues for Major Banks? The age of digital technology -- email, Web-driven high-speed communication and information, online commerce, and more -- has been in place now for several years, and has been touted as a "revolutionary" technological breakthrough, and for good reason: This technology presents enormous new business opportunities. For example, by moving the key element of marketing

Web 2.0 With a Focus
Words: 6782 Length: 25 Pages Topic: Education - Computers Paper #: 3008169

0 is "…a broad name used for a number of different experiments that are being done in the research community" (Reddy & Goodman, 2002, p. 12). The emphasis here is in 'experiment' as Web 2.0 is a platform for the testing of new applications and innovation, as well as being an area for research and development in education and science. The differences in the way that Web 2.0 functions can be

Internet Security Measures an Assessment
Words: 3999 Length: 10 Pages Topic: Education - Computers Paper #: 79482608

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well

Internet Privacy for High School Students
Words: 12595 Length: 40 Pages Topic: Education - Computers Paper #: 31900441

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Internet Way: A Unifying Theory and Methodology
Words: 4205 Length: 15 Pages Topic: Business Paper #: 81889341

Internet Way: a Unifying Theory and Methodology for Corporate Systems Development The face of business has changed drastically since the advent of the Internet. Traditional brick and mortar businesses are finding themselves with new marketing avenues. The Internet has led to the invention of a new comer to the business world as well, the e-business. These businesses exist only on the Internet. They do not have a traditional brick and mortar

Security Management in the Computer
Words: 1396 Length: 4 Pages Topic: Business Paper #: 7547669

Most cybercrimes are committed against the United States and countries such as Great Britain and Australia and some other European countries. Some smaller countries or countries that haven't quite caught up with the computer age don't have laws on the books to charge someone caught hacking into computers in their country. The problem with the internet, is that someone can sit in a small country that just barely has