Internet Security 2


As we head into the next millennium many people are beginning to question the computer systems that so many of us depend on. This is not the first time that people have become scared at the end of a century, let alone a millennium. People have always had on thing or another to be worried about at these turning points in time. When people first heard of the Y2K problem they began to realize just how big of a problem security is on these systems. Not only do we depend on these systems for information; our entire lives are on computers. The nation began to acquire a sense of urgency to fix this problem because they thought about just how vulnerable we are; from bank records and accounts to ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

only to a certain extent. Many people lack the forethought to make their password something that is not easily guessable. Your name, birth date, or anything that could be guessed with a little bit of thought is a bad idea. The other way to protect a network is to use a firewall. This technology is often effective but can be bypassed, and is often picky about what to let through. In my opinion firewalls give a false sense of security and cannot be used as a sole means of protection. Given enough time most decent computer science majors or anyone really familiar with networks can bust through a firewall. This is why any thing important should be kept in separate folders with their own passwords or kept in an offline source.
Although I found many great cases of Internet crimes I have found the following quite interesting. There was a case in 1993 in which investigators in New York City found that three city Employees had found a flaw in city’s real estate tax computer ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

is in the statistics of the people that are doing the crimes, “Hackers”. In release 2.1 by Esther Dyson she says “nearly every two out of three people that "hack" into the government’s computers succeed and three out of four that do succeed are never caught”(327). This is a major security breach. The book claims that hackers can easily access extremely important information or data. This does not only happen on the government’s computers but businesses, corporations, non-profit organizations, and more. Only computers running certain software, which allows users on the Internet access to their information, are susceptible to hackers. A majority of ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Internet Security 2. (2007, July 15). Retrieved June 20, 2018, from http://www.essayworld.com/essays/Internet-Security-2/68028
"Internet Security 2." Essayworld.com. Essayworld.com, 15 Jul. 2007. Web. 20 Jun. 2018. <http://www.essayworld.com/essays/Internet-Security-2/68028>
"Internet Security 2." Essayworld.com. July 15, 2007. Accessed June 20, 2018. http://www.essayworld.com/essays/Internet-Security-2/68028.
"Internet Security 2." Essayworld.com. July 15, 2007. Accessed June 20, 2018. http://www.essayworld.com/essays/Internet-Security-2/68028.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 7/15/2007 05:23:29 AM
Category: Science & Nature
Type: Premium Paper
Words: 1595
Pages: 6

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Internet Security
Internet And Internet Security
Internet 2
Internet Security
Security, Commerce And The Int
Internet Tax
Data Security
Network Security And Firewalls
The Arrival Of The Internet
Internet Sequrity
Copyright | Cancel | Contact Us

Copyright © 2018 Essayworld. All rights reserved