Communication Essay Paper on Internet Security

Internet Security

The internet has become a significant part of the current generation. It has been a baseline for today communication from instant emails and messaging to travelling, shopping, studying, and banking (Abraham L. Newman). The internet has touched every life aspect. With the increasing application of the internet, protecting valuable data is considered a necessity. A computer system which does not have necessary security controls can be infected by logic which may be malicious hence resulting in loss of the information. There numerous infected websites which can allow hackers to access computer systems illegally.

Network outages, hacking of crucial information, computer viruses and other associated cyber-attacks have enormous impacts on people’s daily lives. The causes of cyber threats can be unintended accidents, vulnerabilities, or negligence. However, they can also be intentional or planned, for instance, the access or hacking of the computer systems by the illegal operators (Salsabeel Shapsough). The primary goals of this kind of system attackers or hackers are to destroy, manipulate data, make illegal financial transactions, or to steal confidential information.  The system attackers can either be recreational hackers, terrorists, or crackers. These individual have different tools that they use and which can harm the computer. In most cases, they apply virus or malicious logic to get unauthorised access to computer systems.

System attackers can be terrorists, crackers or recreational hackers. The most common ways in which computers can be accessed and information stolen is through downloading dangerous programs, clicking on malicious websites or links or opening malicious email attachment (Salsabeel Shapsough). The chances of cyber-threats are highly increasing with an increase in the number of mobile and internet users, data networks, and digital applications. In fact, a simple mistake of bad social networking or data security can be extremely fatal. In instances that accounts are not secured properly, it becomes easier for unauthorized users or hackers to spread engineered attacks or viruses that are designed to destroy information or steal money.  Such kind of issues brings about the need for cyber security as a basic approach in providing prevention and protection of data.

Problem Illustration

Information technology security or cyber security refers to the protection of networks, information, data, and programs from unintended access, alteration or destruction. It can also be used to refer to activities and operations that are taken to reduce any vulnerabilities and threats, and formulating policies for data assurance, and other operations related to cyber securities (Caitriona Heinl). It comprises all processes and mechanisms that protect records, digital equipment, and information from unintended or illegal destruction, access, or manipulation.

In the current dynamic setting, internet security is crucial for organizations families and individuals that collect and keep a variety of information that is confident on the computers and transfers that information to other computer networks. Protecting children against malicious online activities have become an important aspect for the majority of the families. For individuals, the provision of protection to data that could have effects on personal finance and social life is highly relevant. Though there are very many benefits of the internet on learning opportunities, there are also very many risks that are associated. The kind of data shared on the social media such as Twitter, Instagram, Facebook, etc. can be misused leading to incidents that may be life threatening. Social networking sites are the most popular channels for the exchange and connection of people through the sharing of information (Abraham L. Newman). However, these sites have come up with diverse opportunities encouraging cyber misconduct which has comprised personal identities leading to leakage of information. It is, therefore, imperative for people to know the significance of protection against cyber threats, and understand the difference between real and virtual world. People must know how to guard their computers and private information from hackers and exercise proper online behaviour, by doing these they will be able to eliminate cyber threats hence encouraging an online environment that is safe.

Several business organisations, majorly medium and small -size undergo critical challenges in the protection of data. Limited technological and financial resources are the main reasons which are making it difficult to enhance their security systems and stay updated with technology. However, through cyber security awareness and appropriate planning, improvements that are beneficial to those business organisations will enable their information to be protected and avoid disclosure of trade secrets. The majority of small businesses are have started taking steps to protect against malicious access to their information. This study will discuss major internet security issues and how to provide solutions to secure computer systems and data.

INTERNET SECURITY ISSUES AND SOLUTIONS

Weak Network

Many managers dealing with system framework are interested in an “old school” approach mostly referred to as animal constraining (Abraham L. Newman, p. 1). Bearing in mind the end goal, which is to make the system security catchphrase defenselessness, there has been a development of a “CAPTCHA Technology.” A normal type of CAPTCHA technology needs the clients to key in numbers or letters from a picture that pops up on the computer screen. This image is essential in protecting the computer system from unwanted, robots. The managers of the security systems have been convinced with this kind of innovation to provide the safety of the internet system.

