Sunday, May 5, 2019

The Risk of Using the Internet Essay Example | Topics and Well Written Essays - 1000 words

The Risk of Using the Internet - Essay ensampleFollowing this, the safety of ones self is also given great importance. With the internet, at that place be no much(prenominal) physiological needs that need to be fulfilled and it follows that the next concern would be security (Lester & Resnick, 2003). Often, stack question the safety of the internet in various aspects. Is the internet truly safeBefore tackling this issue, it is requisite to have a background on the internet. The internet is not simply about browsing through sites in the World Wide Web. It is a global network of com stickers and electronic devices which provides an avenue for these devices to exchange information. In fact, any such device connected to the outside world through a network whitethorn be considered part of the internet. There is no doubt that most companies and even individuals use the internet in one way or another. Unfortunately, the widespread use of the internet also makes it suit fitting as an attendant for crime. Computers and the internet may make ones life more convenient but they may also put ones privacy in danger.Most people are unaware that their computers may be under violate from simply surfing the internet. Computer users are inclined to think that they are anonymous and their identities are in all desex. However, this is not always the case. As a matter of fact, each computer is actually assigned with a unique address referred to as an internet protocol (IP) address. It is similar to a home address in the sense that it may be apply to locate a computer within the internet. In fact, a computer may be likened to a house which typically has a front and back door. part the occupants of the house almost always ensure the security of the front door, the other door may be neglected. Similarly, a cyberpunk only needs to locate an open backdoor to break into a system. Computer users exit not even notice that a hacker has established a connection to their system. A well-equipped hacker can do anything without the need to be in close proximity to his target (Branigan, 2005). Moreover, hackers can suck in information from a computer within a short span of time. Personal information including passwords to secure accounts may be acquired, effectively compromising the privacy of the user.Even with the presence of a firewall to protect the system, there are several more ways to infiltrate a computer. These include the use of viruses and the exploitation of bugs chip in in some web browsers. Any downloaded content involves the risk of getting ones computer infected (Branigan, 2005). Programs which are acquired through the internet may be viruses or may contain viruses which then attack a computer. At the very least, these viruses may simply be annoying. However, in more complex attacks, these viruses can be used to collect private information from a computer which can then be used in malicious ways. Anti-virus software provides both preventive and active protection against such risks. However, as Branigan stated, the virus scanning software is only as effective as its virus definitions. It is therefore important to update the said software frequently. Unfortunately, despite attempts at improving the performance of such software, virus makers are able to produce more resilient code.One of the most popular crimes over the internet is online fraud. Electronic trip out is a fast way to communicate with other people and is quickly

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.