Preview

Privacy and Security on the Internet

Good Essays
Open Document
Open Document
550 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Privacy and Security on the Internet
Privacy and Security on the Internet
Tommy E. Wylie Jr.
2013 MAY SOS-110-OL 010
Thomas Edison State College

Privacy and Security on the Internet
In this information age Internet security is a vital part of people’s lives. Some people do not understand or have the education to comprehend how important privacy and Internet security is.
When I searched about privacy and security on bing.com, there were 470 million results. Rather than clicking on the first result that pops up, do some investigating. Gather as much information on the URL’s that you can about the page. Is the page a personal page that someone designed with their opinions? Look at the domain. Is it a reliable source like .edu, .mil, .org or .gov? Is it based on the type of information you are looking for? Is it reliable for your topic? These are questions you should ask yourself while searching for information on the World Wide Web.
The type of search engine or library database affects your search results as well. Search engines are not quality controlled or governing websites that it uses, therefore the searches are not always complete. Search engines grab keywords from multiple websites even if the website was just created by an unknown author and has no idea what they’re talking about. Search engines are great resources for obtaining quick answers by checking sources not covered by a library database. The best and most effective research comes from a library database. A library database is developed by specialists who meticulously search through the information and confirm its validity. They contain research made up of rich descriptive records that cannot be accessed by a search engine. Most library databases cost money or can be accessed by a student login account through a school. By having a small fee to log into a secure database without any pop ups or phishing attempts to try and swindle you into giving up your personal information is well worth the money in the long run.
When I



References: Kern, M. Kathleen, and Eric Phetteplace. "Hardening The Browser." Reference & User Services Quarterly 51.3 (2012): 210-214. Academic Search Premier. Web. 29 May 2013.

You May Also Find These Documents Helpful

  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Itm 501 M0D 1 Slp

    • 741 Words
    • 3 Pages

    Both Firefox and Internet Explorer allow me to conduct a search using Google. While it is not the only search engine available, it can help me with research, by allowing me to find scholarly resources, without necessarily accessing a university library or database. Google scholar often provides extensive lists of resources in an efficient manner. Google Chrome is a fast browser, it brings up search…

    • 741 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I often use my subscriptions to online library databases like the National Defense University or the Joint Forces Staff College for research. To narrow the research, I utilized the National Defense University library database for articles and other information available on government and educational websites. These more reliable websites are easily identified by their domain names end in .edu, .gov, a reliable site should describe the evidence opinions, or advice should be clearly…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Using the Internet to find information, it's important to use a search engine to find the information that you need on the Internet. Search engines look for websites based on the criteria a person enters into the search box. The best-known search engine is Google, other popular search engines include Yahoo! search, Bing and…

    • 2519 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Hsm 542 Course Project

    • 6712 Words
    • 27 Pages

    Effecting Change Information Technology: Why is the Healthcare Industry sluggish to upgrade their Hospital Information Technology Systems?…

    • 6712 Words
    • 27 Pages
    Powerful Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Budget-Cuts In Education

    • 617 Words
    • 3 Pages

    It is nice to know that the sources which are brought up through these databases are reliable, however, they are very finicky and hard to find the perfect source. I underestimated the amount of time that is needed when searching for information through these databases. I first thought I could just search what written was looking for and have all of my sources within an hour, but I guess that is why this paper is a research paper and takes more invested time to find the necessary sources to write the paper. I also had a little bit of a problem connecting my topic with the part of underfunded libraries in the book in which this paper is based on. Although these topics are highly interconnected, I felt like I should have written more about it throughout my paper than I…

    • 617 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    General Internet Skills

    • 422 Words
    • 2 Pages

    • How can you determine if the information on a website is reputable and worthwhile for a research paper?…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    the internet and do a search on their favorite search engine like Google or Yahoo.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Bath Salts

    • 1657 Words
    • 7 Pages

    The information Google Scholar provided was pretty varied. My search terms had to be very specific to pull up any valid information to the questions that I had. The search results were everything from citations, news stories, journal articles, research papers to editorials. A lot of the articles that I would find were dead ends in which I’d either need to pay to read the article or subscribe to the publisher’s website. These instances were frustrating as I could not see the research that I just found that would fit my paper perfectly. The list of information provided about bath salts could have one sentence or the entire article about this synthetic drug so there was a wide range of findings.…

    • 1657 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    What does privacy really mean and why do people want it? It’s a fair question to ask, especially when looking at the internet, a global system that connects you to billions of people (Oxforddictionaries.com). There are endless amounts of details you can discover about a particular person on the internet. Some people enjoy the fact that they can access so much about another person with just a click of a button, while others fear it. That is why people take precautions, limiting the amount of access outsiders have to their information, however that does not always work. There are many loop holes in the terms and conditions we agree to on websites which leaves us open to the public in certain ways. There are also many ethical concerns regarding privacy on the internet.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Filter Bubbles

    • 310 Words
    • 2 Pages

    We are used to think of the internet as a huge library, with services like Google providing universal map, but that is not true, websites like Facebook, Google, Yahoo news, and the New York times are personalized, based in your web history, these website filter information to show you stuff they think you want to see. they can be very different from what everyone else sees, and what you are looking for.…

    • 310 Words
    • 2 Pages
    Good Essays

Related Topics