Bottom of Form
One major issue related to holding computers hostage would be privacy. That someone can collect and the use or misuse an individual’s personal data, which is amassed and stored in a computer system, should be troubling to everyone. Consumers feel that they should not have to divulge their personal information unless absolutely necessary. When they do share their personal information they feel it should be treated with the utmost confidentially. This makes someone basically blackmailing you to get back what already belongs to you in the first place morally and ethically appalling. Another problem with someone holding your computer for ransom is accuracy. These unscrupulous hackers can change and manipulate your information. This can be detrimental to your credit scores when you want to purchase something. You can be denied credit because of the inaccurate data. Most people rely on their computers to function effectively and efficiently in their daily lives. Take that away and most people would not be able to function.
One important method that computer users can use to prevent this type of attack is to always install security updates whenever they are available for your operating system. Crackers are always developing new programs to access your data and cause harm to your computer. By not installing these updates you leave your computer open to outsiders hacking into them. The developers of your system are always trying to stay one step ahead of them by keeping up with the latest bugs and viruses. So they will routinely release updates to fix any security issues as they are detected. Users should take the time to install these updates on continuous bases in order to keep their computers and their information as safe as possible. Of course one of the most important ways a user can keep their computer safe is to invest in a good virus protection program. Users should never make it a habit of visiting sites that
References: Banerjee, Indrajit. (n.d). Ten Common Methods Hackers Use to Breach Your Existing Security by Sysnetaadmin.co.nr. Retrieved fromhttp://www.scribd.com/doc/2336445/common-hacking-methods Reinhart, Christopher. (2012). Penalties for Computer Hacking. Retrieved from http://www.cga.ct.gov/2012/rpt/2012-R-0254.htm