Preview

Cyber Security and Privacy Techniques.

Better Essays
Open Document
Open Document
1684 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security and Privacy Techniques.
Cyber Security and Privacy Techniques
Tammy Sublett
Harrison College
Cybercrime
Thomas Hart
12/05/12

In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.
CURRENT TRENDS
It is difficult to control and protect individual computer users as there are many different ideas of what the concept of privacy means in different countries. However, there are some basic activities that are considered an invasion of privacy no matter where you live in the world. Examples of these are as follows: * Collecting and analyzing user data without the user’s knowledge/consent or authorization. * Employing user data in a way other than was authorized. * Disclosing or sending user data to others without the user’s knowledge and authorization.
These things are considered don’t in cyber space, so even if there are international laws on privacy, [some countries and companies would still be likely to operate in an opprobrious way] (Subramanian, 2008). In 1991 the president of the Association for Computing Machinery showed his support for the fair information practices, which included the principles of notice, choice, access, and security, which urged all organizations to observe the rights of people they collect personal information about as well as their online activity. Later, our government asked the commerce department to assist the Federal Trade Commission to encourage organizations to place



References: Schwartz, M. J. (2012, January 17). From cyber espionage to Android malware, expect to see a greater variety and quantity of attacks than ever before. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392 Sans Technology Institute, (2011, February 23). Sec Lab: Predictions and Trends for Information, Computer and Network Security. Retrieved from http://www.sans.edu/research/security-laboratory/article/security-predict2011 Subramanian, R. (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. Hershey • New York: IRM Press.

You May Also Find These Documents Helpful

  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Jutta Joachim and Andrea Schneiker Security Dialogue 2012 43: 495 DOI: 10.1177/0967010612463488 The online version of this article can be found at: http://sdi.sagepub.com/content/43/6/495…

    • 10783 Words
    • 44 Pages
    Powerful Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nist 800-125

    • 15467 Words
    • 62 Pages

    Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2011…

    • 15467 Words
    • 62 Pages
    Powerful Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Privacy can be generally broken down into three categories - physical, organizational and informational (Wikipedia, the Free Encyclopedia, 2008). Possessing privacy is not just about preventing "intrusions into one's physical space or solitude” (Smith, 1994). Instead, rapid advances in technology have propelled the safeguarding of privacy to the next level.…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Mobile devices such as smartphones, PDAs, tablets, and netbooks have become an integral part of everyday business operations. Millions of people log into their company’s secure network on mobile devices via wireless Internet or even accessing their email, making sensitive data more susceptible to data theft and hacking. Mobile technology is advancing at such a fast pace, making it harder for IT managers to keep up with newly emerging threats. Since the smartphone emerged in the business scene, cybercrime has increased exponentially. Data security has now become the main focus for most IT managers in larger corporations.…

    • 1078 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Internet Security

    • 1945 Words
    • 8 Pages

    also make it an ideal way for someone to keep a careful watch on the user…

    • 1945 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Scada Security

    • 7324 Words
    • 30 Pages

    Abstract – Key management in SCADA (Supervisory Control And Data Acquisition) networks is a major challenge today.…

    • 7324 Words
    • 30 Pages
    Powerful Essays
  • Good Essays

    It is the overall consensus of the common people that the extent the government is monitoring us at this current time is a violation of our fundamental rights as human beings. That this surveillance of our activity is infringing upon our privacy, so in turn the founding laws that our Nation was built upon, which includes the right to privacy in our Bill of Rights, are prohibiting the government from observing our actions on the internet. Although there is an equitable point at the foundation of this argument, the extent at which our government monitors us is a necessary and integral part of our safety. At the initial start of the internet, the value in its use was not only noticed by the average citizen but also by various criminals who saw…

    • 793 Words
    • 4 Pages
    Good Essays