Internet Security
Executive summary
There has been a growing trend of people using the internet as research indicates. The internet serves as a good source of information, entertainment and is also used for communication. Despite the merits that come with the use of the internet, there is a high risk of malware, spams, and swindles for the users. The risk that the internet users are exposed to calls for internet security to ensure that the use of internet remains interesting and enjoyable. This report seeks to outline some of the benefits and challenges that come with internet security by conducting a SWOT analysis. The report will further point out the ethical and legal concerns involved in internet security. It will demonstrate some of the changes that have taken place as far as internet security is concerned and a prediction of what the future of internet security is likely to be. According to Forsyth (2014), this will help in understanding the basic facts of internet security and how users can ensure they are not victims of viruses, spyware, spams and phishing scams and other threats when using the internet.
Internet Security
Introduction
There is a high number of people using the internet for different purposes. Some use it to get services, some in getting information while others use it for entertainment and communication. As studies indicate, there is a growing preference for the use of internet and this call for better strategies to ensure that users are secure. According to Taylor, Fritsch and Liederbach (2014), many users end up victims to swindles, viruses and scams because of poor security measures to protect them while using the internet. This report intends to conduct a SWOT analysis of the internet security aspects to establish some of the challenges merits and developments. The report will demonstrate the legal and ethical aspects concerning internet security, give a prediction of what users should expect in future and give recommendations on the best practice by users to reduce their chances of risk.
There is a need to understand different aspects of internet security so as to comprehend some of the strengths, weaknesses, and opportunities concerning internet security. Essentials of internet security require users to embrace basic protection measures to avoid possible risks.
Security risks when using the internet
Viruses for computers
Computer viruses are the most common forms of internet security risks. Many people use their computers to communicate, share information and even carry out confidential financial transactions. When a virus infects a computer, users are likely to lose their sensitive information. Viruses affect software in a computer and make it to malfunction hence affecting user activities. According to Whitmore, Agarwal and Da Xu (2015), computers virus are used by swindlers to inconvenience users by program disruption. Users need to ensure that their computers have an antivirus software to avoid the risk of attack from viruses. The precaution helps in reducing disruption of computer activities and damage to data. Many computers get infected with viruses if the owners get infected files from the Internet without scanning them. The essence of ensuring that a computer has an antivirus is because users can securely download and surf the internet without being attacked by harmful programs. Data of the users’ remains safe if an antivirus is installed in a computer this makes people and companies explore the opportunities to do business and get services safely using the internet.
Spywares
These are computer programs used by swindlers to get information about users then use such information to defraud the users or for any other purposes that can cause loss of critical information and data. The users in many cases are not aware of such programs in their computers which make it difficult to deal with them. Spyware gets into the computers of a user when they install free applications and software from the internet. Studies indicate that some spyware cannot be protected by normal antiviruses and require spyware management tools to keep the computers safe. It is recommended that users should avoid installation of free software and applications because they have high chances of allowing spyware to the computers. Computer security measures find a weakness in the fact that antivirus software is not able to protect spyware without the presence of spyware management tools.
Phishing scams
These are links usually sent to the users directing them to make certain actions by clicking the link. The links are in many cases sent to emails of individuals. The senders pose as financial institutions or any other reputable organization. The scams collect confidential information about the users such as login details and use them to commit a fraud. Users are advised to avoid taking such instructions from the internet or following the links because they may end up giving confidential information that could lead to losing of their finances and essential documents. The users receiving such links from scams have the chance to stop the emails from such sources hence avoiding any future communication from the scams.
Spam
These are electronic mails sent to users soliciting them to register, buy or sign up for something attractive. Spams are used by swindlers to send emails to a large number of internet users. If users sign up or register, their information is collected by spammers. There is software that is used to block and filter spams from getting into the inbox of users. The spam filter software helps the users only to receive emails from credible individuals. Users are advised to use spam filters to help in storing the spam emails in the spam folder and the users can confirm which ones are genuine and the fake ones. The spam filters have an advantage to the users because they have the chance to check on emails that are genuine and flag them before they can thrash the junk emails. Many marketing companies use spams to send information about products to the users. Such information sent is not genuine and is intended to mislead users to certain links where their confidential information may be obtained through deceit. Users are advised to check keenly the emails that they receive in their inboxes especially when such emails appear to be official and directing them to take some immediate action or follow certain links.
