Thursday, October 24, 2019
Security And Privacy On The Internet Essay -- Computer Security
Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and other crimes. However, many users do not realize that they risk their security and privacy online. First, I want to describe who the subjects of the issue are. In my opinion, the issue is the most relevant for the private and commercial information. Home users risk their security while connected to Internet. It is obvious that many people store private information such as Social Security and credit card numbers, as it is more convenient than to enter them every time completing a form for an online purchase. Hackers do not have to attack every user individually, they write special viruses named "Worms" and "Trojan horses" which, once run, could spread in a global scale. These programs may have different functions from gathering personal data to logging pressed keys and e-mailing the information to a hacker. Even if a user does not keep any valuable information, his or her computer does have a value for a hacker. "If you think that your small computer could not become an object of offence because it is very small, then you are mistaken. Even if it doesn't contain anything worthwhile , it could be perfectly used for breaking in other, more significant system." (A. Zaharchenko, Futurology without future [Computerra], 2002). Not rarely, competing entrepreneurs with the help of unlawful means wan... ...nowledge about threats of security and privacy issue on the Internet, one could feel less vulnerable and use Internet with confidence. References Zaharchenko, A. (2002, December 24). Futurology without future. Retrieved March 14, 2005, from http://www.computerra.ru/print/softerra/technologizm/22926/ Honeycutt, J. (2004, April 20). How to protect your computer from Spyware and Adware. Retrieved March 14, 2006, from http://www.microsoft.com/windowsxp/using/security/expert/honeycutt_spyware.mspx IDS: Classification (2002, December 4). Retrieved March 12, 2005, from http://www.xakep.ru/post/17052/default.asp Stalsen, (2001, February 28). Researching Firewalls. Retrieved March 13, 2005, from http://www.xakep.ru/post/17052/default.asp Anonymity for lazy people (2004, June 17). Retrieved March 14, 2005, from http://www.xakep.ru/post/22763/default.asp
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.