The solution for this kind of a problem is to have a new secret key that is sophisticated. To make a private and secure password, there is a need to mix numbers, letters, and symbols and ensure that unauthorised person does not access it (Caitriona Heinl, p. 1). In an organisation perspective, the heads of the security should make sure that their clients develop complex secret keys that cannot be duplicated easily and remind them that they should be in a position to change their passwords on a regular basis. To make these changes easier, the management can provide guidelines as to when it can be changed. Also, apart from changing, the users should also use passwords that they can easily remember.

Website Cookies

Regardless of the fact that treats do not transmit infections and that they are not able to bring about malware on the host computer, monitoring of them is very significant. These are because they are mostly used as techniques to access the cumulative records of surfing histories. The reason why decode treats is considered, as peculiar security system issue is that they are capable of opening the user’s framework to Cross Site Scripting (XSS) ineffectiveness. As such it is one of the major security concerns. Any individual can access to any login information treats on any system in situations of Open Cookies. The mitigation for this kind of security concern is to ensure that the greater part of the system treats has encoded close time and that they are also scrambled. The system managers or experts should make sure that clients re-login when they get touch indexes in the system.

Secure Web Hosting

First, it is important that to note that Shared Hosting is not a right approach especially for users who are keeping a legal business and have a website, which has access to the inner system. A standard website that facilitates administration is an avenue where one server hosts numerous sites. Each site is allocated its server or space that keeps it separated from various destinations. This is one of the most cautious options of facilitating since individuals can share the expenses of the server (Abraham & Newman, p. 1). For instance, shared hosting can be compared to sharing a house with a friend and each has a room, in situations that someone breaks in the house and the room of your housemate, there are high chances of also your room being robbed. The same idea is the actual picture of Hosting that is shared. In the same situation, if a hacker is inside the territories of shared server, it will take less effort for the hacker to enters in each website. Therefore, the best option and solution for this kind of a problem is to have a secure cloud hosting and a server hosting that is committed to protecting the data of its clients.

Plan Hashes

Any person who is conversant with the internet tools can decode unsalted Hash. Hashing is mostly used to recover files from the databases. Additionally, Plan Hashes are applied as one of the many encryption computations (Abraham & Newman, p. 1). Salt, which refers to another type of encryption, is added to Hashes with an ultimate goal of making Lookup Table Helped Directory Attack (LTHDA) also known as Brute Force, to a substantial problematic extent, given that the salt is sufficient. Most importantly, a cyber criminal may not have the potential to apply a pre-registered table to tamper with the system of the user, which comprises an essential multifaceted level in nature to the user’s security framework system. Therefore, irrespective of the reasons that the attacker may have access to the user’s database, it will be a big challenge for the hacker to recover and use that data or information. Hence, an ideal solution that can guarantee the safety of the data of the user on Hashes is the concealment of the encryption key (Salt).

Recommendations

Proxy for the security and internet safety purpose

Application of proxy is one of the widely recognised techniques for internet activities that are anonymous (Abraham &Newman, p. 1). By large extent, people are applying traditional intermediaries. Different intermediaries are used for various reasons. For instance, remailer is used for sending messages; web broker is used for scanning, etc. It is important to note that though remailer is not intermediary, it functions the same way as the intermediary. Also, some intermediaries such as SOCKS intermediary allow working with various internet protocols since they are widespread.

Internet protection

The advancement of the web is based on its security. In fact, the agreement that provides the basic underlining of the internet is not known intrinsically. Majorly, it is the PCs concerns of demanding to communicate with each other for the sake of sharing their content. For instance, the user’s Internet Protocol address (IP address) can be identified by any web server (Abraham & Newman, p. 1). The server can identify various qualities of the users from the website the user is using to connect to the internet, also known as the user referrer, the user’s working framework, and the project applied by the user to surf the web also referred to as client operators.