Cybercrime
The increased use of internet has also come with several risks related to impersonation. Swindles and fraudsters use other people’s names and reputable companies to defraud vulnerable internet users. The social media platforms constitute a common platform where fraudsters pose as big personalities, influencers and charity organizations to defraud other users who are not careful. Cases of cybercrime have increased among people using the internet. Users are advised to check whether sites and names of the people or company they are engaging with are genuine. The fraudsters pose a big threat to many internet users who may not be aware on how to avert such cases. While technology is changing and a lot of security measures are being undertaken, the fraudsters are also developing strategies to ensure they do not lose the battle. It is essential for internet users to develop an interest in learning basic internet security measures if we intend to reduce the cases of risks.
Intellectual property aspects are also common when it comes to internet security. Other individuals use content from scholars and publishers without the consent of the owner. Copying, duplication and printing of publishers materials without their consent is common for internet users. Trademarks and copyright laws are not observed.
Ethical and legal concerns surrounding Internet security
There are several ethical and legal issues surrounding Internet use among many users. Individuals or institutions may be forced to take legal liability due to infringement of the legal guidelines for internet use. Some of the common legal and ethical issues revolve around intellectual property. Many people and companies end up disregarding the copyright and trademark guidelines which may result in legal liability for the offenders. Disclosure of private information by an individual or institution without the consent of the involved party may also attract legal action. Display or sharing or explicit materials through the internet is a form of infringement to the legal and ethical requirements. However, there are countries that have not made pornography illegal. Irresponsible business practices also a form of ethical and legal concerns in the use of the internet. Some companies and individuals carry out their marketing and advertising activities irresponsibly a move that is regarded unethical. Some organizations use the internet to conduct fraudulent businesses. Spamming has been cited as the common form of irresponsible business practices that infringes the internet security measures. It is, therefore, necessary for businesses and individuals to remain careful when using the internet to avoid infringement of the legal and ethical measures.
Intellectual property and copyright issues form the major aspects of infringement by internet users. As required by law, individuals are not supposed to copy materials produced by others and published on the internet without the consent of the owners. Duplication of such material and using them for commercial purposes is also prohibited. Using the information from such sources by scholars and learners need to be acknowledged. However, as studies indicate, many individuals use materials from other scholars without acknowledging them. Some students will also use such information from the internet without quoting the source of information an action regarded as plagiarism. Many people ignore the copyright directives on documents and end up duplicating them for commercial use contrary to the legal requirements. Producers of internet content intend to earn some money from the documents they publish, but this does not happen in many cases. Those that benefit from the materials are individuals who duplicate and print the materials for commercial use. It is essential for scholars, students, and publishers to follow the existing intellectual property laws and requirements.
I believe that scholars, students, and other internet users should always respect intellectual property. Those who produce internet material want to make some revenue out of their work. It is essential that those using free material from the internet to respect the guidelines as provided by the owners of the materials. Copying and duplicating other people's work for financial gains should be prosecuted. Individuals found guilty of committing such offenses should take legal responsibility to ensure that cases of infringement for intellectual property guidelines are reduced. Many countries have rules that protect online content producers while others lack such guidelines. However, it is essential for the authorities to come up with effective regulations to help in dealing with cases of intellectual property infringement.
Improvements on Internet security in the last two years
Over the past two years, there have been efforts to increase the security of Internet users amid high cases of security threats for the users. Computer security tools have been invented to help users remain safe when using the internet as Kahler (2015) suggests. Strong antiviruses have been developed to curb cases of spams and scams. Spyware management software has also been improved to protect users from losing the confidential information to unknown Internet swindles. The cases of computer viruses interfering with normal functioning of computers and data loss have been reduced to a significant extent. Previously many cases of computer viruses were reported across the globe among many internet users. Currently, there are few cases of computer viruses reported across the globe. However, the reduction in the number of computer viruses getting into computers many swindles has moved to new strategies such as spywares and scams. There is continued research on antiviruses and spyware management tools to help reduce cases of risk for the users. Users have a choice for secure browsing which helps them protect their information and computers. Many countries and communication authorities have come up with legislation to protect Internet users. Many countries across the globe have adopted intellectual property protection legislation. Countries and corporate leaders are advocating for responsible marketing practices by companies hence helping in reducing cases of spams for the internet users. People and companies are embracing virtual private networks to get information, communicate and have entertainment. The networks have helped reduce cases of risk that users are exposed to when browsing using public networks.
