Passwords and Their Role in the Internet Security

Introduction

Passwords are essential tools in enhancing internet security especially when they are safely configured and meticulously used (Vacca, 2007). Although internet users habitually create passwords from automated tools and other features of interest like birth dates and phone numbers, it is imperative to note that internet security technologies are often compromised when users are unable to keep their passwords safe from intruders. For instance, some users may deliberately or accidentally leave their passwords openly displayed on monitors, notepads or storing them in mobile phones where hackers can easily access them (Vacca, 2007). On the same note, people often compromise both intranet and internet security when they create passwords that can be easily remembered. Hence, the ease with which such passwords can be guessed makes it easier for intruders are easy to access their privacy. Contrastingly, complicated passwords are hard to memorize. Of late, major websites have become victims of being compromised due to a lack of security (Speed & Ellis, 2001). However, there are several measures that can be taken to overcome such risks.

Challenges in Internet security

It is certain that there are myriad challenges facing overall IT security. Some of the problems associated with security include network availability, users’ integrity as well as confidentiality (Speed & Ellis, 2001). In most cases, the use of passwords has significantly minimized threat levels, especially those attached to users’ confidentiality. Passwords ensure that only authentic users alone can have access to personal data. Moreover, when intruders compromise users’ information, they may ruin their integrity (Shoniregun, 2005). Through advanced technical solutions, it is not possible to access, alter or distort their data. In line with this, compromised attacks deny individuals access to data due to loss of network. This occurs when routing protocols of stored data have been distorted thereby interfering with the smooth flow of information. This problem can only be solved by the use of technical solutions.

Password management

Meanwhile, password and patch management are problematic especially when users are compelled to do certain things. In most firms, password management has proved to be problematic (Shoniregun, 2005). Poor management of patches creates more complications in terms of security vulnerability and usability of social sites. As such, web users do not want to apply effective security measures as they wait for attacks to occur. Moreover, the majority of users fail to evaluate their needs for the internet in order to prevent associated risks. In this case, password management literature is also applicable in the case of patches. Patch as software should be effectively installed and managed by the users to enhance that organizational sites are not prone to attacks (Shoniregun, 2005). Although the majority of users fear installation cost, it is less expensive to manage passwords well than overcoming consequences associated with attacks or hacking activities.

Risk management

In spite of potential damages associated with poor password management, it is still possible to effectively factor out and manage risks associated with unauthorized access to personal data (Speed & Ellis, 2001). Several factors are said to increase risks to users’ security. These include the use of similar passwords, accessing unfamiliar sites and failure to log out from individual sites on the web. Therefore, internet users should avoid using similar, same or common passwords. Additionally, there are websites that require passwords in order to access. Web users need to take caution since not all sites are trustworthy. In connection to that, popping up to messages in social networks that require private details should be avoided. Moreover, users should purchase goods through the internet only through sites that are recommended to be safe. For instance, it is crucial to note that sites whose URLs start with HTTP are believed to be safer.

Additionally, as web users surf the internet, they at times venture to new sites (Speed & Ellis, 2001). It is recommended that users should avoid leaving their details on unfamiliar sites. In connection to this, it is a common practice for some individuals to leave sites without signing out. This gives intruders the opportunity to peruse their confidential information. Therefore, it is highly recommended that web users should log out before turning off their computer devices (Speed & Ellis, 2001). Moreover, they should shut them down and stick to ones they are familiar with. In the case of private websites, say within a company, it is important to train workers on how to access various sites. Security policies enable workers to know how to test networks or safely surf internet sites without compromising on security details. On the same note, establishing security audits assists in tracing potential attackers. Most developed economies have adopted such measures to ensure optimum safety to their internet users (Vacca, 2007)

Conclusion

In summing up, it is apparent that as the popularity of using social sites continues to grow, security threats to internet users is proportionally growing and pose a challenge to web owners and users. There are quite a number of web users who deliberately keep off from using internet technology for fear that their security might not be guaranteed. However, such fears may be eliminated by adopting up-to-date password management strategies, especially when visiting online sites.

References

Shoniregun, A. (2005). Impacts and risk assessment of technology for Internet security: enabled Information small-medium enterprises (TEISMES). Essex: Springer

Speed, T. & Ellis, J. (2001).The internet security guidebook: from planning to deployment. California: Academic Press.

Vacca, R. (2007).Practical Internet security. New York: Springer Publishing, Inc.

Cite this paper

Select style

Reference

StudyCorgi. (2022, September 1). Passwords and Their Role in the Internet Security. https://studycorgi.com/passwords-and-their-role-in-the-internet-security/

Work Cited

"Passwords and Their Role in the Internet Security." StudyCorgi, 1 Sept. 2022, studycorgi.com/passwords-and-their-role-in-the-internet-security/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Passwords and Their Role in the Internet Security'. 1 September.

1. StudyCorgi. "Passwords and Their Role in the Internet Security." September 1, 2022. https://studycorgi.com/passwords-and-their-role-in-the-internet-security/.


Bibliography


StudyCorgi. "Passwords and Their Role in the Internet Security." September 1, 2022. https://studycorgi.com/passwords-and-their-role-in-the-internet-security/.

References

StudyCorgi. 2022. "Passwords and Their Role in the Internet Security." September 1, 2022. https://studycorgi.com/passwords-and-their-role-in-the-internet-security/.

This paper, “Passwords and Their Role in the Internet Security”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.