The more technology brings more insecurity and risk as well. No doubt, it allows hackers to spread malicious software’s for example, malware, spyware etc. and he believes people use the internet in daily life so average person using the Internet is at constant risk from criminals and other bad people. …show more content…
The other concept he mentioned “tethered appliances” i.e. TiVos and iPhones, etc. -- that grant a measure of security by taking away the user-modifiability that is at the heart of the principle of generativity.
According to the Digital Rights Management, motivated attackers can always break trusted hardware platforms through coding and it gives them more motivation. Zittrain says, tethered appliances are a threat because they can be controlled remotely by manufacturers. The best example of this is iPhone, which tracks and erases user modifications. He thinks that appliance manufacturers can change these products after end users have bought and installed them. He says this feature of appliances creates an increased threat of intervention by …show more content…
He talked about AT&T, Comcast, Netflix and Disney with respect to net neutrality. He said, without it, the Internet will become threatened our long-term success.
In the United States, the policy approach to protecting privacy is self-regulatory where private sector freely set up a different kind of data privacy protocols. If any company break or fail to comply with these promises, the Federal Trade Commission punish the company.
A good example of Amazon Web Services which execute secure physical controls which help to stop unauthorized access to the customer content from hackers. They provide an advanced set of encryption, access, and logging features to manage user accounts and they do not access, disclose or use the customer content for any purpose without the customer’s consent unless required to comply with the law or a binding order of a government. Amazon Web Services developed a security assurance program according with global privacy and data protection system by which customers can operate their security control