Internet Security

By Karen Carter


Over last three decades, the internet has become a very risky means of communication in all sectors of daily life. It starts from very familiar virus attacks and now its approach to hacking, and spam attack are alarming and increasing day by day. The Drug and Crime Prevention Committee Report (2004) submitted to the Parliament of Victoria, Australia stated that 79% breach to their e-commerce system would most likely occur via the Internet or other external accesses.

Often times hackers can be as young as a teenager who is just trying to be popular in front of his friends and causing harm to your computer system. Because of the threat of hackers, people should be very cautious when giving out any personal information online.

In 1983, a movie called "War Games" portrayed a teenager who could hack anything in the world. He was able to do this hacking through his school computer network. This movie sparked an evolution of hackers. With time, the teenagers gained experience and formed a gang like group of hackers. They started to share their exploits with friends in the group, in this way a hacking mechanism spread out all over the world and destroy the Internet security.

There are some issues that can be the cause of a breach in internet security. Loopholes in the internet system are informed, though the major interest of internet is contact of main servers so it could be possible to get rid of the problems of distant connections. Currently, the protocols of security are not mature. Though mostly all global companies have introduced a particular solution for internet security, nothing is full proof.

Thus the Internet security can be defined as and designed for management of a procedure of security techniques such as encryption, authentication, physical security, line protection, and firewalls to prevent the Internet system, software, hardware, and other network communication from outside invasion. Different institution uses different solutions for their own problems which are raised from the security threats to retain their performance and survivability. If we want to have secure system we should take into consideration all of those above mentioned factors.




About the Author:



No Response to "Internet Security"

Post a Comment

Powered by Blogger