According to Gollmann (2010), regulation of the type of content worth posting online has helped in reducing pornographic materials shared online. Many countries are regulating irresponsible e-commerce practices. Financial institutions such as banks that are dealing with sensitive and confidential information involving money transactions have embraced strong security measures. People can comfortably carry out their financial transactions without the risk of loss or infringement of their privacy right. Such transactions faced a lot of challenges previously because there were no strong security systems to help protect the users. Many internet users lost their money and confidential information without knowing. Such cases have been reduced to a big extent leading to many companies embracing online money transfer services.
Companies are making their transactions online because of the improved internet security. There is a shift from the use of hard cash in making transactions to swiping of cards. The improvements in Internet security have led to increased internet use, and much more is expected. There is an increase in public confidence in the use of the internet as studies indicate unlike it was before. Studies indicate a growing number of people acquiring the internet enabled phones and gadgets so that they can benefit from the services and information shared through the internet. The trend in the purchase of these gadgets shows the confidence expressed on the internet as a source of useful information and services. Many courses are offered educational institutions to help people get informed on how to remain safe while using the internet.
Prediction of the future role of internet in commercial and personal uses
There is a growing preference for internet use in the society. Many users use it for their personal activities while others use it for commercial use. While individuals use the internet to get information and services they require for their personal needs, the internet is used a lot in commercial activities. According to Yan, Zhang, and Vasilakos (2014), financial transactions such as money transfer services are done using the internet. Many communication activities and exchange of information by companies are done through the internet. There is a possibility of people and businesses moving towards internet transactions rather than having to go to the banks and stalls to purchase goods and services. Communication is also likely to rely on the internet if the trend continues; this is based on the increased cases of teleconferencing and video conferencing that are gaining relevance by many organizations. Business networking has increased, and multiple businesses can be managed from a single location using the internet. Computer-based information systems and financial accounting using internet software will be a major practice for many businesses. There is an increase in mobile applications that are using the internet, and companies are moving towards having personalized applications where consumers can get the information they want without having to face the problems with spams and spywares. According to Kaufman (2009), many companies are moving towards developing their websites to enhance faster access of information by internet users. Companies are helping individuals to be secure when browsing. Many services both personal and commercial are likely to embrace the use of internet in future due to the rapid technological development. The convenience that comes with internet use also plays a big role in increasing the number of individuals using the internet to get information, services, and entertainment.
Internet security diagram
According to Meeker (2015), internet security is an essential aspect for internet users. The growing rate of people and businesses using the internet requires that individuals and companies take steps in ensuring their internet security to avoid loss of information and data from their computers. Current trends show increased security measures in Internet security by companies and service providers. Relevant authorities also need to enact good legislations to help reduce ethical and legal issues on internet use, a move that will strengthen the safety of users in future since a high growth in the number of users is predicted. Computer viruses, spyware, scams, and spams are the major threats to internet users. They contribute to high cases of data loss and infringement of privacy of the users. There is also a growing number of internet security issues relating to intellectual property guidelines infringement by many internet users. Proper legislation, training, and awareness can help tackle this challenge that many users are facing in their daily internet use.
References
Forsyth, I. (2014). Teaching and learning materials and the Internet. Routledge.
Gollmann, D. (2010). Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544-554.
Kahler, M. (Ed.). (2015). Networked politics: agency, power, and governance. Cornell University Press.
Kaufman, L. M. (2009). Data security in the world of cloud computing. Security & Privacy, IEEE, 7(4), 61-64.
Meeker, M. (2015). Internet trends 2015-code conference. Glokalde, 1(3).
Taylor, R. W., Fritsch, E. J., &Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.
Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261-274.
Yan, Z., Zhang, P., &Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120-134.