Guidelines
You are required to carry out a research project using the Internet. The title of your project is Security and Confidentiality on the Internet. Produce a 1500 word report examining the following areas in regard to the Internet.
• Identify three different Internet Service Providers and compare and contrast – Connection methods – cost comparison.
• Discuss the minimum hardware and software requirements for connecting to the internet.
• Discuss the function of IP addresses and how they apply to communicating on the internet.
• Show the steps in registering domain name for user, indicating the different options that have to be considered.
• Explain how a computer system can be protected from viruses transmitted via the net
• Outline teh use of firewalls to protect against unauthorised access.
• Describe the use of digital signatures to verify identity on the internet.
• Explain the purpose and potential risk associated with cookies.
Internet
Internet is computers network connected around the World via dedicated servers. When your computer is connected to the internet you can send, received all kinds of information such as text, graphics, voice, programs and video.
The Internet history began with development of the computers. First message was sent over the ARPaNet (The Advanced Research Projects Agency Network) from computer science Professor Leonard Kleinrock's laboratory. The ARPaNet in particular led to the development of protocols for internetworking, in which multiple separate networks could be joined together into a network of networks.
Internet Service Providers
In the Ireland are a lot of Internet Service Provider (or ISP), but how to know which one is the best and available in your location. I will look ...
... middle of paper ...
...nformation such as previous activitie, shoping chart, login information.
Potantial risk using cookies is 2 types. First is web sites can gather and sell your personal information. Second risk is web sites can track users activities across multiple web sites. These are risks of privacy more than risks of damage to hardware or software.
Used Material: http://www.uswitch.ie/broadband/ - for compare ISP (internet Service Provider) http://en.wikipedia.org/wiki/History_of_the_Internet - Wiki page about History about the Internet http://en.wikipedia.org/wiki/IP_address - Wiki page about IP address http://whatismyipaddress.com/dynamic-static - Wiki page about IP address types www.website.org – Web page to create sub Domain http://anti-virus-software-review.toptenreviews.com/ - anti virus software reviews http://en.wikipedia.org/wiki/HTTP_cookie - wiki page about Cookies
An internet service provider is a business that offers Internet access service for both businesses and individuals. The main function of an ISP is to provide a link to the worldw...
Cookies play a significant role in our daily life, it brings lots of convenient when we use website. However, many people afraid that it will leak our privacy at the same time as it convenient to us. Although cookies are controversial, there is nothing wrong with them. The data collectors should take responsibility to protect users’ information, also users should be aware and careful when they use the website.
Compare the pros and cons of 3G and 4G technologies to determine the best uses of 3G and 4G technologies in today’s applications.
The first plan has the potential to assist consumers with access to basic services like electronic mails, web browsing, basic video conferencing and gaming. The second plan has added advantages which allows the broadband customers to stream movies or live games online, HD online gaming and HD video conferencing. The disadvantage with the lower data rate plan is that it will be very difficult to connect a high number of internet enabled devices in addition to poor quality of service. Also the internet traffic would be very high in the case of both the broadband plans. However, download speed of 25 Mbps and upload speed of 4 Mbps will eliminate most of these issues and provide a better wireless environment throughout the
Network Address Translation (NAT) is a standard used to allow multiple PCs on a private network to share a single, globally routable IPv4 address. NAT enables a user to have a large set of addresses internally and usually one address externally. The main reason NAT is often deployed is because IPv4 addresses are getting scarce. NAT is an immediate, but temporary, solution to the IPv4 address exhaustion problem that will eventually be rendered unnecessary with the deployment of the IPv6. The Internet Engineering Task Force has been aware of the impending depletion of the current address space for almost a decade.
An IP address serves two principal functions; host or network interface identification & location addressing. Its role has been characterized as follows: A name indicates what we seek. An address indicates where it is. A route indicates how to get there.The designers of the Internet Protocol defined an IP address as a 32-bit number & this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, because of the growth of the Internet & the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address, was developed in 1995. IPv6 was standardized as RFC 2460 in 1998, & its deployment has been ongoing since the
Web site administrators say that the primary purpose of cookies is not to track Internet surfing habits. Rather they argue that cookies allow users to customize their experiences on the web. Services like My Yahoo would not work nearly as smoothly without cookies.
Most of internet options are free or cost lower than telecom connection. However, internet connection is still unstable and most of Internet service are only available from telecom companies. Moreover, Telecom providers like Telstra are offering packages with substitute products with telecom products to reduce the threat. In general, threat from substitutes is
Other forms of Internet regulation is domain registration, IP address control, etc. In domain registration, once a domain is purchased the Webmaster’s address has to be registered at the time of purchase.
3. Roger Clarke. Information Privacy On the Internet Cyberspace Invades Personal Space (May 1998). Xamax Consultancy Pvt. Ltd. 29th March 2004. http://www.anu.edu.au/people/Roger.Clarke/DV/IPrivacy.html
Bandwidth: It is one of the big problems in lower bandwidth uses countries (e.g. de-vel...
Privacy and security of personal data is one of the most difficult challenges that businesses dealing in e-commerce venture face in today’s global world. Though these business sites have little or no interest in private and personal information of the users, but the information collected by them can however lead to risks. The personal information is often provided by users actively and voluntarily such as names, email ids, physical addresses or even credit card information. Though in some cases information is passively passed on by users and even sites to third party, for example some of site banner ads allow third party advertisers to track users browsing habits. But most often websites gather and use the data containing individual’s information without even their knowledge. Main concern of e-commerce business ventures in today’s world is lower the liability risk in regards to the site’s personal information collection practices. In order to achieve the desired success they should constantly determine and examine what kind of information is being collected by the site and should constantly develop privacy policy statement in order to protect the information. Among many aspects of crime on the information superhighway, electronic vandalism, theft, money laundering, electronic vandalism, illegal interception, electronic funds transfer crimes are some examples. In the following paper more insight on privacy issue. Some of these issues, available options and risks surrounded are further highlighted.
The Internet is a network of networks, linking computers to computers sharing the TCP/IP protocols. Each runs software to provide or "serve" information and/or to access and view information. The Internet is the transport vehicle for the information stored in files or documents on another computer. It can be compared to an international communications utility servicing computers. It is sometimes compared to a giant international plumbing system.
The Internet began like most things in our society, that is to say that the government started it. The Internet started out as a experimental military network in the 60's. Doug Engelbart prototypes an "Online System" (NLS) which does hypertext browsing editing, email, and so on. The Internet is a worldwide broadcasting resource used for distributing information and a source for interaction between people on their computers.
Then I asked used primary sources to ask people, shops about the broadband packages, in the meanwhile, when I was asking about broadband packages, I used secondary sources to look up more website on broadband packages.