Friday, July 19, 2019
The Ethics in Securing the Internet Essay -- Ethical Web Privacy Essay
The Ethics in Securing the Internet Introduction In order to understand the concept of internet security and why it is necessary it would be worthy of analysis to discuss what would happen if not enough of it is provided, meaning that the levels of security are not utilized to the full extents. This is exactly where the big issue of hacking and hackers becomes involved. Hackers can benefit from a wide range of weaknesses in security, break into systems, find the information they need, and eventually change them to fulfill their desire. This, over the years, has resulted in great deals of information loss in big companies throughout the world, causing them to not functioning properly or eventually break apart. This is precisely where the concept of internet security and its great necessity comes into play. Why is Internet Security Needed? To accomplish a good understanding of what internet security is and why we need it, it would be helpful to first go over the concept of internet and a brief history about it to see how it was the first time around, and in what different ways it's been developing since it was first created. The origins of the internet The first image of internet presented by J.C.R. Licklider of MIT in August 1962, envisioned internet as "a globally interconnected set of computers through which everyone could quickly access data and programs from any website."[1] It's worthwhile to mention that concept was a lot similar to what is known as internet today. Having said that, one can see to some extents, the great importance of Licklider's work - back in the 60s - in how it's been influencing our lives eversince. The next major step, along the path of computer networking was made by Leonar... ...kpoint.com/products/downloads/opsec_whitepaper.pdf > 2004 4. Checkpoint software technologies Ltd., Getting Started Guide: What Every Small Business Needs to Know About Internet Security, < http://www.checkpoint.com/products/downloads/sb_getting_started_internet_security.pdf >2004 5. Checkpoint software technologies Ltd., IPSec versus Clientless VPNs for Remote Access,< http://www.checkpoint.com/products/downloads/ipsec_whitepaper.pdf > 2004 6. Eos Development < http://www.eosdev.com/Backgrounds/Back_Petals/EosPetals4.htm > 7. Texas State Library and Archives Commission, Glossary < http://www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html > (Last updated 10/15/01 8. Checkpoint Software technologies Ltd. < http://www.checkpoint.com > 9. Corporate Automation Group, Hipaaq home < http://www.cag.com/hipaaq/html/hipaaq_md1.html >
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.