Internet security flaws result in hundreds of millions of dollars of damage annually, including businesses, government agencies and individuals as victims. An increasingly sophisticated new breed of criminal mandates increasingly sophisticated Internet security measures. The following research discusses the general trends in Internet security and criminal activity. The introduction discusses the growing incidence of crimes committed via the Internet and computers, while underscoring the need for increased security measures. A variety of Internet security measures are then addressed including: access security, cryptography, encryption, firewalls, wireless systems, honey-pots and tracers, cookies and identity theft measures, and vulnerability assessment tools. As organizations become more aware of Internet security measures, many organizations are developing policies that protect them from individuals outside and inside the company. One of these is the establishment of computer use policies pertaining to employees. A conclusion addresses computer use policies and the most common elements of them.
The Internet represents a new market, a new market of currency, and a new way for businesses to conduct operations electronically. While new technologies often increase opportunities, they also spawn a new breed of criminal trying to undermine those opportunities. The ability to commit crime on the Internet extends across the eco
. . .ys every day due to the number of encryptions processed. Such issues as encryption pertain to many kinds of law, such as contract law, privacy law, and financial law. For example, the Electronic Signatures in Global and National Commerce Act 2000 (S.761) validates electronic signatures for interstate and international commerce, defines the circumstances under which an electronic record satisfies statutes and regulations, and other provisions. Various consumer protections are provided in the Act, such as consent being required before multiple transactions can be conducted with the signature and the provisions of a printed copy of any such transaction at the consumer’s request. Encryption Another common protection measure is the use of encryption. Encryption applications like Pretty Good Privacy (PGP) provide a level of security that access security measures cannot provide. There are two methods of encryption. One is known as symmetric key encryption and uses identical passwords to encrypt and decrypt data. The main flaw with this form of security is that it requires a secure channel to provide users with passwords. If there was a secure channel there would be no need to use encryption. Therefore, the second form was dev . . . Some common words found in the essay are:Pentagon Internet, Computer Policy, Commerce Committee, Abstract Internet, Firewalls Firewalls, Privacy PGP, STAT Scanner, Internet Intranets, Identity Theft, Introduction Internet, internet security, security measures, internet security measures, access security, vulnerability assessment tools, vulnerability assessment, assessment tools, increasingly sophisticated, identity theft, breed criminal, businesses government agencies, communications policy, intranet scanner, access security measures, outside inside company,
source;http://www.lotsofessays.com
Monday 11 May 2009
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment