StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Internet Use in Schools and Security Issues - Article Example

Cite this document
Summary
The paper "Internet Use in Schools and Security Issues" explains the effects cyber crimes are having on the economy as well showing the responses that are being taken by governments and organizations. It identifies how current legislation in place is out of date in the fight against cybercrime…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful

Extract of sample "Internet Use in Schools and Security Issues"

Download file to see previous pages

The paper using real-life examples illustrates how this is failing against modern-day technology that is constantly being manipulated by cybercriminals. In addition, it demonstrates various types of cyber crimes in both private and public schools and what the local education authority is doing about them.

The internet is evolving at a very fast rate. As this happens, the number of threats affecting internet users is also evolving. These threats affect every internet user regardless of their level of operation. With cyber security events having evolved from Morris worm to slammer worm in 2003, the concern now is identifying and addressing security affecting internet users. There is fear that even criminals such as terrorist attackers are now engaging in cybercrime. The effects of this form of crime are worse than any other crime that existed in the past. For instance, Slammer Worm spread so fast, and in a span of 10 minutes, it affected a total of 90% of the vulnerable hosts. The issue is not generally security issues involved in the use of the internet, but the security issues with regard to emerging reliance on the internet in every level of operation from government offices and large organizations to schools and individual levels to perform virtually almost every task earlier done manually.

Productivity and maximum benefits for internet users will only be achieved if the security issues are kept at bay. This means that different organizations, government bodies, and researchers must improve their efforts in conducting research to identify and address emerging security issues. According to the findings, an integral factor in addressing this is investing in research and training to improve skills in internet use and related security issues.

Several types of research have been conducted with the aim of identifying security issues in internet use and identifying the changing trends of cybercrime. For instance, (Anderson 2001) identifies hacking as a major security issue while Roger (1999) identified an attack on a major company occurring every month. Research by Cranor et al (2002) also identified that tools such as SATAN are used to access computers without the knowledge of their owners. Once an attacker accesses the computer, he or she is in a position to scan the file system thus accessing personal information. Despite the fact that a lot has been researched with regard to security issues, cybercrime, and internet use, very little has been done on the effectiveness of methods applied by various organizations to address such security issues. In addition, very little has been done on the security issues and internet needs of stakeholders in learning institutions such as teachers and students. The lack of such relevant information makes it hard to understand the hindrances to effective internet use in schools.

This research was therefore aimed at identifying the internet needs of students and teachers, security issues, and the effectiveness of the local education authority in addressing them. In addition, it sought to understand if success has been achieved by different organizations in controlling cybercrime. This was achieved through the use of four schools as case studies. Primary data was collected from these schools and the local education authority through interviews, questionnaires, and group discussions. 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Extra Pages For Order 375216 Example | Topics and Well Written Essays - 16278 words, n.d.)
Extra Pages For Order 375216 Example | Topics and Well Written Essays - 16278 words. https://studentshare.org/logic-programming/2045820-extra-pages-for-order-375216
(Extra Pages For Order 375216 Example | Topics and Well Written Essays - 16278 Words)
Extra Pages For Order 375216 Example | Topics and Well Written Essays - 16278 Words. https://studentshare.org/logic-programming/2045820-extra-pages-for-order-375216.
“Extra Pages For Order 375216 Example | Topics and Well Written Essays - 16278 Words”. https://studentshare.org/logic-programming/2045820-extra-pages-for-order-375216.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internet Use in Schools and Security Issues

Homeland Security - The New Town High School

The school principal has a good knowledge of security issues that the school faces, and takes part in the formulation of policies that are instituted to address the issues.... The paper "Homeland security - The New Town High School" examines the school in Baltimore County, MD that offers grades 9-12.... For these reasons, any security threat to the school is also a threat to our community; hence it is our responsibility to oversee the security of the school ...
10 Pages (2500 words) Assignment

THE LEGAL ISSUE IN NETWORK SECURITY USA

THE LEGAL ISSUE IN NETWORK SECURITY USA Abstract The paper discusses the legal issues which plague network security in the US.... There are many issues that US legal system face when dealing with the computer based crimes as they are bound in one or the other ways.... This has made the criminals get a chance to misuse the available resource and be safe from legal issues.... Legal issues in Network Security 6 4.... To keep themselves safe and make things go as expected, it is important to have security of different level....
3 Pages (750 words) Essay

Personal Security and The Internet

As compared to two decades ago, today the world faces unique security and privacy issues that were not there before the introduction of the internet.... With the internet, almost all aspects of operations including business, security and communication have gone immense revolutions.... The result is that people have developed some behaviors that are detrimental to the security and privacy of the internet users worldwide (Gralla, 2006).... Apparently, the internet has several applications such as data compilation, use of tracking and other techniques....
12 Pages (3000 words) Research Paper

The Impacts of Mobile Devices on Cyber Security

The study 'The Impacts of Mobile Devices on Cyber security' aims at finding out the impacts of mobile devices such as smartphones, tablets, and iPads, on cybersecurity.... Gaoyue (2013), the senior colonel of Nautilus Institute for security and sustainability, argues that the common uses of the internet include purchasing items in online stores, downloading music, sharing information on social media platforms such as Facebook, Twitter, and LinkedIn, paying electricity and water bills, and accessing television networks....
8 Pages (2000 words) Assignment

How to Improve Security in the Department of Education for Children with Disabilities

The paper "How to Improve security in the Department of Education for Children with Disabilities" is about security concerns in the NYC Department of Education.... There have been many activities going on within schools aimed at restructuring the security system to curb such occurrences including formulating policies on reporting emergencies.... This memo analyzes chancellor policy A-412, which sets forth the responsibilities of staff for maintaining security and safety in the schools....
11 Pages (2750 words) Article

The Language and Use of Acceptable Usage Policy

The paper "The Language and use of Acceptable Usage Policy " describes that despite having positive usage purposes, it has been observed that detection of abuse has remained a daunting task for investigators as the Internet has no international boundary separating one country from another.... Detection and prevention of hacking and other cybercrimes can be controlled through the effective use and implementation of AUPs.... The main usage objectives of AUPs include the detection of abuse, liability protection, and appropriate use of technology....
7 Pages (1750 words) Essay

Designing Networks in Waxlow Private School

The inbound communication of staff for the Waxlow Private schools (WPS) will be conducted by the school's internet.... axlow Private schools (WPS) decided to implement a new network.... The network will use the latest technology in terms of both hardware and software.... This paper, Designing Networks in Waxlow Private School, declares that the internet is the fastest rising technology and has produced endless opportunities....
28 Pages (7000 words) Research Paper

SWOT Analysis of Internet Security

The paper "SWOT Analysis of Internet Security" focuses on the benefits of the Internet for humans and corporations, but the issues of virtual communication security are becoming important because advancement in technology has been used by terrorists and hackers for their destructive missions.... remedy will be attained by the proper establishment of internet security, which forms the discussion topic in this paper.... Analysis of internet security will be done in terms of its strengths, weaknesses, application opportunities and threats faced....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us