Saturday, May 26, 2007

Internet Security

To survive in today’s highly competitive business environment, which is rapidly transmuting into a cyber village, businesses have to participate in the virtual world by using Internet for not only emailing and chatting but also to tap the vast e-commerce market. However, on one hand, Internet offers limitless opportunities for the entrepreneurs. On the other hand, Internet security and risk management pose monumental challenges for the corporate world today. However, countermeasures can be and must be taken in order to address the issue.
Before plunging into the sea of security issues that surround the use of Internet, let us first look into the commonly followed definition of the umbrella term Internet Security.

Defining Internet Security

Internet security as defined “is the practice of protecting and preserving private resources and information on the Internet” (Internet Security). Hence, Internet security is the fundamental to prevent breach of e-commerce clients’ trust and the resultant violation of privacy policies in order to avoid defamation of the companies’ hard earned corporate image. This leads us to the next section of our research assignment that discusses the scope of the issue under discussion.

Why Discuss Internet Security? Scope of the Problem

Information is exchanged via Internet use in the corporate world where people can communicate with each other and sell and buy products online using credit cards. Even confidential company data and many other secrets are shared via Internet. However, this paves way for security issues, which make the “circuitous route” of the information being exchanged prone to deception, unauthenticated interruption and other security risks. On the same account, Internet security has transformed into a major concern for all Internet users (Definitions of Internet Security on the web). Therefore, Internet security issues and risk management tips need to be discussed and highlighted for the benefit of the readers and the users alike.

Security-related Risks Associated with Internet Use and Management Strategies

Internet doubtless ameliorates corporate communication, “information sharing, market effectiveness and productivity” (Paliouras). Nonetheless, Internet use has often resulted in “security breaches with known or unknown undesirable consequences ranging from a crippled or hacked corporate network to a ruined reputation and costly litigation”. Consequently, content of the emails must be filtered to prevent the above mentioned organizational issues. (Paliouras).

Risk Management via Content Filtering

“Klez worm” including other viruses that can seriously damage the computer system, “junk mail”, shopping online using Internet and visiting obscene sites at the organizational cost augment security risks (Paliouras). These risks can be reduced by making sure that employees avoid using company Internet services for irrelevant tasks. However, emails are highly important for business communication and “content filtering” is the best solution to manage security risks. “Advanced text analysis is necessary to prevent users from sending sexually explicit text and racial epithets or sensitive information to unauthorized parties. Lexical analysis is one way to cut down leak of confidential information as most of these files include special words or phrases” (Paliouras). Moreover, “keyword searching and inspection” as well as “advanced image analysis” are some of the really effective weapons to reduce security risks associated with Internet use.

This is where the significance of information systems comes into play. With the aid of constructing appropriate systems and using adequate content filtering software, companies can block unnecessary and potentially harmful and insecure attachments from entering and infecting the computers.

A three-step approach inclusive of conceiving, constructing and consolidating been recommended by information systems companies in order to efficiently with security risks associated with the use of Internet (Internet security challenges). However, the extent to which Internet use is secured primarily depends upon the company’s “security awareness” (Katos). When electronically operating firms believe in cherishing their clientele’s trust and therefore make every attempt to secure their operations via security checks, secured systems and well-planned security policies, security risks tremendously plummet and the firm’s reputation improves. Also, with security awareness, firms tend to be better equipped with latest advancements in the field of information systems.

Conclusion

Hence from the above discussion it is evident that Internet security and risk management pose monumental challenges for the corporate world today. However, countermeasures can be and must be taken in order to address the issue. Those computer organizations that take help and make the most out of Information Systems are the ones that benefit the most in the long run. This is because Information systems offer a vast variety of security software, with the aid of which, organizations can reduce the risk of Internet use. Managing Internet security related risks is no long an out-of-this-word task if adequate knowledge and timely application of Information systems is made available. Therefore, to address Internet security issues, the basic knowledge of Information Systems Fundamentals is essential. Moreover, extensive research and progress is demanded in the field of information systems in order to create “new defense mechanisms”


About the author:
Tim Johnson Junior is a freelance writer, CRWA certified resume writer and career coach. Has written over 2000 articles and essays on the subject of Social Issues. Has worked for Essaymart's custom writing department from 2003 to 2005. Currently, Tim is busy helping professionals and executives optimize their careers at a certified Resume Writing firm, ResumeAid.
 
Computers Blogs - Blog Top Sites Directory of Computers/Tech Blogs