Question:
Describe about the Internet Technology and Internet Security ?
Chapter 1: Introduction
1.1 Outline of the thesis
As the internet technology is rising in a very fast way and with this speed of rising of internet the internet devices is also get affected through viruses, worms, Trojan, etc on a rapid way so the internet security is now a day’s become very important. Internet Security (Kirkby, 2001) is one of the parts of the very vast issue of computer security which is related to the internet. It in most of the cases contains the browser security which is applied to protect the computer systems and data while browsing from the viruses which attacks online and also involves the network security which provides the unauthorized access of data from network . (‘Internet Safety’, 2009) Through internet security we can protect the devices from the unauthorized access, hacking (Lee, 2014) and most importantly from viruses and for this we take some major steps as like as antivirus, firewalls, limited uses of JavaScript, etc. This report will be analyzing all about that internet security which includes how it causes the ill-effect and also what to take the major steps to reduce these attacks and to keep it safe for the users(Westra, 2002).
With this increase of the internet usage, various problems are arising regarding the security and the protection. In this report, it will be discussed about why and how of the problem and also what the necessity steps to take to control this kind of attacks on the daily basis.
1st Chapter: Introduction: In this part the introduction of the internet security and the problems regarding with this and the measure of the protection which should be taken are discussed in a brief structure so that it can give the brief overview of the whole study which will be done later on.
2nd Chapter: Literature Review: This chapter is discussed about the theories and the concepts which are used to understand the topic in a detailed manner and the critical issues are also described in an elaborate way. This also includes the advantages and the disadvantages of the topic which are discussed and also the requirement of the internet security and the necessity steps which are required to follow are also described.
3nd Chapter: Research Methodology: In this chapter, the collection of data, research approach which will be used, design, philosophy which helped in the analysis of the topic is discussed in a procedural way and also gives the brief description of these methods which will be used to carry the analysis of the study (Velasco, Herrero & Prieto, 2014).
4th Chapter: Results and Findings: This chapter deals with the results and the findings of the data which are collected and analyzed on the previous chapter and which will help to understand the topic in a better manner according the more practical users response.
5th Chapter: Discussion and Analysis: The collected data and the findings which we get from the previous chapter are discussed and analyzed through the various techniques and charts so that it will help in a better way to gain the sufficient quantitative knowledge regarding the topic (Gionis, 2013).
6th Chapter: Conclusion: Now day’s internet security becomes the most essential part and this chapter tells about the summary of those chapters which are already discussed earlier in which the topic is tried to be researched. In this part we also get to know the ultimate outcome which I get form the above discuss (Merkow & Breithaupt, 2000).
2.1 Introduction
About 10 years ago, the internet was only the topic about which it was only talked about. It was a vast source which gives the information but the accessing users were less in number. But in today’s life the internet becomes the vital part of our lives through which we can remain connect throughout whole world in a very easy way (‘Firewall for ‘always on’ connections’, 2000). Through internet we can also do most of the work just of as access our bank account, paying of bills and taxes and to send mail to others. But as we all know that everything which has well sides and also has the bad sides. As the good side is discussed above and in bad sides it allows the harmful threats to attack our computers. So the internet security is become a very important issues (‘Internet Safety’, 2009). This part will deals with the types of internet threats, security, protection etc through which we can secure the internet (Householder, Houle & Dougherty, 2002) .
Internet security (Merkow & Breithaupt, 2000)and internet safety (‘Internet Safety’, 2009) is mostly two related terms which discuss and tells about the same thing in a different manner in more detailed manner. Internet safety deals with the ideas how to increase the safety of the user’s personal data. Some common threats regarding internet safety includes spam, phishing, cyber stalking, malware (‘Internet Safety’, 2009) etc. As argued by Stephenson (2004), internet security is the big issues in these days of modern technologies. There are majority of people who passed most of time in internet in order to access illegal information from the computer user. Cyber crime is one of the most popular name and hacking methodology in internet security area. In order to make safe in internet technology are, implementation of anti-virus software, firewall activation in computer system, etc. On the other sides, internet security deals with both the network security and the browser security. So to avoid the attacks of the threats and the redundancy of data loss both the internet security and internet safety is needed to be maintained (Kirkby, 2001).
Virus attack – Viruses is actually a malware program which is coded in such a way that it can automatically install mainly through the internet and also increased by a number through the every access of the file. It replicates in such a way and in such a rapid manner that in short span of time it acquires most of the spaces of the hard disk which results to the crash of the hard disk and sometimes also results in the deletion of the important documents from the hard disk. Virus is actually a man-made program which is made by coding a computer program and then distributed it to the internet by attaching to the other files. Viruses attack can be of two types- parasitic and boot. In parasitic attack the virus replicates in number and acquire the hard disk space on the other hand in boot attack the virus directly affects the booting system of the computer. Some of the examples of the virus are concept virus, Melissa virus, etc (Stephenson, 2004). In order to protect virus attack in computer system, user has to install antivirus software with up to date version.
