The Importance Of Internet Security

Decent Essays
A Look at Internet Security The Internet has been and will continue to be an essential aspect of society. As time goes by, people rely more and more on technology. However, many are not aware of the security risks that threaten their safety and wellbeing as they explore cyberspace. Internet security is an issue that governments and people deal with everyday, as hackers attempt to exploit important personal information. That is why it is imperative that Internet security should be stressed more in order to prevent further scandals, invasions of privacy, or violent attacks from happening. In regards to Internet security, one cannot look at its history and developments without understanding the establishment of the Internet itself. Tension …show more content…
Many people are attacked everyday and are sometimes pushed to a point where they cannot enjoy the physical world. With a more secure Internet, cyber bulling could be avoided, which could potentially save people from the pain or save lives, depending on the extremity that cyber bullying could push someone, whether it be depression or suicide, in some cases. Another advantage to Internet security would be the creation of an age barrier for younger generations on the Internet and the limit to the type of content that can be viewed. If parents are struggling with keeping their children safe in cyberspace, than a more secure network could help. The harm and inappropriate sources on the Web can ultimately affect their life in a poor way (Palfery and Grasser 87). A lot of good can come out of a more surveyed Internet, however most people do not take the time to fully grasp its …show more content…
The biggest issue that has been debated would be the role that the government plays, especially in the democratic realm, like the United States, as opposed to a more controlled society. Within the Apple court case, Apple’s main concern like everyone else’s, was that by allowing the government to crack one phone, they would have the potential of cracking into anyone’s phone, enabling them to access any kind of information. This would be risking the safety of Apple’s users and thus giving the government too much authority and control (Perez and

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Apple Vs Fbi Essay

    • 521 Words
    • 3 Pages

    The issue of “Apple V.S The FBI” is should Apple create a program that can break into a terrorist phone. This is an issue because this could solve many terrorist problems but could also compromise the personal info and safety of Apple customers. From the reading “Apple VS The FBI” that “People's phones are a record of their most intimate thoughts and personal information”(Smith 7). This means that people's phones can hold personal information including financial records, friends, addresses, location data, personal photos and more”(Smith 7).…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The very idea of a worldwide system that could send messages instantly was a mere fantasy until the year of 1969. Of which the first internet message was sent, “Lo”. In direct result, the era of the Internet was kickstarted into existence. It would be twenty years, in 1989, until the first service providers were erected into existence. Major companies such as Comcast wouldn’t start to provide high speed internet until the late 2000’s.…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unit 1 Assignment

    • 783 Words
    • 4 Pages

    COMPUTER ARCHITECTURE AND IMPLEMENTATION Assignment 1 Name: Bhargavi Bussu Student Id: 10000126759 Professor: Paul Wang 1.3 Traditionally a user's view of a Computer system like an Onion. Explain why this concept is outdated and draw a new diagram based on the concept proposed in this book. In Today's current generation the Computer systems are wide opened to the Internet, however threat towards the Computer system have been increasing rapidly at a faster rate.…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Iphones, Inc. Case Study

    • 1642 Words
    • 7 Pages

    A very recent topic that has been circulating in the news is the topic of the FBI and the company known as Apple. Apple is known for its many products ranging from iPhones, MacBook’s, and watches that most of you, I imagine, have. The controversy surrounds an iPhone 5c that was found to be the work phone of one of the two Islamic San Bernardino terrorists. The FBI is requesting that Apple creates a backdoor to install on the phone to disable its security features. Apple does not want to do this for privacy reasons.…

    • 1642 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Government's fight against terrorism to protect the American People would require it to police and establish dominance over individual technology companies. Most technology companies have been steadily increasing their use of safeguards following recent hacking attacks and revelations from former National Security Agency contractor Edward Snowden, so accessing phones will continue to become even more difficult for the FBI and other agencies. The American people should assist in any way possible to prevent any type of terrorist activity and Apple has offered their cooperation to the best of their ability, but the government should not force them to create a feature that could potentially cause more harm than good. Criminals will soon be able to use that software to hack into airplanes, telephones, health records, and financial records. Who are the people that get to decide who the good and bad people are?…

    • 987 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Apple is refusing to comply with the F.B.I. because they want to unlock an iPhone that was used by Syed Rizwan Frook, who was killed by the police along with his wife, they arrange a mass shooting in san Bernardino, California and they kill fourteen people. Apple does not want to unlock the iPhone because it would threat the privacy of its customers. Apple should refuse to unlock the iPhone for the F.B.I. because it would invade privacy of its customers. It is illegal to spy on people phones because they have personal information that they do not want to share with others.…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With growing rises of terrorism across the world -- but the U.S. especially-- it is crucial that suspicious activities get checked out immediately. For legal reasons, looking into someone’s internet activities should be the same as looking in someone’s house; there should be probable cause or some type of warrant. As shown in cases such as the Boston Marathon shooting, the internet and citizens’ internet content can help solve crimes on a national level -- in these instances, monitoring the internet is a duty to the country and is necessary to protect the wellbeing of…

    • 529 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security Vs Privacy Essay

    • 561 Words
    • 3 Pages

    A federal judge asked Apple to help the FBI unlock an iPhone belonging to Syed Farook, who was responsible for the shootings in San Bernardino in December which left 14 people dead. The judge asked Apple to provide "reasonable technical assistance" to the U.S. authorities, which would require the technology giant to overhaul the system that disables the phone after 10 unsuccessful password attempts. Once this feature kicks in, all the data on the phone is inaccessible. Apple declined to help the FBI. There are many pros to this as well possible cons.…

    • 561 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Child Identity Theft

    • 1263 Words
    • 6 Pages

    Since the introduction of internet in 1990s, people’s life has changed drastically. Because people use the internet in their day to day activity, constantly personal information like credit card numbers, bank details, social security numbers, personal data, usernames and passwords are travelling between computers through wires or air. As much as business believes that their user’s data is secure, hackers find their way to obtain user’s private data and use it for the benefit of the criminal. Identity theft was the number one complaint category in the CSN for calendar year 2014 with 13% of the overall complaints. The purpose of this study is to explore the increasing cases of identity theft through internet.…

    • 1263 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays