wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTERNET SECURITY

profile
Pooja Silver
Aug 25, 2022
0 Likes
0 Discussions
84 Reads

INTERNET SECURITY is mostly a seperation of computer security which is particularly associated to the internet often relating with browser security but also the network security on an extra specific level as it applies to the operating systems on a whole.

 

It's main purpose is to set up rules and procedures to use beside attacks over the internet.

 

The internet provides an insecure channel for interchanging information data leading to a high danger of interruption or fraud.

 

Various methods have been used to defend the transmission of data together with encryption and from-the-ground-up manufacturing.

 

Example: Internet security is an online system that prevents credit card numbers from being stolen on a shopping website.

 

Internet security issues:

 

Computer virus are most common problem among Internet security threats out there. Viruses enter your computer by attaching to a host file or a system. Once they enter your computer they can create damage instantly or remain dormant. The main goal of virus is to affect your computer and network systems.

 

Cyber security issues:

 

1) Phishing

 

2) Hacking

 

3) Misuse of data 

 

4) Viruses

 

5) Worm 


Comments ()


Sign in

Read Next

c

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Benefits of Yoga

Blog banner

Privacy LAWs in IT

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Dancing Classes In Mumbai

Blog banner

Odoo

Blog banner

Khau Galli – Vile Parle

Blog banner

Cache memory

Blog banner

Embedded Operating System

Blog banner

Instagram

Blog banner

Functions of Operating System

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Tableau

Blog banner

In the world of Technology...

Blog banner

Software

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Explain DBMS in Brief

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

GIS info about Bermuda Triangle

Blog banner

Steganography and Steganalysis

Blog banner

Predictive Analysis - Ek Overview

Blog banner

memory cache

Blog banner

Modern Operating Systems

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

DISK SCHEDULING

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

semaphores

Blog banner

IO Buffers

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Objectives and Functions of Operating System

Blog banner

Platonic Solids

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

The Memory Hierarchy

Blog banner

Question

Blog banner

I/O Management and Disk Scheduling

Blog banner

Making Money through Instagram

Blog banner

Service Design Model

Blog banner

Microsoft Windows Overview

Blog banner

10 Interesting Facts about Death Note

Blog banner