This website uses cookies to ensure you have the best experience. Learn more

Internet Security Essay

3557 words - 15 pages

The paper discusses the topics regarding, 1) Internet Frauds ;2) to analyze user’s satisfaction on internet security by using Secure Socket Layer (SSL); and 3) to make people aware of internet fraudsters.
Six research questions were utilized in this study. This study examines whether secure socket layer and its certificate would protect online users from fraudsters while they browse websites. The six research questions are as follows:
• Are there any security breaches occurring with the usage of SSL certified website?
• Can we stop internet frauds by making people aware of it?
• Is secure socket layer used in all websites?
• Is Secure Socket Layer reliable?
• Does Secure ...view middle of the document...

This is called the ARPANET (Advanced Research Project Agency Network). This was developed by the United states Department of defense in the year 1969” (Giacomello, 2005).
Internet security has become a major concern for all online users because the risk related with many online services had made security a major issue for online failure or success. Over the past few years, user magazines and security providers have well-read the market on the essentials of online security (Bit Engines, 2002).
The majority of customers are expecting online services to be confidential and vital. Users would buy their products or browse websites when they are satisfied that their details are secure and safe from fraudsters or hackers. Quality SSL Certificates used for online transaction tells customers to take their security seriously (Bit Engines, 2002).Various studies stated that SSL provides protection for customer’s transactions and provide company with a proof of your digital identity.
Statement of Purpose and Problem
The purpose of this study is to analyze user’s satisfaction on internet security by using Secure Socket Layer (SSL) and to make people aware of internet frauds. Is SSL capable of protecting the advanced technologies used in hacking the internet? The following provides the research hypothesis and relevant information pertaining to the hypothesis.
With the usage of SSL, users are unable to prevent internet security breaches.
Null Hypothesis:
Users are able to prevent internet breaches using SSL.
The objectives of this study will be met using descriptive experimental pretest-posttest. Many online users have been selected for this study, users browse websites but they cannot differentiate a website that has a SSL certificates or not, which protects customer’s data while they make transactions online.
Each user, during this study will be asked to browse similar type of websites that is unsecured, medium or highly secured, highly secured website uses SSL certificate for providing security.
There is a pretest governed to online website users. After the completion of the test, both the quality and service providers will test the website and gather information whether the data transferred is secured from fraudsters. Few days after, when the test is completed users will be given a delayed posttest to evaluate the security problems.
Data will be gathered and the required statistical analyses will me made. The null hypotheses test will be performed to determine if there is any statistical significance among online users.
Principle Research Questions
• Are there any security breaches occurring with the usage of SSL certified website?
• Can we stop internet frauds by making people aware of it?
• Is secure socket layer used in all websites?
• Is Secure Socket Layer reliable?
• Does Secure Socket Layer protect online users from fraudsters?
• Are users satisfied with security provided by SSL authentication?

Other Papers Like Internet Security

Internet Technology, Marketing and Security Essay

3267 words - 14 pages Assignment #4 Internet Technology, Marketing and Security Professor Demetrius Carolina, Sr. Bus 508-Contemporary Business March 2, 2013 An online presence is vital for today’s businesses the use of internet and social networking in the workplace has grown substantially over the last few decades. Because of this, individuals are now using the internet in various ways. Technologies such as social networking sites, blog sites

Internet, Technology, Marketing and Security Essay

2378 words - 10 pages Title: Internet, technology, marketing and security Name: Course: Tutor: Date: Social media marketing is a method that has been adapted by most multinational as well as transnational companies all over the world. This method has been adapted for a number of reasons. The method can be said to be influenced by the expanding global market which has been influenced by globalization. Social media marketing entails the use of social

Assignment 4: Internet Technology, Marketing, and Security

1305 words - 6 pages Assignment 4: Internet Technology, Marketing, and Security Bus 508 – Contemporary Business Abstract Modern business depends on complex electronic information systems that require computer and internet capability to keep that information flowing. There is a problem when someone outside of that business relationship between the business and the consumer interferes, or hacks, that information flow. An entire industry has been

Security and Confidentiality on the Internet

922 words - 4 pages Security and Confidentially on the Internet Introduction The Internet provides little protection of security or confidentiality. The use of firewalls (protects both incoming and outgoing communications) and encryption can help limit the risks. I will discuss below the topics of how security and confidentially affects us in our everyday lives. Cookies Cookies provide enhancements that make the Web easier to use. Most major sites use them