Worm attack – Worm is a self-sufficient malware program which also of viruses automatically without the host files and spread through the internet. It attacks the computer in such a way that it copies the computer important file without the notice of the user through the internet which results the failure in case of security. They mainly attack the bandwidth of the network more than the corruption of the file. It has the capability to penetrate the firewall and most of the internet security and then crash the windows Operating System fully which results to failure of the full system. Some of the examples of the strong computer worm which affects the systems are Jerusalem which is also known as black box, Michelangelo, storm worm etc (Stephenson, 2004).
Trojan attack – Trojan are also malicious in nature which claims to be useful in nature and acquires the user’s permission to access but actually the virus which deletes, copies, blocks, modify the data itself and also change the format of the data in its own manner as it gets the full control of the computer. Trojan cannot replicate by their own but behave in such a way that users itself give the permission to access and they cannot understand also what type destruction it already causes to the computer’s system. Some of the notable Trojan horses are Zero Access, Beast, and Zesus etc (Boyle, 2001) .
Spyware attack and Adware attack – Spyware is also one type viruses which allow the hackers to consume the user’s personal information such as password and other important information without the user’s knowledge. This type of viruses are linked with the download sites and when the user open this sites to download something this virus automatically installed to the user’s computer and acquire the information. Some of the examples of the computer spyware are try media, nuvens and live PC care, etc (Householder, Houle & Dougherty, 2002) . On other hand, adware is also the application program which runs through the advertisement package when some of the program is running (Householder, Houle & Dougherty, 2002). This type of viruses is also known as freeware. One of the perfect examples of the adware is Desk Ad.
Internet security in now days is one of the most important requirement of the computer user’s and have the security of the internet from the threats. The technology and the internet advancement are growing now days in such a rapid way that also the attacks of the threats are also increasing in a competitive manner of the advancement of the internet (Kirkby, 2001). So to develop the protection of the viruses of the computers, laptops, mobile phones from the malware, threats, viruses, Trojan horse etc we have to secure the internet first. To avoid the redundancy and the leakage of the data from the computer the internet security is essential. If there is no security there is the high chance of the corruption of the software, hard disk and also the misuse of the data through the internet by hacking (Basu, 2010). The safest method to provide the internet security is to install good powerful security software which immediately removes the virus from the computer and identify the damaged files and software so that it can immediately be scanned and remove from the computer and also tell if any intruders are trying to harm and changes to the computer (Kirkby, 2001).
As the internet attacks are increasing in a rapid manner so to neutralize the attack of the internet threat the advancement of the internet security are also increasing which are discussed below-
Usage of the Email security- Email security is known as electronic privacy which prevents the email form the unauthorized access and also the automatic download of the attachment of the email which sometimes may also be the viruses and also protect from the spam download, the email data leakage and also saves the bandwidth costs and also limit the usage of the JavaScript in the web browser. Email security (Sunner, 2005) also helps to avoid the junk folder and also provide the authenticity of the recipients and the senders and also scan the attachments prior to the downloading (Sunner, 2005) .
Encryption – Encryption is actually the encoding of the data and information in such a manner that only the users who are authorized to do that can decode or read the messages. This type is also one of the process through which we can prevent the user’s computer from the internet attack. The encrypted text is known as cipher text (Sree Vivek, 2012) . In encryption there are two types where one is asymmetric encryption which is also known as public-key encryption and another is symmetric encryption (‘Simple Steps to Data Encryption’, 2013) .
Firewalls – Firewall (‘Firewall for ‘always on’ connections’, 2000) is the other method to secure the internet from the attacks of the threats. It actually detects and prevents the unauthorized access from the network. It is also a computer software program which is actually acts as wall between the internet world and the computer. In it some of the basic rules are set which are follows to all the incoming and the outgoing data to and from the computer (‘Firewall protects home PCs’, 2000) .
Secured web browsing – The tendency of browsing of the internet user is the most common thing and through browsing many of the viruses’ attacks the user’s computer without the users acknowledge (Fourie & Bothma, 2007). So to prevent the computer from this attack we can enable the browser security from the settings of the browser and also deactivate the tracking of the IP addresses of the sites so that the virus and the worm attack are reduced through which we can do the safer internet surfing (‘Web security under threat’, 2011) .
In the above section the different types of the internet attacks and the different ways how to protect the computer from these attacks are introduced and explained and also how to secure the internet. In short, the necessity of the internet security is described and also tells about the better knowledge of the internet security and how to improve and up to date the internet security(Kirkby, 2001).
