Preview

The Threat of Internet Privacy

Good Essays
Open Document
Open Document
1055 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Threat of Internet Privacy
The Threat of Internet Privacy

With the ever rising use of the internet, as well as online banking in businesses, this brings the concern that hackers and viruses may have the ability to access your private information. Recent developments in internet security have been shown to decrease and destroy nearly all internet viruses. Microsoft associates have proven that there are many ways around our man made barriers called ‘firewalls'. The question is whether or not your private information can be safe while under this protection.

Internet privacy has always been one of the most concerning subjects for you the consumer. Since the invention of the computer and the internet, there has always been someone who wanted to ‘conquer' it. We in the computer world like to call these people hackers. Due to this common threat, we as consumers have developed software to repel these hackers. These software programs are called firewalls and anti-virus scanners. Currently, there is an ongoing battle between the hacker and the hackee. Unfortunately, hackers have developed loopholes and software's of there own to work in there favor. Due to the hacker's resources, they can counteract the consumer's software, find alternate loops to the goal and access your computers vital and personal information.

One method that hackers may use to proceed on through your system is to send you a virus. A virus is a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. "A true virus cannot spread to another computer without human assistance"(Miller). These viruses can be used to cripple ones computer. An anti-virus software/firewall can only handle so much information at one time. You can obtain a virus from the internet by downloading files to your computer as well as something as simple as sending an e-mail (Gralla). When your computers software is concentrating mainly on the virus, this

You May Also Find These Documents Helpful

  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    What does privacy really mean and why do people want it? It’s a fair question to ask, especially when looking at the internet, a global system that connects you to billions of people (Oxforddictionaries.com). There are endless amounts of details you can discover about a particular person on the internet. Some people enjoy the fact that they can access so much about another person with just a click of a button, while others fear it. That is why people take precautions, limiting the amount of access outsiders have to their information, however that does not always work. There are many loop holes in the terms and conditions we agree to on websites which leaves us open to the public in certain ways. There are also many ethical concerns regarding privacy on the internet.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is something we don’t really think about. Privacy is the last thing that comes up in our minds. The Internet is easily accessed by many people and can be hacked to find out important private information about anyone. People all over the world access the Internet, and when private information is posted online one person is going to be able to view that information no matter the privacy setting a person may use. The first article that I will use is “Who Is This Man, and Why Is He Screaming?” by Rachel Kadish. This article is about the author writing an article about her cousin Noam Galai. Galai took a photo of him self and posted it on Flickr. Months later he realized that his image was being used all around the world. The second article, “Visible Man: Ethics in a World Without Secrets” by Peter Singer, is about nobody having privacy in their lives any more. Everyone knows who you are and everything about you because of technology. Individuals must be responsible and protect their own privacy and also protect he rights of other individuals, with the panopticon privacy can be managed by being able to see who is observing us and what happens in the online world; therefore we act morally without breaking rules and laws.…

    • 1222 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall is software or a device that blocks hackers, viruses, and malware from accessing to your network system. Second, you should create strong passwords that nobody can guess. Third, you can hide your browsing activities from others by opening an Incognito window on Google Chrome, Private Browsing on Firefox, and InPrivate on Internet Explorer. These private windows don't record your browsing history. Fourth, when you are using a public computer, you can use a portable privacy device such as the Ironkey Personal Flash Drive or take Linux OS with you on a flash drive. Ironkey Personal Flash Drive is an encrypted flash drive that stores sensitive data and passwords and they are safe from viruses and malware.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    Do you understand how to secure your computer since you reviewed the material? Explain your answer.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The article "The Internet: A Clear and Present Danger?" written by Cathleen Cleaver is a clear claim of the necessity of government regulation to control what is being shown on the Internet. To support her claim, Cleaver gives the pornographic web sites as an example. She argues that the regulations used to control the selling of pornography applied to porn stores, magazines, and television should also be applied to the Internet. The reason for such necessity is that it is impossible to control who is actually accessing such web sites. Following this reason, Cleaver's main claim in the article is that children can access pornographic web sites on the Internet. This claim is clearly stated by Cleaver in the fourth paragraph of her essay: "When considering what is in the public interest, we must consider the whole public, including children, as individual participants in this new medium" (460). After that her following paragraphs give examples and explanations that support the necessity of a government regulation on Internet. Such examples and explanations were very effective in order to support her claim. They made a fundamental relationship between the author's claim and the real facts that support it, helping people realize such danger by thinking about their own experience.…

    • 905 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a risk of others hacking into your computer to get your identity this can be minimised by a firewall. A…

    • 449 Words
    • 2 Pages
    Good Essays