Free Essay

Data and Privacy

In:

Submitted By jarenyach
Words 2264
Pages 10
Data Privacy and Security

Table of Contents

Introduction 3
Why Protection 4
Computer Virus 4
How Viruses Infect Computer 5
How People Hack Computer Systems 6
How to Keep Computers Safe from Online Predators 7
Conclusion 10
REFERENCES 11

Introduction
The role of computer systems is very vital in our daily lives. Since computers help us to deal with approximately all the major functions of our lives as well as are so inevitable that spending even a day or two away from the computer can leave us feeling powerless. In this prospect, many people control their routine lives by means of their personal computers. However, at the present computer security has become a very critical issue. Additionally, security refers to the technique to discover as well as stop illicit utilization of our secret information or computer. In this scenario, some preventive measures enable us to stop criminal users (as well known as "intruders") from accessing and using some part of our computer system. In addition, recognition of such intrusions helps us in deciding whether or not somebody tried to gain access into our computer system, if they were successful in their attempt, as well as what they could have acquired from the system (ComputerSecurityService, 2011), (Armor2net Software Ltd., 2004) and (Norton, 2001).
In addition, the term “computer security” is very commonly used, though; the information and data saved on a computer are in danger to few risks unless the computer is connected to other systems using a network. In view of the fact that the use of computer networks, particularly the Internet (largest network of the networks), has turned out to be persistent. The thought of a computer security system has extended to point out problems covered in the way of networked use of computers and their information and data resources (Kinkus, 2002). This outlines the important points and vital aspects of computer security. This paper will cover the answers of various questions such as how can viruses contaminate computers, how computer systems are hacked by people, and how to keep computers secure from online predators.
Why Protection?
In the case of computer systems and information technology, integrity and privacy are considered as the most frightening factors for a computer user. For the daily internet users, the security and privacy of a computer is considered as the most vital area of computer security. However, when a user is registering themselves with any internet service or a website, they can suffer from having nothing keep secret. Security on the internet is concerning when saving someone's data and information even if the information does not appear crucial. It is significant that individuals are able to sustain influence over what information is gathered concerning them, how it is engaged, who is authorized to utilize it, and for which reason it is used (Kinkus, 2002) and (Shelly, Cashman, & Vermaat, 2005).
Computer Virus
Computer virus or simply bug is a type of software application or program that is developed to copy itself as well as extend to further machines. In most scenarios, the application is "malicious”, which outlines it is designed to cause the computer to malfunction in different ways. However, in many cases the term "computer virus" encompasses all the types of "malware," or malicious software. In place of sniffles and a fever, a number of widespread signs of a computer viral infection include data and information loss, sluggish performance, and sometimes the system stops working. However, a lot of the latest viruses were developed to stay unseen and undetected on a computer and not aware its user, consequently malware infected systems can extend silently. In this scenario, the first computer virus was Elk Cloner, which was introduced in 1981. This virus was developed by human programmers and the basic purpose of this virus was to damage others' computers (Chuks, 2011).
How Viruses Infect Computer
There exist thousands of viruses these days, as well as new viruses that are coming out with every passing day. Additionally, it is terribly difficult to offer the computer users a standard clarification of how viruses work, for the reason that they all have dissimilarities in the way they contaminate or the technique they used to spread from one computer to another. In this scenario, file viruses are some sort of programming code that connect themselves to driver files, .exe files or compressed files, as well as they are activated when the host application is run by the system users. Additionally, once the virus file or parasitic virus is started, it can spread by linking with new applications in the computer system, and can as well carry out the bad actions for which it was programmed. In addition, a large number of file/parasitic viruses reach through loading themselves in the computer’s main memory, as well as they begin searching space used for extra programs available on the drive. In addition, by spreading themselves from one system to another, these virus programs as well hold a variety of pessimistic elements that could be turned on instantly or through a specific ‘trigger’. The triggers could encompass probably be precise dates, or the figure of times the virus has been simulated, or something evenly small (TechiesGuide, 2011).
How People Hack Computer Systems
The idea of 'computer security' is used in many forms; the content stored on a computer could be vulnerable simply through few risks apart from the computer that is linked to others on a network. Seeing that the utilization of computer networks (particularly the Internet) has increased radically in last two decades, in this scenario, the idea of computer security is employed to explain issues referring to the networked utilization of computers and their resources (Molie, 2007). Additionally, it is significant for the system user to get computer security management into their hands. In addition, we require placing it in position, where systems that will facilitate in detecting and stopping vulnerabilities from being taken advantage of, in its place of just assuming that our network is protected and that we do not require securing our computers for ourselves (Molie, 2007) and (ComputerSecurityService, 2011).
From the above discussion we can perceive that the primary step in computer security management is to make sure that we have extremely good passwords that comprise a blend of letters, numbers as well as symbols. In this scenario, some extra efficient client verification methods can make you feel at ease. A firewall is a fundamental and absolute requirement for each computer. It permits the system users to simply access those services for which they are authorized. These basic mechanisms are the necessary foundation of a computer security administration, however these mechanisms are not effective to deal with and stop the entire kinds of threats. Additionally, discovering high-quality software might appear daunting if we are not familiar with exactly what we are searching for. Another solution is antispyware that is also considered as an extremely high-quality addition to our computer security arrangement. Therefore, once we know that we have the software in position to safeguard our computer from worms, viruses, trojan horses and additional malware we should turn to an additional feature of computer safety management. Furthermore, protecting and backing-up our important data and files is the most excellent method to keep away from the destruction that could happen if our computer system has been hacked (Molie, 2007) and (ComputerSecurityService, 2011).
In addition, it is significant for the computer user to have the essential layers of computer and network security prepared to protect their data and computer. Since malware spreads and modifies itself constantly, there is need to update our software frequently. As well, while we are without doubt assuring beside an attack, we cannot essentially be positive one will never take place. However, in case it takes place, making backups of the entire data and information at another place is an outstanding method to safeguard our information (Molie, 2007) and (ComputerSecurityService, 2011).
How to Keep Computers Safe from Online Predators
Hacking is the process of entering into network or computer systems, normally with illegal intension (i.e. to change or alter on hand settings). Occasionally malicious in nature, it can create serious problems for the networks or computer systems. In this scenario, people with malicious intentions are frequently referred to as "crackers because they "crack" network or personal computer systems. However, currently the majority of businesses as well as individuals make use of different network-based and host-based safety software to identify malicious actions, defend systems and data, as well as up-hold event response attempts. In this way, security software could be referred as a foundation of computer safety log data (Hinders, 2011), (CampusActivism, 2011), (Mitchell, 2011) and (NIST, 2010). Some important ways to protect computers are presented below:
The majority of available antimalware software is known as antivirus applications that normally keep record of viruses and check malware, file and system disinfection efforts and file quarantines. In addition, antivirus software can keep records of information such as when the process of malware detection was carried out and when software updates or antivirus signature occurred (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001).
Another important technique for computer security is known as intrusion prevention and intrusion detection systems. For implementing computer security intrusion detection and intrusion prevention, systems record comprehensive data and information on doubtful behavior as well as check for attacks, and some events intrusion anticipation systems carried out to prevent malicious action in progress. In this scenario, a number of intrusion detection applications, like that file reliability checking software, execute occasionally in place of incessantly, consequently they produce log entries in batches in its place of on a continuing basis (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001).
Remote Access Software is also one of the most important solutions that are aimed at approving and securing the virtual private networks (VPNs). Additionally, virtual private networking systems normally keep the record of successful and failed login attempts, in addition to the dates and times every user used the network, along with the amount of data sent and received in every user session (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001).
Vulnerability Management Software is a high quality solution for the corporate network security management. In the scenario of computer security, vulnerability management software comprises patch management application and vulnerability assessment application, which is used to record and maintain the patch system history and vulnerability status of every host, that comprises recognized vulnerabilities and missing software updates (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001).
Authentication Servers are aimed to ensure the computer security. For this purpose they comprise directory servers and single sign-on servers, normally log every verification attempt, comprises its source, username, achievement or stoppage, as well as date and time (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001).
System Firewalls can be used to track the position of network traffic and carry out content assessment. In addition, firewalls are inclined to encompass extra complex policies and generate extra detailed logs of action than routers (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001).

