Internet Security Term Paper

Pages: 4 (1386 words)  ·  Bibliography Sources: ≈ 7  ·  File: .docx  ·  Level: College Senior  ·  Topic: Education - Computers

Such a loss would be devastating. Other tools like Telnet and FTP are also important and its use cannot be eliminated. Username and passwords are sent in clear text by telnet and FTP and any outside intervention can cause the loss of privacy. However improved versions with secure authentication methods are being developed that do not undergo clear text transmission and thus organizations should update their systems to use those.

Get full Download Microsoft Word File access
for only $8.97.
Tools that scan for and detect security holes within the network should be adhered to by organizations. These tools would scan for any vulnerability that could be exploited by hackers. This would be a preemptive step in the security measures that an organization would take and high risk vulnerabilities can be addressed as a priority before any incident of unauthorized access can occur thus keeping safe critical data. Moreover benchmarks should be used to keep the security up-to-date. "Benchmarks are complex documents and most system administrators and security practitioners have neither the time nor the breadth of expertise to test every aspect man-ually. Automated testing makes that job easy and reliable" (Alan Paller). The U.S. government has also been stepping up its fight for a better internet security for organizations. "The Energy Department, along with four other federal agencies and the Center for Internet Security (CIS), today announced the release of a security configuration benchmark for Oracle Database Versions 8i and 9i running on Windows and Unix" (Grant Gross). Extensible Authentication Protocol Over Ethernet is a very important tool for security. It is used for wireless and wired protocols.

Term Paper on Internet Security With the Increasing Assignment

Internet has opened doors to hackers and other mischievous people to cause disruptions and loss to individuals as well as organizations. Many competitor organizations also make use of these unfair means to tap into vital data to gain an insight on the plans of their competitors. Such unethical means although wrong are on the rise and they will never end. Newer ways will be developed by people for such unfair means and indeed newer ways will be developed by others to ensure top notch security. The advantages of internet cannot be overlooked and it has served to be a vital ingredient in ecommerce. People access it from their PCs and cell phones while organizations need it for their own benefits. Thus it is important for organizations to use security tools in order to prevent any misfortune. Organizations normally have employee data, customer data and other critical data which could be easily misused if gone in the wrong hands. Hence it is important for them to protect it with all means possible. Firewalls, anti-viruses, spam protection are all tools that would save a company from monetary losses. Benchmarks should also be used by companies to detect and be informed of any security loopholes that its network might have. Some services that are potentially dangerous like email, remote login etc. are also important to use and their use cannot be omitted. Therefore organizations should use protective measures against these to minimize or eliminate others from gaining access to their systems.


(1) Tim Lemke -- Article Title: Internet Security Threat Up, Panel Told. Newspaper Title: The Washington Times. Publication Date: July 17, 2001. Page Number: 7.

(2) Microsoft -- Securing Your Infrastructure. [Online website] Available from: [Accessed on: 21/09/2005]

(3) Scott Berinato -- How To Save The Internet. [Online website] Available from: [Accessed on: 21/09/2005]

(4) Dawn Harris -- Factual Data Reveals 31% of Corporate Internet E-mail Exchange Could Cause Legal Liability, Financial Loss and Disruption of Network Services. [Online website] Available from: [Accessed on: 21/09/2005]

(5) Letter from Scott Charney, Chief, Computer Crime Unit, U.S. Department of Justice, to Barbara Guttman, NIST. July 29, 1993.

(6) Alan Paller -- Consensus Minimum Security Benchmarks. [Online website] Available from: [Accessed on: 21/09/2005]

(7) Grant Gross - U.S. government looks to shape cybersecurity with new Oracle pact. [Online website] Available from:,10801,85264,00.html [Accessed on: 21/09/2005] [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (4 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Internet Business Plan Business Plan

Security Issues of Online Communities Term Paper

Security Policy Dr. Fossett's Dental Office Term Paper

Internet Trust Certificates Term Paper

Security Solution Essay

View 200+ other related papers  >>

How to Cite "Internet Security" Term Paper in a Bibliography:

APA Style

Internet Security.  (2005, September 21).  Retrieved November 29, 2020, from

MLA Format

"Internet Security."  21 September 2005.  Web.  29 November 2020. <>.

Chicago Style

"Internet Security."  September 21, 2005.  Accessed November 29, 2020.