Research Proposal On Internet Security

Read Complete Research Material


Research proposal on Internet Security

Research proposal on Internet Security

Chapter 1: Introduction


This research focuses on the various aspects of Internet Security and comprises of the following chapters:


Literature Review

Proposed Methodology


This study highlights many issues related to Internet Security and gives a broad analysis of Internet crimes.

The Internet is a global, publicly accessible hub of millions of interconnected networks forming the backbone of the information superhighway. However, this interconnection creates a gateway of vulnerability for security breaches and is the crux of the Internet's dark side. Exposing a business to the outside world increases the opportunity for security breaches. Internet security must be addressed as part of the overall security policy. The level of security required for Internet exploitation should not be left to the IT Manager to retro-fit after the business strategy has been defined. Internet security must be an inherent part of the overall business plan.

Before the Internet, information was distributed between local area network workstations sharing a common communications line. Connected workstations shared the application and data resources of a server within a small geographic area (e.g., an office building). Only those workstations sharing the common communications line could access the server. Introducing the Internet exposes the server to millions of networks and users, many with less than honorable intentions. Just as Internet use has continued to increase, so too have attacks launched through the Internet.

The Internet has opened the door for malicious attacks to be unleashed on any computer connected to it. Viruses, worms, Trojan Horses, spyware, and a host of other destructive software can attack Internet-connected computers on a regular basis and cause widespread harm. Without implementing security precautions, Internet attacks can go unnoticed. There appears to be no end in sight for such attacks.

Early Internet deployment treated security as a low priority. Many of the problems that plague e-mail on the Internet today are the result of this early lack of security. Early computing approaches relied on security that was built into the physical environment of the data center that housed the computers. As networked computers became dominant, physically security was lost and the stored information became more exposed to security threats (Whitman & Mattord, 2004).

Aims and Objectives

Aim of this research paper is to discuss the impact of the internet has had on information technologies, the ramifications associated with the internet and the effects that the introduction of the internet has had on an organization's security. Once these areas have been discussed the paper will also present solutions to those problems and discuss how the solution will achieve their goals.

Significance of the Study

This study is significant in many contexts. The study identifies many aspects of Internet security.

Research Questions

What are the major issues of internet security?

Why Personal security is an important issue that needs to be dealt with but business security is also a major concern.

How we can protect our computer systems?

Chapter 2: Literature Review

Over the years, the internet has changed the way people interact with their daily lives ...
Related Ads