Internet Security

Internet Security Introduction/Summary The Internet has become a greater medium of communication, data exchange, and entertainment over the past 5 years. With this widespread growth of Internet access, there come growing pains. These growing pains come in the form of people who are up to no good and want to ruin everybody elses experience on the net. High-speed connections also make it a very easy way for hackers to attack your pc in your daily life. In this report, I will discuss the types of Internet connections that are commonly used by consumers. I will also talk about the kinds of hackers that are out there.

Each hacker has his or her own reason for doing it and by knowing that, prevention can be made simpler. I will discuss the types of Internet security programs that are available to everyday users. There are also hardware devices that arent as common in the home, but I will discuss their importance also. Finally, I will tell you how easily these programs can be implemented. Outline for Internet Security I. Types of internet connections a.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Dial-Up connections b. Permanent all-the-time connections c. Wireless Connections II. Types of hacking/hackers a. Remote access hackers b.

Trojan horse hackers c. Out-for-fun, harmless hackers III. Types of internet security a. Hardware firewalls b. Turning off PCs when not in use c.

Software programs 1. Norton Internet Security 2. Norton Anti-Virus IV. How to implement security a. Methods of installing b.

Calling in professionals to help Internet Security The Internet was a very unknown term to people ten years ago. This new information superhighway was reserved only to those who had the income or the need for data exchange between corporate locations. In the mid 1990s, companies like America Online and Prodigy created a easy connection to the Internet. These connections were called dial-up connection. They made use of a modem connected to your pc and by using your phone line, connected you to their services.

In this early age of dial-up connections, the availability and ease for people to obtain access to your information was enormous. Bank records, shopping habits, and credit card information became common ground for people who hacked into personal computers. As the Internet spread to locally owned ISPs, or Internet Service Providers, the backing of huge companies like AOL and Prodigy fell away to cheap local connections. With the widespread growth of mom and pop ISPs comes an increased security risk. People became responsible for their own Internet security.

Companies like Microsoft and Netscape, who were the original creators of the Internet browser, had to take matters into their own hands. The creation of high-encryption Internet surfing had begun. As soon as the late 1990s rolled around, these two companies had come up with ways to prevent unauthorized use of personal data such as credit card and social security numbers. This new technology was called SSL, or secured socket layer, technology. This technology made it possible for a pc to transmit encrypted data from one point to another.

If it was intercepted mainstream, the information would be useless to those who grabbed it. When this new technology was made public, a great sense of security plagued the Internet public. Banks and many merchants rushed to put their presence out on the web. With this security came an increased interest to those who were not yet on the Net. This technology is still with us today, but has been overhauled over the past few years. Hackers have found away though each SSL technology, but with constant monitoring by both businesses and software developers, this security is here to stay.

To date, this innovation has made the dial-up connection one of the most popular ways to get on the Internet. The next type of connection is the all-the-time permanent connection. This new type of Internet connection was reserved just recently for the people who could afford it of those businesses that had a lot of stake in the Internet. College campuses have made this a must in all on-campus housing and classrooms. With this need for all-the-time connectivity, many risks and security loopholes are present.

Permanent connections come in many forms. In the corporate and educational environments, the internet is piped in usually with a frame connection, which can be up to 500 times faster that a modem. In my experience, most businesses and schools choose this type of connection due to its reliability and speed. In the home, new technologies have brought high-speed right to your desktop. A new technology in this area is called DSL, or digital subscriber line.

This connection runs along your phone line in a digital spectrum of bandwidth. Currently, speeds up to 100 times the modems we have now can be obtained. Also, the cable modem has become a new friend to the Internet. Customers can now receive cable TV along with high speed Internet all on the same line! Finally, a new exciting technology is coming along for Internet access. This technology is totally wireless. Usually done with a microwave frequency, customers can send and receive data without any wired connection to the Internet.

This will become more widespread as time goes on. As with the dial-up connection, a permanent connection has the same security loopholes for hackers but with a greater risk. This greater risk is caused by the connection being on all the time. With a dial-up connection, your identity to the network changes every time you dial up. With these permanent connections, your identity is usually kept the same along with your connection being live 24 hours a day. (PCWorld Online) Most people do not turn off their pcs, so the threat of being discovered and hacked into is present all the time. At work, I have seen time and time again people who have been careless with their permanent connections.

People have uploaded viruses and even went to the point of corrupting and destroying data on their pc. I will later discuss measures that can be taken to prevent this disaster from happening. In order to understand Internet security, you must try to understand the people that are out to try and get through to your computer. I will briefly describe these troublemakers to you. The first type of hacker is the out-for-fun hacker.

These people are usually harmless to your computers data, but they have a history of doing things that can be annoying, expensive, and time-consuming to fix. These people are those who send you email messages that include Trojan-horse programs. These programs are real tiny modules that set out to do a specific task without you knowing about it. A common one that I see all the time is the Happy 99 virus. This virus is a mini program that prevents you from getting email. I have had customers that come in to the store complaining up and down that we did something to their computer.

When they realize it was a virus causing it all, they step back and realize that the viruses out there are for real because most of those out there do not take it seriously. Brent Blood, an employee at Velocity. Net, told me that he regularly gets customers who get many different kinds of viruses. The most common one he sees is a virus that sends emails to all the people in your address book. They could be forwarded from a personal email you received or something that you didnt want anyone to see. These hackers get a laugh when embarrassing things happen like this to people. (Blood) The most harmful hacker today is the remote access hacker. These hackers look for openings in corporate and personal computers and make a home in these loopholes.

When a person is connected to the Internet, they are given an identity that those who have experience can find. With the permanent connections, they are even easier to track down. Programs have been created to mass search for people who have files being shared and important data that is sitting out waiting to be hacked. (Secure-Me.Net) These people can record your keystrokes and get credit card numbers and passwords. Once they have these, their terror can begin. Companies and even individuals have been taken to the bank with electronic theft. Money can disappear from accounts and huge charges can be rung up on credit cards.

These hackers are hard to trace, but when they are found, most of the time they are young people. The most harmful are usually in their early 20s. These measures of protection on the Internet consist of three basic concepts. The first concept is one that I personally recommend to my customers. This is a very simple, but important, thing to do.

This would be simply turning off the pc when not in use if you have a permanent connection. Also, if you are using a dial-up, disconnect from the Internet when you walk away from your pc. These two important steps provide fewer opportunities for hackers to get into your pc when you are away. By not giving a nosy hacker the extra time to find the computer, you are giving yourself a leg up on internet security. The other measures of protection take some form of investment.

These methods use either actual hardware or software that you can buy. The most popular method for home security is a software solution. My recommendation is Norton Internet Security by Symantec. This program is new to the company. Norton has been well known for their great virus protection and now they are leading the way with Internet security.

This program plugs all the security holes in your computer and even notifies you when someone tries to get into your computer and its data. These programs are fit to be installed by the average user. The instructions are clear-cut and many problems can be fixed with online help and technical support. A more expensive solution to security is hardware based. Many corporations who have a fast connection to the Internet usually use a device called a firewall.

This device blocks all incoming traffic from the net to the computers in a companies network. By stopping intruders at the point of entry, all possibilities of outside threats are no more. The key to the success of firewalls is a proper installation. Many people improperly install these hardware products and the problems soon crop up when intruders find it easy to get into the critical data of an individual or a whole company. With proper professional installation, these devices will permanently keep out intruders.

In conclusion, the Internet is a new and exciting tool to use in everyday life. Like many other things, there are a few people out there who try to spoil it for everyone else. By taking the measures that I have suggested, you are not only protecting yourself. You are protecting your investment in PC hardware, software, and personal information. With a little bit of knowledge and the tools to do the job, you can help to prevent a hacker from getting into your world on the Internet. Bibliography Internet Connection Safety.

PCWorld Online. April 3, 2000. . Why Should I Worry?. Secure-Me.Net Online. September 1999. Computers and Internet Essays.

Internet Security

He doesn’t wear a stocking mask over his face, and he doesn’t break a window to get into your house. He doesn’t hold a gun to your head, nor does he ransack your personal possessions. Just the same he’s a thief. Although this thief is one you’ll not only never see,but you may not even realize right away that he’s robbed you. The thief is a computer hacker and he “enters” your home via your computer, accessing personal information — such as credit card numbers which he could then use without your knowledge at least until you get that next credit card statement. RichardBernes, supervisor of the FBI’s Hi-Tech
squad in San Jose, California, calls the Internet “the unlocked window in cyberspace through which thieves crawl” (Erickson 1). There seems to be an unlimited potential for theft of credit card numbers, bank statements and other financial and personal information transmitted over the Internet.

It’s hard to imagine that anyone in today’s technologically oriented world could function without computers. Personal computers are linked to business computers and financial networks, and all are linked together via the Internet or other networks. More than a hundred million electronic messages travel through cyberspace every day, and every piece of information stored in a computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday’s bank robbers have become today’s computer hackers. They can walk away from a computer crime with millions of virtual dollars (in the form of information they can use or sell for an enormous profit). Walking away is precisely what they do. The National Computer Crimes Squad estimates that 85-97 % of the time, theft of information from computers is not even detected (Icove-Seger-VonStorch 1). Home computer users are vulnerable, not only for credit card information and login IDs, but also their files, disks, and other computer equipment and data, which are subject to attack. Even if this information is not confidential, having to reconstruct what has been destroyed by a hacker can take days (Icove-Seger-VonStorch 1). William Cheswick, a network-security specialist at AT;T Bell Labs, says the home computers that use the Internet are singularly vulnerable to attack. “The Internet is like a vault with a screen door on the back,” says Cheswick. “I don’t need jackhammers and atom bombs to get in when I can walk in through the door” (Quittner 44). The use of the Internet has become one of the most popular ways to communicate. It’s easy, fun, and you don’t have to leave your home to do it. For example, the advantage of not having to take the time to drive to the bank is so great that they never consider the fact that the information they store or transmit might not be safe. Many computer security professionals continue to speak out on how the lack of Internet security will result in a significant increase in computer fraud, and easier access to information previously considered private and confidential (Regan 26).

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Gregory Regan, writing for Credit World, says that only certain types of tasks and features can be performed securely. Electronic banking is not one of them. “I would not recommend performing commercial business transactions,” he advises “or sending confidential information across networks attached to the Internet” (26). In the business world, computer security can be just as easily compromised. More than a third of major U.S. corporations reported doing business over the Internet up from 26 percent a year ago but a quarter of them say they’ve suffered attempted break-ins and losses, either in stolen data or cash (Denning 08A). Dr. Gregory E. Shannon, president of InfoStructure Services and Technologies Inc., says the need to improve computer security is essential. There are newly released computer tools intended to help keep the security of your PC information, but which can just as easily be accessed by computer hackers, as this information will be released as freeware (available, and free, to anyone) on the Internet (Cambridge 1). These freely distributed tools could make it far easier for hackers to break into systems. Presently, if a hacker is trying to break into a system, he has to keep probing a network for weaknesses. Before long, hackers will be able to point one of these freeware tools at a network and let it automatically probe for security holes, without any interaction from themselves (Cambridge 1). Hackers, it seems, have no trouble staying ahead of the computer security experts. Online service providers, such as America Online, CompuServe and Prodigy, are effective in providing additional protection for computer information. First of all, you need to use a “secret password” a customer ID that is typed in when you log on to the network. Then you can only send information, and retrieve your own e-mail, through your own user access. Sometimes the service itself is even locked out of certain information. CompuServe, for example, with its 800 plus private bulletin boards, can’t even read what’s on them without gaining prior permission from the company paying for the service (Flanagan 34). Perhaps in an attempt to show how secure they are, these information services will give out very little information about security itself. They all take measures to protect private information, and give frequent warnings to new users about the danger in giving out a password, but there is also danger in
making the service easy to use for the general public anything that is made easy enough for the novice computer user would not present much of a challenge for a computer hacker. Still, there is a certain amount of protection in using a service provider doing so is roughly equivalent to locking what might be an open door (Flanagan 34).

The latest weak spot that has been discovered is a flaw in the World Wide Web. The Web is the fastest-growing zone within the Internet, the area where most home computer users travel, as it’s attractive and easy to use. According to an advisory issued on the Internet by a programmer in Germany, there is a “hole” in the software that runs most Web sites (Quittner 44). This entry point will provide an intruder with access to any and all information, allowing him to do anything the owners of the site can do. Network-security specialist Cheswick points out that most of the Web sites use software that puts them at risk. With more and more home computer uses setting up their own home pages and Web sites, this is just one more way a hacker can gain access to personal information (Quittner 44).

Credit bureaus are aware of how financial information can be used or changed by computer hackers, which has a serious impact on their customers. Loans can be made with false information (obtained by the hackers from an unsuspecting computer user’s data base); and information can be changed for purposes of deceit, harassment or even blackmail. These occur daily in the financial services industry, and the use of Internet has only complicated how an organization or private individual keeps information private, confidential and, most importantly, correct (Regan 26).

Still, there are some measures that can be taken to help protect your information. If you use a virus protection program before downloading any files
from the Internet, there is less of a chance a hacker can crack your system. Login passwords should be changed frequently (write it down so you don’t forget, but store it in a secure place), and they should never contain words or names that are easily guessed. It may be easier for you to remember your password if you use your son’s name, but it’s also easier for the hacker to detect it. Passwords should always be strictly private never tell anyone else what it is (Regan 26).

Evaluate products for their security features before you buy any tool to access the Internet or service providers. Remember, to change the default system password the one you are initially given to set up the network on your computer (Regan 26).

Finally, and most importantly, it’s best to realize that a computer system, regardless of the amount of precaution and protection you take, is never completely protected from outsiders. As protection software becomes more sophisticated, so do the hackers who want to break into your system. It’s a good idea not to leave the silver on the dining table when you don’t know for sure that a thief can’t crawl through your window.


Works Cited
Cambridge Publishing Inc. “PC Security: Internet Security Tool to Deter
Hackers.” Cambridge Work-Group, (1995): Jan, pp 1.


Denning, Dorothy E. “Privacy takes another hit from new computer rules” USA
Today, (1996): Dec 12, pp 08A.


Erickson, Jim. “Crime on the Internet A Growing Concern.” Seattle Post
Intelligencer, (1995): Nov 15,
http://technoculture.mira.net.au/hypermail/0032.html
Flanagan, Patrick. “Demystifying the information highway.” Management Review,
(1994): May 1, pp 34.


Icove, David; Seger, Karl; VonStorch, William. “Fighting Computer Crime.”
http://www.pilgrim.umass.edu/pub/security/crime1.html
Quittner, Joshua. “Technology Cracks in the Net.” Time, (1995): Feb 27, pp 44.


Regan, Gregory. “Securely accessing the Internet & the World Wide Web: Good or
evil?”,Credit World, v. 85,(1996): Oct 1, pp 26.

x

Hi!
I'm Lydia!

Would you like to get a custom essay? How about receiving a customized one?

Check it out