3.1 Introduction
Research methodology is the way by which we can draw the effective business decision from the collected information and data (Velasco, Herrero & Prieto, 2014) . In research methodology the surveys, interviews and many other techniques which will be helpful for doing the research are introduced. It also helps in better understanding and undertaking the methods which will be helpful for completing the project in a better way (anon, 2012) .
In one word research design is also known as the blue print of the study. Research design is of three types as- exploratory, descriptive and explanatory. In this study the researcher select the descriptive type of research designing. In descriptive research design, the whole phenomenon is being analyzed and the results are discussed on the basis statistical measure. The observation, survey and also many other types of analyze are included in this descriptive type of design (anon, 2012) .
Actually data are mainly of two types. First is primary data which is collected through surveys, observations, questionnaire and the direct contact with the respondent etc. this type of data are actually needed for the descriptive analysis of data and there are another types of data which is secondary data which is already some other reports where the collected data are also been analyzed and the source of this types of data are generally the reports, journals and magazines, etc(McGee, 2007).
To carry this research in a successful manner some of the 140 internet users are considered and their security problems are studied in a elaborate way. Among them 60 of the users responded which helps the researcher to carry out the study and to reach in an effective conclusion.
In this chapter we discussed whole above the research design, collection of data methods and the hypothesis through which we can elaborate the collected data and discuss with the help of the step by step approach of research methodology which will be useful to the researcher and also tell in short about the research methodology (anon, 2012).
4.1 Introduction
Through this chapter we deal with the collected data and also analyze the data which will help in the better understanding of the topic internet security. The collected data will be used and analyzed in an elaborate way to get the better understanding of the research work.
1. For how long do you use internet?
Options |
No of respondents |
Total respondents |
Response % |
1-2 years |
6 |
60 |
15% |
3-5 years |
20 |
60 |
50% |
6-10 years |
10 |
60 |
25% |
11-15 years |
14 |
60 |
35% |
More than 15 years |
10 |
60 |
25% |
Table 1: Users usage of internet
Figure 1: Users usage of internet
This is seen that 15% of the users use the internet for 1-2 years, 50% of the users’ uses for 3-5 years, 25% for 6-10 years, 35% for 11-15 years, and for more than 15 years only 25% of the users use it.
2. What are the devices you use for internet?
Options |
No of respondents |
Total respondents |
Response% |
Computers |
20 |
60 |
50% |
Laptops |
15 |
60 |
37.5% |
Tablets |
10 |
60 |
25% |
Phones |
15 |
60 |
37.5% |
Table 2: Devices where internet are used
Figure 2: Devices where internet are used
50% of the total users use the internet from the computers, 37.5% are uses from the laptops, 25% of total uses from the tablets and through phones 37.5% are using internet.
3. How much you are concerned about the internet security?
Options |
No of respondents |
Total respondents |
Response % |
Most likely |
20 |
60 |
50 |
Likely |
15 |
60 |
37.5 |
Neutral |
10 |
60 |
25 |
Less |
7 |
60 |
17.5 |
Very less |
8 |
60 |
20 |
Table 3: Concern about the internet security
Figure 3: Concern about internet security
From whole 50% and 37.5% of the users are most likely and likely concerned about the internet security, 25% of them are neutral and at the end 17.5% and 20% less and very much less about the internet.
1. It is noticed that more numbers of the users using the internet about 6-10 years and now days the usage of internet increased in rapid rate and also get very much popular because now everything is getting possible through the internet connection.
2. Most of the users are accessing the internet from their phones and laptops since these two devices are very much comfortable among the users and they can access the internet from anywhere as it is easy to accommodate in every situation.
3. As the hacking, virus attacks are increasing in rapid rate in today’s date, the internet users are also getting concerned about the security of the internet usage and they are also taking the important steps to avoid the internet attack and to keep safe.
Chapter 6: Conclusion
All through this research, it is become cleared that internet security is one of the rising concern for the internet users. It is needed to protect the data and information of the users so that the leakage and the corruption of the user’s personal information are avoided. So the rate of protection from the internet threats is also increasing to maintain the speed of the increasing number of the internet attack.
According to my study, the internet security is one of the most important issues of concern of today’s world. As now every things are becoming computerized through the internet so generally the usage of the internet is also increasing in a rapid pace. With this increase of internet usage the threats attacks are also increased and to safe the computer system from this type of threat attack the internet security is introduced. As I go through the different types of journals and magazines it shows how hackers use the different types of internet hacking through which they can access the user’s personal information and also corrupt the hard disk of the computers and also introduced the dangerous malicious viruses. This type of internet hacking and the breaking down of the security of the internet is done with the help of the viruses, Trojan horse, malware, adware etc through web browsing, email, CDs, DVDs or external hard disks. I also noticed that the viruses also attacks the computer in which it replicates in number and destroy the space of the computer’s memory, also tracks the IP address or the Email address of the users through which they can also leak the important mail of the user’s. Since, with the advancement of the internet technology and the internet usage, the issues of the security of the computer systems are also increased in a considerable rate.
After this whole study I have learned that the internet security is not be so easy and also cannot be reduced in a full manner. But then also we take some of the measure so that we can reduce the rate of the attack of the viruses by using firewalls, encryption of data, securing web browsing and secure emailing. Through the encryption and the decryption method of data, only users who are sending the data and to whom they are sending are only can accessed which decrease the redundancy, misuse or loss of the data. Through the firewall we can also check all the data which are going from the computer and also the data which are coming to computer. And through secured email process and secured web browsing method, the rate of getting effected of the computer system will be reduced in some extent.
For getting the successful outcomes from this research work, I prepared a questionnaire for all the internet user about their experience of the internet. I distributed this questionnaire among the 150 users among them 60 of the users are responded. Through this, I concluded that that maximum of the users are comfortable with the internet usage and also very much concerned about the internet security. I also noticed that the users are also take the suitable steps to control the data redundancy which helps in data security and also maintain the data integration.
Reference List
anon,. (2012). Research-on-Research: Research-on-Research Reports. Research-Technology Management, 55(6). doi:10.5437/08956308×5506906
Basu, C. (2010). Internet Safety. Journal Of Information Privacy And Security, 6(3), 74-75. doi:10.1080/15536548.2010.10855895
Boyle, M. (2001). The computer as a Trojan Horse. Journal Of Computer Assisted Learning, 17(3), 251-262. doi:10.1046/j.0266-4909.2001.00179.x
Firewall for ‘always on’ connections. (2000). Computer Fraud & Security, 2000(12), 5. doi:10.1016/s1361-3723(00)12018-4
Firewall protects home PCs. (2000). Computer Fraud & Security, 2000(8), 5. doi:10.1016/s1361-3723(00)08015-5
Fourie, I., & Bothma, T. (2007). Information seeking: an overview of web tracking and the criteria for tracking software. AP, 59(3), 264-284. doi:10.1108/00012530710752052
Gionis, A. (2013). Data Analysis. Data Science Journal, 12(0), GRDI13-GRDI18. doi:10.2481/dsj.grdi-003
Householder, A., Houle, K., & Dougherty, C. (2002). Computer attack trends challenge Internet security. Computer, 35(4), sulp5-sulp7. doi:10.1109/mc.2002.1012422
Internet Safety. (2009). Archives Of Pediatrics & Adolescent Medicine, 163(10), 968. doi:10.1001/archpediatrics.2009.174
Kirkby, A. (2001). Internet Trust And Security. Network Security, 2001(9), 6. doi:10.1016/s1353-4858(01)00913-8
Lee, M. (2014). History of Hacking. Engineering & Technology Reference. doi:10.1049/etr.2014.0011
McGee, P. (2007). Ethical Issues in Data Collection. Research Ethics, 3(2), 53-53. doi:10.1177/174701610700300206
McGee, P. (2007). Ethical Issues in Data Collection. Research Ethics, 3(2), 53-53. doi:10.1177/174701610700300206
Merkow, M., & Breithaupt, J. (2000). The complete guide to Internet security. New York: AMACOM.
New secure email protocol promised. (2013). Computer Fraud & Security, 2013(11), 3. doi:10.1016/s1361-3723(13)70098-8
Simple Steps to Data Encryption. (2013). Network Security, 2013(9), 4. doi:10.1016/s1353-4858(13)70100-4
Sree Vivek, S. (2012). Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security.International Journal Of Network Security & Its Applications, 4(2), 179-199. doi:10.5121/ijnsa.2012.4214
Stephenson, P. (2004). Modeling a virus or worm attack. Computer Fraud & Security, 2004(9), 15-19. doi:10.1016/s1361-3723(04)00112-5
Sunner, M. (2005). Email security best practice. Network Security, 2005(12), 4-7. doi:10.1016/s1353-4858(05)70311-1
Velasco, J., Herrero, T., & Prieto, J. (2014). Methedology for designing, observing and computing external geodetic networks of long lengths tunnels. Inf. Constr., 66(533), e010. doi:10.3989/ic.13.007
Web security under threat. (2011). Network Security, 2011(10), 1-20. doi:10.1016/s1353-4858(11)70100-3
Westra, B. (2002). HealthLinks: A ColdFusion Web Application. Internet Reference Services Quarterly, 7(1-2), 63-88. doi:10.1300/j136v07n01_05
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download