Sign In
Not register? Register Now!
You are here: HomeCourseworkTechnology
Pages:
6 pages/≈1650 words
Sources:
Level:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 38.88
Topic:

Online banking (Coursework Sample)

Instructions:

6 pages 2 sources Deadline: 12hours paper Detail Instructions You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing network to connect to the Internet and to perform some online banking. Describe the steps you plan to go through to ensure this system remains as secure as possible. Be sure to discuss the details of firewall settings you plan to implement within your operating system, browser privacy settings, and recommended software (e.g., Anti-virus and others) you will install. Also, describe your password strength policy you plan to adopt, and what you envision to do to ensure your online banking site is encrypted and using the proper certificates. Discussion of operating system patches and application updates should also be included. As you discuss these steps, be sure to justify your decisions bringing in possible issues if these steps are not followed. You can discuss this for a specific type of computer (e.g. MAC or PC) to make the scenario more appropriate for your environment. Your son, who just turned 13, wants to join Facebook and post his picture and contact information on the site. Assuming, you are willing to allow him to have a Facebook account, describe what types of guidelines you would discuss with him to ensure his privacy and security are protected. Be sure to justify your decisions by describing possible issues if your guidelines are not followed. Prepare a well-written paper, no more than 10 pages in length, addressing each of the above scenarios. Be sure to clearly separate the scenarios into separate sections of the paper. Only one paper is needed to address both scenarios. Submission requirements: Your completed assignment should be saved as a Word document and submitted to your LEO assignments area no later than the due date listed in the syllabus. Your document should be neat, well-written with minimal grammatical and spelling errors. Your name should be clearly listed on the first page along with the class/section, professor and due date. Your document should contain page numbers at the bottom of each page. Single or double space line formatting is acceptable.

source..
Content:
Online banking
Insert Name
Subject
Date
Institution
Technology has evolved so fast allowing people to go online to transact many characteristics of their lives. The challenges that people face is ensuring that security features are in place to safeguard information of the individual and their privacy. Online activities are available on personal computers, laptops, smartphone and some portable devices the protection tools are evolving continuously. The internet users want to remain secret online and most people think it is impossible to be completely unidentified. Hackers have become more informed and have been be able to access some users' accounts stealing information and defrauding them. The devices that are portable can provide access to secure, convenient authorization of e-banking, retail payment, brokerage and other transactions (Herzberg, 2003).
The threat to the user online on the computer is real and once a user is provided a link by the internet services provider the computer acquires a unique address that criminals can use to access it. The Internet address has four sets and it enables uses to send and access information. Internet address can be dynamic or static depending on the service by the provider. Although the Internet address does not provide details concerning the user information but the Internet service provider has this information which can be a loophole in protection of once privacy. The policies of retaining the addresses of an individual by a service provider are not clear and this poses threats to individuals. The Internet address can be able to identify the location geographically and its correctness will depend on how the service provider assigns those addresses. There are tools that enable users to block their internet addresses and this are services such as Tor that effectively hides the information. The use of Virtual Private Network can replace ones internet address with that of the VPN service provider.
The computer has windows 7 and security programs that include an antivirus, a firewall and the protection of the identity. The windows operating system has a free basic firewall and virus protection and there is a need to purchase software that is more secure. There are several companies selling security software that includes brands such as Kaspersky, McAfee, Norton, AVG and the user is spoilt with many choices. The software can be used alone or combined. The computer that has the anti-virus loaded can be secure in undertaking online activities including banking. The options of anti-virus are available in a computer vendor or by using Google to get the details. The machine will use Kaspersky Internet security 2014. The software provides the security on threats from malware and internet criminals trying to steal information and currency. The computer and its data contents are protected by an anti-malware, internet, identity protection, anti-phishing that avoids criminals from acquiring personal information and an advanced parental control that protects children from predators in the Internet.
Internet browsing when not secured can provide information to criminals by providing the internet address to the site operators. When a user access sites several companies are able to get details of the user by using refined tools. The browser in use explorer 8 allows changes to be made on its settings by accessing the internet options and accessing the security and privacy tabs to control cookies and improve the features concerning access. The do not track option is available in the internet explorer and it is changed by accessing the settings and then the privacy tab and under tracking protection or add tracking protection lists. The gallery of the internet explorer has a protection list and adds the list for installation.
Online access by users often requires navigation of the internet by search engines. The different search engines have the capacity to track the individuals' searches by using internet address, the terms of search and time and information. It is always important to review the privacy policy of the search engine. The search strings unintentionally reveal information and the retention of this will show that the record is in the engine. Some search engines start pages do not keep the internet addresses of users such as lxquick and this is because the retention means breaching of the users privacy. The start page deletes all information of identification from the inquiry and sends it to Google. The start page uses innovative encrypting skill for the search inquiries. DuckDuckGo does not collect information of the online users. It is not advisable to use the same search engine as well as an email account. The use of a search engine as Yahoo as for individuals account and Google as search engine will minimize personal information on retention. The users can ensure that they log out of the email accounts and clearing cookies from their browsers before proceeding to other searches.
Users are discouraged from downloading Search engines toolbars this can allow data on the behavior of an individual web browsing especially the free software. The search engine Google collects data from Gmail, and YouTube about an individual the automatic signing in should be disabled and cookies and cache cleared. Cookies are stored from sites visited by users in their hard disk. The information is kept by the browser and whenever a user access the internet it returns to the site and this can include login credentials and inclinations of the user and shopping information online. Some legitimate sites use cookies to give offers to users on their products and other use the cookies to provide information of user to other third parties. There are tools for browsing that scans sites for trackers and allows users to learn about companies and on configuration stop tracking. Companies are embracing fingerprinting because they are difficult to block. The online user can check their browsers uniqueness by visiting sites like Panopticlick. The finger tracking can be avoided by disabling JavaScript on users' computer.
The firewall is used on internet and can be software or hardware and scans the data from the internet or network and permitting it to pass or block. The hackers and malicious software can be blocked by the firewall according to settings made. The windows firewall is turned on and when a user accesses information the system asks the user if they can block or unblock a connection. The firewall inhibits user personal information that includes passwords, bank details and other information from thieves from the internet.
Operating system requires updates to work optimally. The patches are done from the suppliers or the update features available on the software. The visiting of the windows update sites will allow for regular patches. The security gaps in software can be found when there are regular checks on patches. The automatic tools for updating can be used to ensure patches are downloaded every time while accessing the network. The user will need to have current, patched and new version of the search engine that will provide more security.
The conveniences accompanied with online banking that allows users to check their balances, transfer of funds from account to another, payment of bills and other transactions. The information when accessed online can provide information that can be used by cybercriminals to defraud a user. The banking sector that provides the information has incorporated passwords and encrypting tools to secure users information. The password in use should not be the same as any other for accessing information on a website. Passwords should be solid and cannot be conjectured by any person. The secure access of online transactions requires a user to request for information from a trusted server that authentication of the user. (Sixtus, 1999)

Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Blog Questions: Internet use in my family
    Description: Blog Questions: Internet use in my family Technology Coursework...
    6 pages/≈1650 words| APA | Technology | Coursework |
  • Correctional Counseling
    Description: Correctional Counseling Technology Coursework Undergraduate level...
    2 pages/≈550 words| APA | Technology | Coursework |
  • Renewable energy
    Description: Renewable energy Technology Coursework Undergraduate level...
    3 pages/≈825 words| APA | Technology | Coursework |
Need a Custom Essay Written?
First time 15% Discount!