Preview

Internet Personal Security Is Not Absolute

Good Essays
Open Document
Open Document
894 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Personal Security Is Not Absolute
INTRODUCTION

Internet is the most trending and most widely used in today’s generation, either it is used for communication, used for sharing files and documents, for making new acquaintances, or just for own enjoyment. People can also use the internet when they want to socialize with others, when they want to share what’s on their mind and the on goings of their lives, when they want to know what the trending topics like news and scandals, or when they want to post some pranks or scum other people. Internet usability can either be a great help to everyone or it can impose a threat to someone or somebody. People think that when they post something online, whether it is good, bad, privately, or publicly, that information is safely sealed and secured. But the truth is, it can be freely access or easily steal from them. Hacking, viruses, trojans, and especially own self are some of the reasons that threaten internet security. Among all of these examples, hacking is on the top list. Even though there are some laws against hacking like the Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, it is not enough assurance to protect the people against hackers and it doesn’t improve the internet security. Changes need to be made in the law to increase internet security, and find and punish cyber criminals. Additional laws to stop cybercriminals and necessary, unenforceable, and could infringe upon interest users rights to privacy and the growth of the internet. The issue here is that the internet security is not that secured for users or for people to rely upon. People can hide their files thoroughly or limit the number of people who can access his or her private account but sooner or later that information will be publish and revealed publicly with or without his or her approval. There are different explanations on why this information once hidden and now visible seen by many people, but the most common reason is that “your file/ information

You May Also Find These Documents Helpful

  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    There will always be some kind of the potential risks to the information maintained by any business or person because new vulnerabilities are found every day. Just recently, on August 7, 2012, a wired magazine reporter’s information stored on his Google account, Twitter account, MacBook, iPad, and iPhone where erased without the user wanting this done. A hacker that goes by the name of Phobia comprised the reporters Amazon account with a security exploit.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    |Being online |Theft of personal data |Computer criminals can use the data to spy on or blackmail users, hijack their online accounts (including bank |…

    • 568 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    What does privacy really mean and why do people want it? It’s a fair question to ask, especially when looking at the internet, a global system that connects you to billions of people (Oxforddictionaries.com). There are endless amounts of details you can discover about a particular person on the internet. Some people enjoy the fact that they can access so much about another person with just a click of a button, while others fear it. That is why people take precautions, limiting the amount of access outsiders have to their information, however that does not always work. There are many loop holes in the terms and conditions we agree to on websites which leaves us open to the public in certain ways. There are also many ethical concerns regarding privacy on the internet.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Firstly, the number of crimes on the Internet at breakneck speed is increase in the past few years. For example, we sometimes encounter some fraud when we do some shopping on the Internet. In this case, we are doing procurement and they do not sent to the buyer, although the money has been sent to the seller. This is very difficult to track down criminals, because we have almost no criminals, who they are, what they do, even where they live we also don’t know. If we use the Internet for online shopping, our credit card number is stolen, then the money in our bank account may be used up. Using the Internet to do our personal information is not safe, especially those important document. In fact, when we surf the Web, reading e-mail, download software, even with our friends, is called a hidden program, Trojan chat, can send to our computer without our knowing. It will steal and transfer all the information that we already save. After that, this person may make use of it to others. (Nguyen Long Quoc, 2008)…

    • 834 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime in America

    • 2352 Words
    • 7 Pages

    Cyber-crime is becoming a massive problem for citizens and businesses. Every day there is a hacker that gets into a computer system and causes trouble. It’s all due to businesses and individuals being careless with their computer security. People need to start realizing this is a serious issue and can affect anybody. There are numerous steps that need to be taken in order to protect individuals and businesses security. Hackers are getting smarter and want to find new ways to infiltrate your computer system. They want to find ways to get to your files and your credit card information. Hackers find new ways to get into our computers every day and know the ins and outs of computers. These hackers have the ability to shut down a national company that specializes in computer security. There are so many terrible things that these hackers can do to your computer. We need to take the proper steps to protect ourselves and to ensure that the hackers do not harm us or our computers.…

    • 2352 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Online Security

    • 353 Words
    • 2 Pages

    You have to think about how often you give sensitive information about yourself to complete strangers. I give my social security number, credit card numbers and other personal information to total strangers constantly. Any of these people have the ability to steal my money and identity if they choose to. It is the same as on line hackers. On line hackers can do it from the comfort of their own homes and have the advantage of feeling protected because they can't be seen but the process is much more difficult than being off line. Stealing credit card and other personal information is much easier off line, no technical skill is involved.…

    • 353 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As written in the order of the congress, the Republic Act No. 10175, also known as the “Cybercrime Prevention Act of 2012” recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology to attain free, easy, and intelligible access to exchange and delivery of information and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In short, this law was proposed to give punishment for those people who have committed crimes in relation with the internet and to give justice for those people they have done wrong.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Case Study

    • 957 Words
    • 4 Pages

    According to data from Indian Computer Emergency Response Team (Cert-In), in November last year more than 800 “.in” websites and nearly 700 “.com” websites in India were defaced by miscreants. A good number of Indian sites, including a few government ones, are hacked by cyber criminals every year. This has spurred the demand for security professionals and white-hat hackers.…

    • 957 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Catergories of Computers

    • 531 Words
    • 3 Pages

    ‘’Computer crimes are on the rise and cause financial and personal damage to victims they affect. The easy accessibility of computers and the anonymous nature of the Internet have created new ways to perform illegal actions. Security measures are always being created to prevent problems is the key to prevent us from becoming a victim.’’ (Shelia Robinson)…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    sains

    • 2555 Words
    • 11 Pages

    The crimes committed against computers have been growing gradually during 21st century. This situation is started to claim attention in national capitals. The major platforms for transactions by using communication technologies in government and company infrastructure become potential victims of cyber crime. Individuals’ personal data in banks or government institutions will be revealed. However, existing laws are still unenforceable against the crimes.…

    • 2555 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Another downside of using the Internet is the security. Most of online-community force people to register with true profile to be a user if they want to interact with others. Then, their account will be put at a high risk of being hacked by hackers from any place in the world. Annually, a huge number of people are being exploited or even stolen the private information to benefit the hackers.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays