Internet and E-Mail Security Research Paper by cee-cee

Internet and E-Mail Security
This paper discusses that the area of computer and Internet security is one of a continual ratcheting up on the side of government and software developers in response to accentuated and growing threats.
# 107115 | 3,100 words | 9 sources | APA | 2008 | US

$19.95 Buy and instantly download this paper now


In this article, the writer notes that the Internet's growth and adoption continues to completely transform business models and permanently change how both people and organizations communicate, transact, serve and collaborate with one another. The writer points out that as the Internet has now become a platform that enables electronic commerce, there has been an exponential rise in all forms of security breaches and theft of both data and funds over the Internet. The writer discusses that the continual ratcheting up in terms of sophistication and expertise on the criminal side of this equation demands greater and greater focus from many global government agencies globally and a concerted strategy of cooperation between the worlds' leading companies in software, Internet and electronics communications security.

Table of Contents:
A Brief History of Internet and E-mail Security
Vulnerability of Systems
Hackers: Who They Are and Why They Do It
Analysis of Security Concerns
Drive-by Downloads
Trojan Viruses
Identify Theft
Credit Card Security
Dangerous Locations on the Internet
Origination of Security Problems
Protection Strategies
Spyware Removers
Internet Company Strategies for Protection
Solutions to Internet Security Challenges
Summary and Conclusions

Sample of Sources Used:

  • CERT, 2007 - Carnegie Mellon Certification Center for Security (CERT). Accessed June 6, 2007 from location:
  • Credit Card Security (2006) - Credit Card Security Rules Get An Update. May 15, 2006. Accessed June 6, 2007 from location:
  • MalWare (2007) - 2007 Security Threats on the Rise. Mike Paquette. E-Commerce Times website. NewsFactor Group. Accessed June 6, 2007 from location:
  • O'Rielly (2007) - Hardware versus Software Firewalls. O' Technical Publishing. Chris Swartz and Randy Rosel. Accessed June 6, 2007 from location:
  • Phishing (2007) - The Fight Against Phishing: 44 Ways to Protect Yourself.

Cite this Research Paper:

APA Format

Internet and E-Mail Security (2008, August 20) Retrieved April 12, 2024, from

MLA Format

"Internet and E-Mail Security" 20 August 2008. Web. 12 April. 2024. <>