Types of Internet Security Threats

Types of Internet Security Threats
Coming up next: Cyber Threats: Definition & Types

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
 Replay
Your next lesson will play in 10 seconds
  • 0:03 What Is Security?
  • 0:40 What Is Internet Security?
  • 1:07 What Is Threatened?
  • 2:49 Common Internet…
  • 8:29 Lesson Summary
Add to Add to Add to

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Log in or Sign up

Timeline
Autoplay
Autoplay
Speed

Recommended Lessons and Courses for You

Lesson Transcript
Instructor: Kent Beckert

Kent is an adjunct faculty member for the College of Business at Embry-Riddle Aeronautical University and has a Master's degree in Technical Management.

In this lesson, we will define internet security, identify the information being threatened, and discuss the fourteen common internet security threats invading our networks.

What Is Security?

In the digital world, security refers to the precautionary steps taken to protect computing resources against cybercrime. In this context, the primary goal of security is to prevent hackers from gaining access to our computers and networks. Considering our daily involvement with a computer, the internet presents a formidable enemy for cyber security experts. Millions of cyberattacks occur every minute, bombarding our networks and personal computers. Therefore, an unprotected network or computer may become infected or compromised after connecting to the internet, making internet security a high priority.

What Is Internet Security?

Computer security focuses on the precautions taken to protect hardware and software components both in the private and commercial worlds. Internet security, on the other hand, focuses on preventing cyberattacks happening through the internet by concentrating on browser and network security. Internet security practices involve the use of encryption, virus protection, and malware detection, as well as the installation of firewalls and other prevention measures.

What Is Threatened?

Communications

Most, if not all, communications involving private, business, and e-commerce occur over internet channels. In many cases, the content of these communications are not protected and are often intercepted, and the contents exploited. Remember, sensitive messages or transactions should be protected at all times using proven internet security practices. Where e-commerce is concerned, data and transaction protection is of paramount importance.

Intellectual Property

Intellectual property is defined as the ownership of an individual's ideas or production. This includes artwork, music, movies, etc. and are protected by law. These laws are designed to provide protection over the unauthorized use and sale of these properties.

Media Servers

Servers are considered special targets to cyberattacks and exploitation due to software weaknesses and the type of data being stored. For example, servers, both public and private, may contain sensitive data and information of high interest to the cybercriminal. Quite often, servers are attacked by cybercriminals with the sole purpose of information gathering, information exposure, and data destruction.

Availability, Secrecy, Integrity

Specific internet security threats may prevent access to a networked computer. For example, an attack on an e-commerce website may make that website unavailable to prospective customers. Secrecy is another threat involving the capture of individual user identities and transaction codes such as account numbers, passcodes, etc. Transactions, such as an email or financial report, may be captured and its contents modified, making validity highly questionable, and the data can no longer be trusted.

Common Internet Security Threats

Here are some common internet security threats:

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account
Support