Internet Challenges and Issues

Page Count: 6
Length: 1489 Words

Threats from malicious code can be classified into several categories that are generally tied to the motive behind the breach. Some software threats may be designed to channel funds from one account into another (personal/professional gain) or to cover up a separate illegal or unethical act. This is data tampering, which can be harmful and costly to an organization, but which can be approached from the standpoint of preventing or controlling access to data. In addition to data tampering, threats include viruses, worms, Trojan horses, bombs, trap doors, and spoofs.

Viruses, worms, Trojan horses and bombs are designed to destroy data. A virus is a code fragment that copies itself into a larger program, thus modifying that program. Trojan horses are programs disguised as one function when in fact they are designed to destroy or copy data. Similarly, bombs can lay dormant until some time when it destroys significant amounts of data. Worms compound the damage it inflicts by spreading from one site to another. ("Technologies" 2004).

The Internet also presents the opportunity for spoofing (appearing to be someone else for personal or professional gain), phishing (using fake e-mail to solicit personal information) and denial-of-service attacks that bring down companies' Web sites (Salkever, 2003).


The regulatory issues confronting companies doing business on the Internet are widespread. There are reg

Read the full essay by joining our writing community - over 32,000 professional essays and term papers. Access this essay now!

Category: Science - I

Some common topics found in the essays are:

INTERNET Threats, INTERNET Companies, CHALLENGES INTERNET, SDLC Programmers, ISSUES INTERNET, Cycle SDLC, Crowley Aviza, Barnes Noble, Massachusetts California, Wish List, regulations regarding, expectation privacy,  the, 21 january 2006, 21 january, retrieved 21, trojan horses, january 2006, life cycle, kay 2002, system development life, development life cycle, retrieved 21 january, system development, employees expectation privacy,

Click Here to Get Instant Access to over 32,000 Professionally Written Papers!!!