Conclusion
The term “computer security” is very commonly used, though; the information and data saved on a computer are in danger to few risks unless the computer is connected to other systems using a network. In view of the fact that the use of computer networks, particularly the internet (largest network of the networks), has turned out to be persistent, the thought of computer security system has extended to point out problems covered in the way of networked use of computers and their information and data resources. For the daily internet users the security and privacy of computer is considered as the most vital area of computer security. This paper has presented some of the important aspects of computer security management. This research has outlined some of the important features of computer security of those needed to be maintained for the sake of effective security management. This paper has discussed the ways viruses and hackers enter into system and cause damage.

References
Armor2net Software Ltd. (2004). Why is the computer security important? Retrieved July 12, 2011, from http://www.armor2net.com/knowledge/computer_security.htm
CampusActivism. (2011). What is Hacking? Retrieved July 13, 2011, from http://www.campusactivism.org/html-resource/hackers/section6.html
Chuks, A. (2011). How a Virus Infect Your Computer. Retrieved July 12, 2011, from http://skoola.com/lecturepage.php?id=1457&cid=33
ComputerSecurityService. (2011). Taking Charge Of Your Computer Security Management . Retrieved July 13, 2011, from http://computersecurityservice.org/ar/computer-security-management.php
Hinders, D. (2011, July 09). What is Computer Hacking? Retrieved July 12, 2011, from WiseGeek.com: http://www.wisegeek.com/what-is-computer-hacking.htm
Kinkus, J. F. (2002). Science and Technology Resources on the Internet: Computer Security. Retrieved July 12, 2011, from http://www.library.ucsb.edu/istl/02-fall/internet.html
Mitchell, B. (2011). What is a Hacker? Retrieved July 12, 2011, from About.com: http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm
Molie, C. (2007, July 19). Computer Security - What Exactly Is It? . Retrieved July 10, 2011, from http://isms-guide.blogspot.com/2007/07/computer-security-what-exactly-is-it.html
NIST. (2010). Computer Security. Retrieved July 12, 2011, from http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
Norton, P. (2001). