wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTERNET SECURITY

profile
Pooja Silver
Aug 25, 2022
0 Likes
0 Discussions
84 Reads

INTERNET SECURITY is mostly a seperation of computer security which is particularly associated to the internet often relating with browser security but also the network security on an extra specific level as it applies to the operating systems on a whole.

 

It's main purpose is to set up rules and procedures to use beside attacks over the internet.

 

The internet provides an insecure channel for interchanging information data leading to a high danger of interruption or fraud.

 

Various methods have been used to defend the transmission of data together with encryption and from-the-ground-up manufacturing.

 

Example: Internet security is an online system that prevents credit card numbers from being stolen on a shopping website.

 

Internet security issues:

 

Computer virus are most common problem among Internet security threats out there. Viruses enter your computer by attaching to a host file or a system. Once they enter your computer they can create damage instantly or remain dormant. The main goal of virus is to affect your computer and network systems.

 

Cyber security issues:

 

1) Phishing

 

2) Hacking

 

3) Misuse of data 

 

4) Viruses

 

5) Worm 


Comments ()


Sign in

Read Next

City of Mumbai (Bombay):

Blog banner

Blog on health and fitness

Blog banner

Critical success factors

Blog banner

Answer

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Virtual Machine

Blog banner

Functions of operating system

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Operating Systems

Blog banner

How to use GIT & GITHUB

Blog banner

UniProcessor Scheduling

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Is It Too Late to Straighten My Teeth as an Adult?

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Traditional Unix System

Blog banner

c

Blog banner

Threads

Blog banner

Concept and definition of m-commerce

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Hey Aryan here

Blog banner

GIS in Disaster Management

Blog banner

Instagram

Blog banner

INTERNET

Blog banner

BITCOIN WALLET

Blog banner

NETWORK SECURITY RISKS

Blog banner

Puri Jagannath temple

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

What is Amazon?

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Deadlock in operating system

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Mumbai

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

INSTAGRAM

Blog banner

Os assignment

Blog banner

Secure Hypertext transfer protocol

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

The Right way of cooking

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Security Issues

Blog banner