Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Internet Security Threats, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
As of 2007 there were 1.1 billion internet users worldwide many of whom have little or no knowledge of the internet security threats as well as the actions they can take to protect themselves (James). There are so many benefits of the internet that users often underestimate the security threats they are exposed to. Internet security companies routinely compile the list of security threats with the greatest potential to keep the public and the corporations informed so that they can take steps to better protect themselves.
Small businesses have readily embraced internet because it provides them flexibility as well as means to efficiently utilize their limited asset base. But unfortunately, small businesses also have fewer financial and technical resources to protect themselves against internet security attacks. Hackers attacks business networks indiscriminately but they often find it easier to get past the weak defenses of smaller businesses. Complicating the matters is the fact that even novice hackers can carry out successful attacks through easily available attack toolkits many of whom are adding Java exploit capabilities. Java is a computer language that runs on almost all operating systems as well as internet browsers (Haley). Using attack toolkits, hackers steal banks accounts’ login and password details as well as customers’ credit card numbers.
Social networking has become a global phenomenon but changing internet users’ habits have also provided hackers with another attractive venue for attacks. Hackers particularly take advantage of two facts; one is users’ false sense of security on the social networking websites and the other is the popularity of shortened URLs. Shortened URLs may be convenient but they also make it difficult to distinguish between legitimate links and malicious websites. Symantec estimates that last year, sixty-five percent of the malicious URLs posted on social networks were shortened URLs(Haley). This is a great security threat given the fact that Facebook alone has more than 750 million active users and average user has 130 friends (Facebook). Malicious websites harm users’ security in various manners such as installing virus, worm, trojan, adware, and spyware. The end result includes theft of private information, user tracking, and operating system crash resulting in loss of valuable data.
Another huge security threat is resulting from the popularity of mobile gadgets such as smartphones and tablets, the latter of which is poised to steal a considerable market share from the PCs market segment. Many businesses allow employees to access corporate data on mobile devices but have not yet implemented the necessary security measures. Mobile apps have become very popular with users and hackers have taken notice of it. Hackers are creating applications specifically to exploit the security vulnerabilities of mobile devices which is evident by the fact that the number of reported vulnerabilities for mobile devices rose by 42 percent in 2010 (Haley). Mobile hacks allow hackers to not only access sensitive corporate data including intellectual properties, private corporate information, and customer data but also install malicious codes on IT networks. Thus, all businesses particularly small onesshould take steps to better protect themselves and implement policies that educate workers and encourage them to adopt safe internet habits.
References
Facebook. Statistics. 4 September 2011 <https://www.facebook.com/press/info.php?statistics>.
Haley, Kevin. 2011 Internet Security Threat Report Identifies Increased Risks for SMBs. 6 April 2011. 4 September 2011 <http://www.symantec.com/connect/2011_Internet_Security_Threat_Report_Identifies_Risks_For_SMBs>.
James, Daniel G. “Statistical Analysis of Internet Security Threats.” Research Report. 2007.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee