Internet Security

By Karen Carter


Internet security is now becoming an issue throughout the world. Many people wonder if what they do on the internet is safe. People and businesses should have correct rules of internet security in place in order to block any malicious programs from infecting their systems.

Often we hear on the news that a popular website has been compromised and many people have had their personal data stolen. When a website is compromised, it leads to thousands of risks such as identity theft. Instead of hacking a particular site, data is collected through look alike sites, through spyware or through other means of collection, most of which happen on a single user basis. When personal information is given out to anyone online, many people become nervous because they are in doubt about what actually can happen.

In 1983, a movie called "War Games" portrayed a teenager who could hack anything in the world. He was able to do this hacking through his school computer network. This movie sparked an evolution of hackers. With time, the teenagers gained experience and formed a gang like group of hackers. They started to share their exploits with friends in the group, in this way a hacking mechanism spread out all over the world and destroy the Internet security.

There are some issues that can be the cause of a breach in internet security. Loopholes in the internet system are informed, though the major interest of internet is contact of main servers so it could be possible to get rid of the problems of distant connections. Currently, the protocols of security are not mature. Though mostly all global companies have introduced a particular solution for internet security, nothing is full proof.

Thus the Internet security can be defined as and designed for management of a procedure of security techniques such as encryption, authentication, physical security, line protection, and firewalls to prevent the Internet system, software, hardware, and other network communication from outside invasion. Different institution uses different solutions for their own problems which are raised from the security threats to retain their performance and survivability. If we want to have secure system we should take into consideration all of those above mentioned factors.




About the Author:



No comments:

Post a Comment