Paper Details  
 
   

Has Bibliography
7 Pages
1814 Words

 
   
   
    Filter Topics  
 
     
   
 

Internet Security

ature" 2). Passwords, a major key to firewalls, are also the most basic of security measures. The user should avoid easily guessable passwords such as a child's name, birth date, or initials. Instead, he should use cryptic phrases and combine the use of small and capitalized letters such as "THE crow flies AT midnight". Another easy way to avoid problems is to change the password or phrase at least once a month (Rothfeder, "November 1996 Feature" 5). Just in case an intruder does get through the first layer of security, a good backup is to have all the data on the system encrypted. Many browsers come with their own encryption schemes, but companies can buy their own stand-alone packages as well. Most encryption packages are based on a public-private key with their own private encryption key to unlock the code for a message and decipher it. Encryption is the single best way to protect data from being read, if stolen, and is rather cost effective (Rothfeder, "November 1996 Feature"5). GOVERNMENT REGULATIONSBusinesses and individuals need protection but they cannot do it alone. The Federal government will have to do its part if the Internet is going to give us all the returns possible. Businesses will not use the Internet if they do not have support from the government. In the United States there is no set of laws that protect a person's privacy when on the Internet. The closest rules that come to setting a standard of privacy is an assortment of laws beginning with the Constitution and continuing down to local laws. These laws unfortunately, are not geared for the Internet. These laws are there only to protect a person's informational privacy (Boyan, Codel, and Parekh 3). Now, because of the booming interest and activity on the Internet in both the personal and the business level, the government has started investigating the Internet and working on ways to protect the users. The Federal Bureau of Investigation (FBI), the Central Intellige...

< Prev Page 5 of 7 Next >

    More on Internet Security...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA