Preview

Privacy and Security

Powerful Essays
Open Document
Open Document
4774 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Privacy and Security
e
Report on Privacy and Security

Subject: ACCG822
Student name: Hui Zeng
Student ID: 42892368

Table of contents

1. Introduction 1 2. Appraise the issues raised in the article by Moglen (2013) as they affect individuals, organizations and society 2 3. Trade-off between privacy and security 5 3.1 What is privacy? 5 3.2 What is security? 5 3.3 The relationship between privacy and security 6 3.4 The important of privacy and security 7 3.5 How does internet security work to protect personal information? 8 4. The reflection on my personal experience of not using technology for half day 10 5. Conclusion and recommendations 12 5.1 Conclusion 12 5.2 Recommendations 12 References 14

1. Introduction
Today 's risk of surfing the internet has increased as a variety of threats have emerged. However; many people fail to understand the importance of internet security. A number of people do not apply or just apply the basic of security software until they realise there is a risk. Consequently, their computers are being infiltrated or infected. Some people are unaware of personal information being stolen or misused, which can present many security issues to the user. As one part of privacy, personal information has to be protected by internet users due to the many attacks that are intended to obtain your personal information for profit.
According toJanssen(2010), internet privacy means the level of privacy and security of private data, personal communications and preferences which are protected by techniques and technologies.
Internetsecurity refers to browser security, data security, identification authentication and protection of data that covering in internet, which relies on specified resources and standards(Janssen 2010).
The purpose of this report is to highlight the risk of internet privacy being breached by malicious persons, groups and organisations and how to mitigate and lessen the impact these risks present. A lot



References: Computers in Human Behavior, Volume 20, Issue 6, November 2004, pp 711–26 Individual differences in Internet usage motives Curtin, 1997, Introduction to Network Security, viewed 27 April 2013,<http://www.interhack.net/pubs/network-security> Janssen, 2010, Definition of Internet Privacy, viewed 22 Apr 2013, <http://www.techopedia.com/definition/24954/internet-privacy>. Moglen, 2013, 'Privacy and security, The tangled web we have woven ', vol56, pp.11. Stanford school of medicine, 2012, Why You Need to Secure Your Information, Viewed 23 Apr 2013, <http://med.stanford.edu/irt/security/information.html>. Thibadeau, 2002, Workshop on the Relationship between Privacy and Security, p5, para.6, viewed 24 April 2013, <http://rack1.ul.cs.cmu.edu/tw/privacy/WhitePaperPWS.PDF>.

You May Also Find These Documents Helpful

  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Privacy is perhaps one of the most personal issues in today’s society. Privacy is an intensely personal issue, and perhaps not only to the right of the individual to dress the way he or she desires, worship in any way he chooses, but also to expect that those rights be protected by the government that upholds them. At one point or another, every individual in our society has asked the question, “Is privacy in the 21st Century possible?” The answer lies in the exploration of what privacy really means, and what privacy issues society faces in today’s modern, informational, and digital age of what we call the 21st Century.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    the law of online privacy in the past twelve months [2002] have involved the government 's response to the reality…

    • 3371 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    Privacy is defined as the state of being free from public attention (Oxforddictionaries.com). Microsoft, a multinational billion dollar technology company, defines internet privacy as personal information that one provides on the internet and can only be accessed by an exclusive group (Microsoft.com). In short, personal information includes anything from first and last name, address, email, telephone number, or social security number (coppa.org). Keeping this information safe will in turn keep you safe, that is why there are some laws in place to enforce internet privacy.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    U. S. Department of Health and Human Services (2014) Health Information Privacy, Retrieved on 1/8/14 from www.hhs.gov/ocr/privacy/hipaa/understanding/training/index.html…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Privacy is something we don’t really think about. Privacy is the last thing that comes up in our minds. The Internet is easily accessed by many people and can be hacked to find out important private information about anyone. People all over the world access the Internet, and when private information is posted online one person is going to be able to view that information no matter the privacy setting a person may use. The first article that I will use is “Who Is This Man, and Why Is He Screaming?” by Rachel Kadish. This article is about the author writing an article about her cousin Noam Galai. Galai took a photo of him self and posted it on Flickr. Months later he realized that his image was being used all around the world. The second article, “Visible Man: Ethics in a World Without Secrets” by Peter Singer, is about nobody having privacy in their lives any more. Everyone knows who you are and everything about you because of technology. Individuals must be responsible and protect their own privacy and also protect he rights of other individuals, with the panopticon privacy can be managed by being able to see who is observing us and what happens in the online world; therefore we act morally without breaking rules and laws.…

    • 1222 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Yael Onn, et al., Privacy in the Digital Environment (Haifa Center of Law & Technology, Niva Elkin-Koren, Michael Birnhack, eds., 2005)…

    • 1218 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    This paper describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's systems, endangering users of the most common Web browsers, including Netscape Navigator and Microsoft Internet Explorer. In short, the attacker observes and controls everything the victim does on the Web.…

    • 2365 Words
    • 10 Pages
    Powerful Essays