Internet Sequrity


The Internet has revolutionized the way people live today. Activities ranging from access to information to entertainment; financial services; product purchase and even socializing all seem to take place online. Due to its wide coverage and pervasive information collection, millions of people are relying on the Internet for almost all kind of activities. And with frequent usage, they have also come to trust the Internet to provide a gateway for personal, home and office convenience. The basic simple structure of the Internet based on a host of backbones and host servers, however makes it vulnerable to many risks.

The hosts vary from supercomputers to personal computers ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

IPs do not perform robust mechanisms for authentication for packets of data that come onto the Internet. Without the authentication mechanism any data packet may claim it originates from certain address but there is no sure way to check the claim of the data packet. The most important fact is that the higher layer on the ISO/OSI Reference Model lack host authentication such as through cryptographic applications. For this reason it is easy for users to enter into any host and alter/change the content of other users' systems. Since there is no check for such criminal activities, Internet crime and security breaches continue to rise along with the evolution of the Internet.

Yet the Internet continue to grow at a tremendous speed, spreading far and wide pervading all levels of human activities from personal browsing to high definition business activity. Issues of security becomes significantly noticeable when a price is attached with Internet security breach. To name a few ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.

Already a member? Login

is because as soon as new technologies are introduced, software and programs for compromising them are devised and used to hack them.

IP Spoofing and Session Hijacking

One of the most basic and common security breaches is when a host claims to have an IP address of another host. This kind of attack is called spoofing. Considering the different router access control lists of different systems are connected to the Internet, the only way for receiving computers to recognize its data packet is through the IP address. An attacker may devise and use techniques to spoof IP address and send packets to a host that require certain actions which may be harmful. In addition some applications ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


Internet Sequrity. (2011, May 3). Retrieved December 13, 2018, from
"Internet Sequrity.", 3 May. 2011. Web. 13 Dec. 2018. <>
"Internet Sequrity." May 3, 2011. Accessed December 13, 2018.
"Internet Sequrity." May 3, 2011. Accessed December 13, 2018.
Join today and get instant access to this and 50,000+ other essays

Added: 5/3/2011 01:03:56 AM
Submitted By: sosophe
Category: Computers
Type: Premium Paper
Words: 5124
Pages: 19

Save | Report


Save and find your favorite essays easier

Journalism On The Internet
The Growth Of The Internet
The Internet
The Future Of The Internet
Internet Access
Internet History Report
Computers And Internet In Our L...
Censor The Internet?
Censorship Of The Internet And ...
Internet Tax
Copyright | Cancel | Contact Us

Copyright © 2018 Essayworld. All rights reserved