Proxy Approaches

The regular employment of intermediaries is done because of adjusting load, security, storage of information with the aim of reducing the capacity request of data transfer, and sifting.  The user can be protected from Webpages’ shocking components through the sifting of intermediaries. Some of those components include Javascript, treats Java Applets, ActiveX controls, and advertisement pennants (Caitriona Heinl, p. 19). Other intermediaries encrypt the user’s communication so that the user is not able to observe what is happening. Nonetheless, not all intermediaries are secure or unknown.

Web Proxies

Online intermediaries are facilitated by virtual products that are considered to be server side. Examples of these virtual products include intermediary scripts that are customized, Glype, GGIprox, and PHProxy. A network program connects these intermediaries. In normal instances, what happens is that the user IP address is shrouded so that one can enter the website address and open the website page in the highlighted structure. It is not mandatory to reconfigure the user’s computer, introduce a program, or download it. A web intermediary needs to direct the archive asked by the user and the components or articles related to archive. There is a possibility of suspicious activities taking place in the presence of an intermediary; this is so because not all the intermediaries have the same efficiency. Some of the internet administrators may make errors when executing numerous types of website page code. Nonetheless, these codes are simple to execute and use.

Open Proxies

Open proxies are commonly referred to as public intermediaries. They are SOCKS or HTTP intermediary server that are deliberately or accidentally left open and are readily available online (Salsabeel Shapsough, p. 23). They have the advantage of being compatible with most of the websites because when transporting data, they are not required to alter the pages of the websites. Apart from these advantages experienced by using open proxies, there are some disadvantages associated with these intermediaries. This is because the public intermediaries do not provide security and at such, the use of them may bring about more dangers.

CONCLUSION

Naturally, organizations have constantly pushed the legal structures to adapt quickly to the security scene that is rapidly changing. It is of great value that these structures are robust but versatile regarding their accommodation. Leaders qualified are very important in this mathematical statement. Also, it is of great essence that powers in the oversight and regulations are comprehended to assist in the advancement of security concerns, innovation, and apparatuses. It is also important to teach the general public the value of this mystery. Regardless of the fact that this mystery is occurring, it does not have sufficient support from the key players to make it simple to encourage more support and trust. The mystery is that more engagement, more deceivability, and more openness with other different parts is generally what will assist knowledge organizations in advancing into another security time.

Works Cited

Abraham L. Newman, & David Bach. Privacy and Regulation in a Digital Age. California, 2015. <https://www.weforum.org/agenda/2015/07/can-you-have-both-security-and-privacy-in-the-internet-age/>.

Caitriona Heinl, & Eugene EG Tan. “Cyber Security: Emerging Issues, Trends, Technologies, and Threats in 2015 and Beyond.” RSiS (2016): 17-117.

Salsabeel Shapsough, Fatma Qatan, Raafat Aburukba, Fadi Aloul, & A. R. Al Ali. “Smart Grid Cyber Security: Challenges and Solutions .” 2015. <http://www.global-economic-symposium.org/knowledgebase/the-global-polity/cybercrime-cybersecurity-and-the-future-of-the-internet/proposals/five-concerns-and-five-solutions-for-cybersecurity>.

APPENDIX

Internet security and privacy are one of the many things that can be learnt from this project. Currently, cyber security is a big problem, and hence, this project has tried to recommend possible solutions and several approaches pertaining these problems. PC security, also known as IT or cybersecurity safety is the protection of information systems from robbery or damage of the equipment, the product, and the information in those systems, and from confusion or interruption of the administration they offer.

Another important aspect that one can consider when dealing with this field is big data, and cloud computing or one can also study privacy and security concerns. Cloud computing is a discipline that empowers organisations to distribute figure assets such as utility – just like power – unlike building and continuously registering bases in-house. Distributed computing offers several advantages to the final consumer and organisations. The following are the three top benefits of distributed computing:

• Provision of self-administration: Distributed computing enables the end users to turn up and register assets for a workload depending on their interest.

• Elasticity: Organization has the capability to scale up depending with the registering needs growth as well as downsize as requests diminishing.

• Pay per use: Clients are only permitted to pay for workloads and assets they have utilized since computing assets are estimated at a granular level.

Therefore, it is important to note that emerging technology needs a high concern for privacy and security.