Saturday, May 2, 2020
Internet Security Persuasive Essay Example For Students
Internet Security Persuasive Essay Introduction/SummaryThe Internet has become a greater medium of communication, data exchange, and entertainment over the past 5 years. With this widespread growth of Internet access, there come growing pains. These growing pains come in the form of people who are up to no good and want to ruin everybody elses experience on the net. High-speed connections also make it a very easy way for ?hackers? to attack your pc in your daily life. In this report, I will discuss the types of Internet connections that are commonly used by consumers. I will also talk about the kinds of hackers that are out there. Each hacker has his or her own reason for doing it and by knowing that, prevention can be made simpler. I will discuss the types of Internet security programs that are available to everyday users. There are also hardware devices that arent as common in the home, but I will discuss their importance also. Finally, I will tell you how easily these programs can be implemented. Outline for Intern et SecurityI. Types of internet connections a. Dial-Up connectionsb. Permanent all-the-time connectionsc. Wireless ConnectionsII. Types of hacking/hackersa. Remote access hackersb. Trojan horse hackersc. Out-for-fun, ?harmless? hackersIII. Types of internet securitya. Hardware ?firewalls?b. Turning off PCs when not in usec. Software programs1. Norton Internet Security2. Norton Anti-VirusIV. How to implement securitya. Methods of installingb. Calling in professionals to helpInternet SecurityThe Internet was a very unknown term to people ten years ago. This new ?information superhighway? was reserved only to those who had the income or the need for data exchange between corporate locations. In the mid 1990s, companies like America Online and Prodigy created a easy connection to the Internet. These connections were called dial-up connection. They made use of a modem connected to your pc and by using your phone line, connected you to their services. In this early age of dial-up connecti ons, the availability and ease for people to obtain access to your information was enormous. Bank records, shopping habits, and credit card information became common ground for people who ?hacked? into personal computers. As the Internet spread to locally owned ISPs, or Internet Service Providers, the backing of huge companies like AOL and Prodigy fell away to cheap local connections. With the widespread growth of mom and pop ISPs comes an increased security risk. People became responsible for their own Internet security. Companies like Microsoft and Netscape, who were the original creators of the Internet ?browser?, had to take matters into their own hands. The creation of high-encryption Internet surfing had begun. As soon as the late 1990s rolled around, these two companies had come up with ways to prevent unauthorized use of personal data such as credit card and social security numbers. This new technology was called SSL, or secured socket layer, technology. This technology made it possible for a pc to transmit encrypted data from one point to another. If it was intercepted mainstream, the information would be useless to those who grabbed it. When this new technology was made public, a great sense of security plagued the Internet public. Banks and many merchants rushed to put their presence out on the web. With this security came an increased interest to those who were not yet on the Net. This technology is still with us today, but has been overhauled over the past few years. Hackers have found away though each SSL technology, but with constant monitoring by both businesses and software developers, this security is here to stay. To d ate, this innovation has made the dial-up connection one of the most popular ways to get on the Internet. Implications Of Remix Culture On Post Modernism Art EssayThese measures of protection on the Internet consist of three basic concepts. The first concept is one that I personally recommend to my customers. This is a very simple, but important, thing to do. This would be simply turning off the pc when not in use if you have a permanent connection. Also, if you are using a dial-up, disconnect from the Internet when you walk away from your pc. These two important steps provide fewer opportunities for hackers to get into your pc when you are away. By not giving a nosy hacker the extra time to find the computer, you are giving yourself a leg up on internet security. The other measures of protection take some form of investment. These methods use either actual hardware or software that you can buy. The most popular method for home security is a software solution. My recommendation is Norton Internet Security by Symantec. This program is new to the company. Norton has been well known for their great virus protection and now they are leading the way with Internet security. This program plugs all the security holes in your computer and even notifies you when someone tries to get into your computer and its data. These programs are fit to be installed by the average user. The instructions are clear-cut and many problems can be fixed with online help and technical support. A more expensive solution to security is hardware based. Many corporations who have a fast connection to the Internet usually use a device called a firewall. This device blocks all incoming traffic from the net to the computers in a companies network. By stopping intruders at the point of entry, all possibilities of outside threats are no more. The key to the success of firewalls is a proper installation. Many people improperly install these hardware products and the problems soon crop up when intruders find it easy to get into the critical data of an individual or a whole company. With proper professional installation, these devices will permanently keep out intruders. In conclusion, the Internet is a new and exciting tool to use in everyday life. Like many other things, there are a few people out there who try to spoil it for everyone else. By taking the measures that I have suggested, you are not only protecting yourself. You are protecting your investment in PC hardware, software, and personal information. With a little bit of knowledge and the tools to do the job, you can help to prevent a hacker from getting into your world on the Internet. Bibliography?Internet Connection Safety?. PCWorld Online. April 3, 2000. . ?Why Should I Worry. Secure-Me.Net Online. September 1999. Computers and Internet Essays
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.