Preview

Unit 7 Privacy Risks And Protection Mechanisms Research Paper

Good Essays
Open Document
Open Document
769 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 Privacy Risks And Protection Mechanisms Research Paper
Security risks and protection mechanisms
Hacking
What it is:
Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.
How to avoid it:
In order to prevent this, websites could set up web application firewalls or encode their data by adding in special characters only they would know of. For example, in order to avoid being hacked on Facebook, a person could change their password to a password that is hard to guess or set up a firewall to avoid being hacked. When creating or changing a password for Facebook, Gmail, Twitter or any other social networking site, it makes sure the password is
…show more content…
Once data is corrupted, it affects the performance of the computer because the computer is unable to load the data and the user is unable to use it. In the worst case scenario, the whole computer can become corrupted depending on how large a virus there is.
How to avoid it:
To avoid this, users have to avoid untrusted websites and make sure to scan small attachments before opening them. Simply, reliable and trusted programs must be downloaded which are anti-virus and anti-spyware programs in order to prevent viruses. Also, users must install programs which scan a computer to detect viruses.

Identity Theft
What it is:
Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. What is identity theft? (0.5 points)-a form of steeling someones identity using their credit cards accesing their personal information…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    P3 and D1 Assignment 1

    • 1224 Words
    • 3 Pages

    Anti-virus software can improve the performance of a computer system for it protects it from potential threats to it and be able to block them. Some viruses can remove and destroy data and therefore slow down or shut down a computer. The computer will be able to work better with the software protecting it from attacks.…

    • 1224 Words
    • 3 Pages
    Good Essays
  • Good Essays

    "Identity theft is the unauthorized use or attempted use of an existing credit or debit card, bank account, telephone account, online account, or insurance account; the unauthorized use or attempted use of another person’s information to open such an account, secure a loan, or commit another crime; or the misuse of another person’s information for a fraudulent purpose" (Conklin, 2013, p. 58). The techniques performed by offenders to achieve identity theft can be very strategic, focusing on naiveness of focal groups. One example is where offenders impersonate government officials and ask for personal information with threats of losing benefits by not submitting. Due to this, the most appropriate theory that applies is rational choice theory.…

    • 258 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Courts

    • 350 Words
    • 2 Pages

    1ST SLIDE: Identity theft starts with the misuse of a person's personally identifying information, such as name and Social Security number, credit card numbers or other financial account information. For identity thieves, this information is as good as gold.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Viruses, worms, and Trojans are malicious programs which enter to your computer without your permission and knowing that can cause damage, information losses, and privacies leak to your computer. They can also slow down the Internet connections, and they might even use your computer to spread themselves to your friends, family, co-workers, and the rest of the internet.…

    • 1274 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Malicious software called malware such as viruses, worms, Trojan horses, and spyware can all cause security breaches within an organization as well as towards its clients. “Internet security firm Symantec reported in 2011 that it had detected 286 million new and unique threats from malicious software in 2010, or about nine per second, up from 240 million in 2009.” A computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. Worms are independent computer programs that copy themselves from one computer to other computers over a network. Worms destroy data and programs as well as disrupt or even halt the operation of computer networks. The Trojan horse is not itself a virus because it does not replicate, but it is often a way for viruses or other malicious code to be introduced into a computer system. The Trojan horse appears to be nonthreatening but then does something other than expected. (K. Laudon, J. Laudon, 2013, p. 226-227) Security breaches can also occur from hackers or even from unsecured laptop computers and workstations, password hacked or revealed, improper storing of documents and files and unsecured disposal.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Better Essays

    From the computer stand point, a hacker is a person who wants “ to gain access to a computer illegally.” (Webster Dictionary). But that is only one part of the definition, but this is the definition most people associate hacking with. The other part of the definition is “to write computer programs for enjoyment.“ (Webster Dictionary). Most just classify these kinds of people as programmers, but truly, if you can make a program, you are a basic at hacking. That’s one reason why not all hacking is bad.…

    • 1908 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Internet identity theft is different from common identity theft in a few ways. Common identity theft takes place after something is physically stolen like a wallet or a purse containing credit cards, driver’s license or a credit card statement from an individual’s or business trash can. These days it is common procedure for the credit card companies to monitor card activity and if they see something unusual the customer will be notified and the credit card will be frozen from further use. The credit card will be active once it is established the card holder was aware of the purchases.…

    • 873 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Computer Viruses of Today

    • 3397 Words
    • 14 Pages

    A well-written malicious virus could halt production in companies. It could also make the stock market crashing in the course of an hour, or could make to make millions of innocent internet users be helpless as their Internet providers struggle with intensive system overloads from cleverly created viruses.…

    • 3397 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.…

    • 4036 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Effect of Computer Virus

    • 2000 Words
    • 8 Pages

    Computer virus is a software program written with malicious intentions. There are number of computer viruses that can impede the functioning of your computer system. Let us find out the different types of computer viruses.…

    • 2000 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Hacking is a illegal break into computer and network systems, according to the negative meaning of the term popularized by the mass media. However, the term is also found in the jargon of at least three major hacker subcultures that are characterized by their distinct historical origin and development and that are centered around different, but partially overlapping, aspects of computers (with different ideas about who may legitimately be called a hacker, see hacker definition controversy). In computer security, which the mass media refer to, it is someone who focuses on security mechanisms. Parts of this subculture see their aim in correcting security problems and hence use the word in a positive sense. This use is contrasted by the different understanding of the word as a person who, in a broad sense, adheres to a spirit of playful cleverness and, in a more specific sense, loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware.…

    • 1778 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Identity theft: Theft of personal Information (social security id, driver’s license or credit card numbers) to impersonate someone else…

    • 2004 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Hacking: Using a computer to gain unauthorized access to data in a system (malicious intent). Exp: Nokia hacked by Kevin Mitnick, hacking into email accounts…

    • 1299 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Hacking

    • 1006 Words
    • 5 Pages

    Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.…

    • 1006 Words
    • 5 Pages
    Good Essays