Preview

Privacy and Security

Powerful Essays
Open Document
Open Document
4774 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Privacy and Security
e
Report on Privacy and Security

Subject: ACCG822
Student name: Hui Zeng
Student ID: 42892368

Table of contents

1. Introduction 1 2. Appraise the issues raised in the article by Moglen (2013) as they affect individuals, organizations and society 2 3. Trade-off between privacy and security 5 3.1 What is privacy? 5 3.2 What is security? 5 3.3 The relationship between privacy and security 6 3.4 The important of privacy and security 7 3.5 How does internet security work to protect personal information? 8 4. The reflection on my personal experience of not using technology for half day 10 5. Conclusion and recommendations 12 5.1 Conclusion 12 5.2 Recommendations 12 References 14

1. Introduction
Today 's risk of surfing the internet has increased as a variety of threats have emerged. However; many people fail to understand the importance of internet security. A number of people do not apply or just apply the basic of security software until they realise there is a risk. Consequently, their computers are being infiltrated or infected. Some people are unaware of personal information being stolen or misused, which can present many security issues to the user. As one part of privacy, personal information has to be protected by internet users due to the many attacks that are intended to obtain your personal information for profit.
According toJanssen(2010), internet privacy means the level of privacy and security of private data, personal communications and preferences which are protected by techniques and technologies.
Internetsecurity refers to browser security, data security, identification authentication and protection of data that covering in internet, which relies on specified resources and standards(Janssen 2010).
The purpose of this report is to highlight the risk of internet privacy being breached by malicious persons, groups and organisations and how to mitigate and lessen the impact these risks present. A lot



References: Computers in Human Behavior, Volume 20, Issue 6, November 2004, pp 711–26 Individual differences in Internet usage motives Curtin, 1997, Introduction to Network Security, viewed 27 April 2013,<http://www.interhack.net/pubs/network-security> Janssen, 2010, Definition of Internet Privacy, viewed 22 Apr 2013, <http://www.techopedia.com/definition/24954/internet-privacy>. Moglen, 2013, 'Privacy and security, The tangled web we have woven ', vol56, pp.11. Stanford school of medicine, 2012, Why You Need to Secure Your Information, Viewed 23 Apr 2013, <http://med.stanford.edu/irt/security/information.html>. Thibadeau, 2002, Workshop on the Relationship between Privacy and Security, p5, para.6, viewed 24 April 2013, <http://rack1.ul.cs.cmu.edu/tw/privacy/WhitePaperPWS.PDF>.

You May Also Find These Documents Helpful

  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    References: Alderman, E. & Kennedy, C. (1997). The Right to Privacy: New York: Vintage Books. Retrieved from: http://www.yale.edu/hnhti/curriculum/units/html.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    the law of online privacy in the past twelve months [2002] have involved the government 's response to the reality…

    • 3371 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    Privacy is defined as the state of being free from public attention (Oxforddictionaries.com). Microsoft, a multinational billion dollar technology company, defines internet privacy as personal information that one provides on the internet and can only be accessed by an exclusive group (Microsoft.com). In short, personal information includes anything from first and last name, address, email, telephone number, or social security number (coppa.org). Keeping this information safe will in turn keep you safe, that is why there are some laws in place to enforce internet privacy.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    U. S. Department of Health and Human Services (2014) Health Information Privacy, Retrieved on 1/8/14 from www.hhs.gov/ocr/privacy/hipaa/understanding/training/index.html…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Since the Internet is getting more and more important to human, the term of ¡§privacy¡¨ is also getting frequent to discuss in the information technology sector. There is no reason to explain why the Internet and privacy are always related to each other. The Internet users only know that once they login to the Internet, their privacy can be stolen anytime. It sounds like very terrible, but it is possible.…

    • 790 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet Safety

    • 1165 Words
    • 5 Pages

    When browsing on the internet, we rarely think about how the internet came to existence. We often go about our routine lives and don’t think about how the internet today has made it so convenient for people to get in touch with one another. This in turn has frequently led many people to having their identities stolen and also experienced being victims of online sexual predators. In this paper, we will discuss how with the evolution of the internet today, more people are able to get in touch with one another; therefore leading to the the harsh reality and safety precautions one can take when being online.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Good Essays

    People think that when they post something online, whether it is good, bad, privately, or publicly, that information is safely sealed and secured. But the truth is, it can be freely access or easily steal from them. Hacking, viruses, trojans, and especially own self are some of the reasons that threaten internet security. Among all of these examples, hacking is on the top list. Even though there are some laws against hacking like the Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, it is not enough assurance to protect the people against hackers and it doesn’t improve the internet security. Changes need to be made in the law to increase internet security, and find and punish cyber criminals. Additional laws to stop cybercriminals and necessary, unenforceable, and could infringe upon interest users rights to privacy and the growth of the internet.…

    • 894 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Yael Onn, et al., Privacy in the Digital Environment (Haifa Center of Law & Technology, Niva Elkin-Koren, Michael Birnhack, eds., 2005)…

    • 1218 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    This paper describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's systems, endangering users of the most common Web browsers, including Netscape Navigator and Microsoft Internet Explorer. In short, the attacker observes and controls everything the victim does on the Web.…

    • 2365 Words
    • 10 Pages
    Powerful Essays