Preview

Cyber Security and Privacy Techniques.

Better Essays
Open Document
Open Document
1684 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security and Privacy Techniques.
Cyber Security and Privacy Techniques
Tammy Sublett
Harrison College
Cybercrime
Thomas Hart
12/05/12

In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.
CURRENT TRENDS
It is difficult to control and protect individual computer users as there are many different ideas of what the concept of privacy means in different countries. However, there are some basic activities that are considered an invasion of privacy no matter where you live in the world. Examples of these are as follows: * Collecting and analyzing user data without the user’s knowledge/consent or authorization. * Employing user data in a way other than was authorized. * Disclosing or sending user data to others without the user’s knowledge and authorization.
These things are considered don’t in cyber space, so even if there are international laws on privacy, [some countries and companies would still be likely to operate in an opprobrious way] (Subramanian, 2008). In 1991 the president of the Association for Computing Machinery showed his support for the fair information practices, which included the principles of notice, choice, access, and security, which urged all organizations to observe the rights of people they collect personal information about as well as their online activity. Later, our government asked the commerce department to assist the Federal Trade Commission to encourage organizations to place



References: Schwartz, M. J. (2012, January 17). From cyber espionage to Android malware, expect to see a greater variety and quantity of attacks than ever before. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392 Sans Technology Institute, (2011, February 23). Sec Lab: Predictions and Trends for Information, Computer and Network Security. Retrieved from http://www.sans.edu/research/security-laboratory/article/security-predict2011 Subramanian, R. (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. Hershey • New York: IRM Press.

You May Also Find These Documents Helpful

  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Jutta Joachim and Andrea Schneiker Security Dialogue 2012 43: 495 DOI: 10.1177/0967010612463488 The online version of this article can be found at: http://sdi.sagepub.com/content/43/6/495…

    • 10783 Words
    • 44 Pages
    Powerful Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nist 800-125

    • 15467 Words
    • 62 Pages

    Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2011…

    • 15467 Words
    • 62 Pages
    Powerful Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Mobile devices such as smartphones, PDAs, tablets, and netbooks have become an integral part of everyday business operations. Millions of people log into their company’s secure network on mobile devices via wireless Internet or even accessing their email, making sensitive data more susceptible to data theft and hacking. Mobile technology is advancing at such a fast pace, making it harder for IT managers to keep up with newly emerging threats. Since the smartphone emerged in the business scene, cybercrime has increased exponentially. Data security has now become the main focus for most IT managers in larger corporations.…

    • 1078 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Internet Security

    • 1945 Words
    • 8 Pages

    also make it an ideal way for someone to keep a careful watch on the user…

    • 1945 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Scada Security

    • 7324 Words
    • 30 Pages

    Abstract – Key management in SCADA (Supervisory Control And Data Acquisition) networks is a major challenge today.…

    • 7324 Words
    • 30 Pages
    Powerful Essays
  • Good Essays

    It is the overall consensus of the common people that the extent the government is monitoring us at this current time is a violation of our fundamental rights as human beings. That this surveillance of our activity is infringing upon our privacy, so in turn the founding laws that our Nation was built upon, which includes the right to privacy in our Bill of Rights, are prohibiting the government from observing our actions on the internet. Although there is an equitable point at the foundation of this argument, the extent at which our government monitors us is a necessary and integral part of our safety. At the initial start of the internet, the value in its use was not only noticed by the average citizen but also by various criminals who saw…

    • 793 Words
    • 4 Pages
    Good Essays