Internet Security Problems in Contemporary Society

Essay on Commercial Laws of Kuwait
October 13, 2019
Emotion Regulation: Importance and Application
October 13, 2019

Internet Security Problems in Contemporary Society

Internet Security Problems in Contemporary Society

In the contemporary society, technology comes out as one of the essential elements in the improvement of effectiveness and efficiency among the society members. Technology continues to determine how human beings execute their goals, as well as make valuable decisions in the modern society. For instance, human beings have focused on the utilization of technological advancements to enhance their communication and interaction in the modern context. Similarly, individuals continue to utilize technological advancements for the educational and healthcare obligations. Additionally, individuals utilize technological advancements to make relevant payments, as well as access information on the internet or online platforms. In spite of these positive implications of technological and internet advancements, users of the internet sites have the obligation to examine and protect their prospective regarding security issues. The essay will examine and explore internet security problems such as denial-of-service and virus attacks in the modern society.

One of the critical internet security issues is the concept of phishing. This refers to the technique by the malicious attackers or hackers to use ‘legitimate’ source of information such as financial or banking institutions to convince the target audiences on accessing information from such platforms. Utilization of such ‘legitimate’ sources might convince the target audiences to log in the sites; thus, the platform for the malicious attackers to harvest sensitive or personal information. Malicious hackers or attackers might utilize the sensitive or personal information to commit crimes or frauds, thus, the essence of misused identities. Malicious attackers continue to integrate slick techniques to use phishing to target vulnerable internet users, thus, the need to consider the integration of diverse mechanisms to limit the implications of the internet security issue (Jensen et al., 110).

Furthermore, internet users tend to experience problems relating to poisoned websites, which infect and influence the usage of internet networks. In most cases, such security issues focus on appealing to the fear and curiosity elements of humanity in the course of gaining access to sensitive information. Malicious attackers might gain access to the personal or sensitive information leading to committing of crime or fraud and the eventual misused identities. For example, a legitimate site might prove to contain juicy news content and video elements, which attracts the curiosity of the target audience. The destination of the site might contain security issues to infect the computing system. In other instances, malicious hackers might consider luring unsuspecting users to purchase or procure malware, which they market as the remedy. These techniques are essential in the violation of the credibility, authority, and autonomy of the information.

Thirdly, internet users continue to experience security issues regarding malware practices and virus components, which continue to slow down the operating systems, thus, limiting the productivity of the computing systems. Hackers might also consider the use of the denial-of-service to halt the operations of the company or institution in question (Kandukuri et al., 519). These security issues have several damaging implications on the operating systems and personal information or sensitive issues while utilizing internet technology and sites. From this perspective, there is need to limit the implications of the internet security issues.

In conclusion, the essay focused on examining and exploring internet security problems such as denial-of-service and virus attacks in the modern society. In the course of limiting the influence of these security issues, institutions and organizations should consider integrating acceptable use policy. The policy will be valuable in the provision of adequate information to the users while determining the sites to visit and sites to avoid. The policy will also determine the amount of time spent on the internet sites as precaution against the internet security problems. Evidently, the policy will be valuable in enhancing effectiveness and efficiency in the utilization of the internet sites by the relevant issues.

 

Works Cited

Jensen, Meiko, et al. “On technical security issues in cloud computing.” Cloud Computing,           2009. CLOUD’09. IEEE International Conference on. IEEE, 2009; 109-116.

Kandukuri, Balachandra Reddy, V. Ramakrishna Paturi, and Atanu Rakshit. “Cloud security        issues.” Services Computing, 2009. SCC’09. IEEE International Conference on. IEEE,       2009; 517-520.

 

Employee security Issue within an organization