Tuesday, May 28, 2019

Security And Privacy On The Internet Essay -- Computer Security

Many users are subject of Security and Privacy on the Internet issue. The term information now is to a greater extent used when specify a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the terms of the very computing devices and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and other crimes. However, many users do not realize that they risk their security and privacy online.First, I want to describe who the subjects of the issue are. In my opinion, the issue is the most relevant for the private and commercial information. Home users risk their security while connected to Internet. It is transparent that many people store private information such as Social Security and credit card numbers, as it is more convenient than to lay them every time completing a form for an online purchase. Hackers do not h ave to attack every user individually, they write special viruses named Worms and Trojan horses which, in one case run, could spread in a global scale. These programs may have different functions from gathering personal data to logging pressed keys and e-mailing the information to a hacker. redden if a user does not keep any valuable information, his or her computer does have a value for a hacker. If you think that your small computer could not become an object of offence because it is very small, then you are mistaken. Even if it doesnt contain anything worthwhile, it could be perfectly used for breaking in other, more significant system. (A. Zaharchenko, Futurology without future Computerra, 2002).Not rarely, competing entrepreneurs with the help of unlawful means wan... ...nowledge about threats of security and privacy issue on the Internet, one could feel less(prenominal) vulnerable and use Internet with confidence.ReferencesZaharchenko, A. (2002, declination 24). Futurology without future. Retrieved March 14, 2005, from http//www.computerra.ru/print/softerra/technologizm/22926/ Honeycutt, J. (2004, April 20). How to protect your computer from Spyware and Adware. Retrieved March 14, 2006, from http//www.microsoft.com/windowsxp/using/security/expert/honeycutt_spyware.mspxIDS Classification (2002, December 4). Retrieved March 12, 2005, from http//www.xakep.ru/post/17052/default.asp Stalsen, (2001, February 28). Researching Firewalls. Retrieved March 13, 2005, from http//www.xakep.ru/post/17052/default.asp Anonymity for lazy people (2004, June 17). Retrieved March 14, 2005, from http//www.xakep.ru/post/22763/default.asp

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.