Security and Privacy on the Internet

1133 words - 5 pages Security and Privacy on the Internet There are a lot of articles in the newspapers these days about databases hacked, personal information stolen, bank accounts “cleaned out”, or credit cards erroneously charged. When it comes to security and privacy on the Internet, how well does the system protect the public? Are certificate based security protocols as safe as one is lead to believe? Will modifying the Internet Explorer’s settings provide

Internet Security

1931 words - 8 pages The Business Enterprise 508 Lisa Falls December 11, 2011 Microsoft Corporation and Apple Computers, Inc. Annual Report Comparison as we all know that both of these companies have become public figures names. Both companies have many divisions, and both manage extensive assets and liabilities. In searching various internet articles both reported large amounts of income, and the matter of accounting checks and balances becomes more

Introduction to Information Security Student

1249 words - 5 pages . 2000 to present Today, the Internet brings millions of unsecured computer networks into continuous communication with each other. The security of each computers stored information is now contingent on the level of security of every other computer to which it is connected. Recent years have seen a growing awareness of the need to improve information security, as well as a realization that information security is important to national defense

Course Discription

968 words - 4 pages Read this week’s Electronic Reserve Readings. Participation Participate in class discussion. 2 Discussion Questions Respond to weekly discussion questions. 3 Learning Team Instructions Draft a 2-3 page description of the physical and network security issues and concerns at each Riordan plant. 8/19/13 5 Individual Information Security Article Evaluation Using various Internet sources, find an article or website on an information security

Computer Security In Education

330 words - 2 pages Maintaining internet security is of the utmost importance to higher education systems. The majority of universities’ administrative, financial, and clinical systems are available through a campus-wide network (Rasmussen, 2011). This means that highly confidential documents, such as student’s personal information, medical records, and much more are housed on campus servers. This information is vulnerable to security threats and puts the Lab Cnaa

608 words - 3 pages . _______________________________________________________________________________________ _______________________________________________________________________________________ Locate the Top 20 Critical Controls. The Twenty Critical Security Controls for Effective Cyber Defense listed on the SANS website are the culmination of a public-private partnership involving the Department of Defense (DoD), National Security Association, Center for Internet Security (CIS

Security Breach

1832 words - 8 pages Running Head: SECURITY BREACH Security Breach faced by Sony Corporation Introduction In the global marketplace, to attract the customers and provide relevant information to the customers, internet is used by most of firms as a promotional tool. In this, web-sites, social networking sites, etc. are used by the firms to communicate with the customers. Although, many security tools and techniques are used by the firms

Related Essays

Internet Security Essay

1019 words - 5 pages Internet Security Many of us do banking and keep personal financial records on our computers. Although it is very convenient to do most of our financial and bill paying through the internet, this useful tool can become very threatening. New means of stealing personal information and destroying all of our computer data through the network are being developed daily and spread to the public in different forms, such as viruses, worms, fake e-mails

Internet Technology, Marketing & Security Essay

1614 words - 7 pages Internet Technology, Marketing, and Security Rocheen Pearson Dr. John H. Carter Contemporary Business BUS 508 February 22, 2012 Question #1 – Describe and evaluate a major corporation’s Website in these four areas: (1) product information, (2) corporation’s contact information, (3) customization of products for customers, and (4) customer information at purchase. Product information Sony actively uses customer feedback to improve

Free Essays On Internet Security

1763 words - 8 pages Internet Security      Internet insecurity is a sufficient cause of distrust in the medium. A lack of faith in it as a viable marketplace due to this insecurity stems from three reasons. People are skeptical due to the already publicized cases of security breeches. Whether in movies, television, or magazines, many have recently become very aware of the possible danger that they face. Users and non-users may also fear that the Internet

Internet Technology, Marketing, And Security Essay

2641 words - 11 pages Assignment 4: Internet Technology, Marketing, and Security BUS 508 Name August 24, 2012 Dr. Professor Assignment 4: Internet Technology, Marketing, and Security Marketing plays a large, pertinent key in the success of a product, and/or business. Excellent marketing creates brand awareness and a call to action for the target market. Even Not-for-profit organizations such as the Red Cross and the Boys & Girls Clubs of America use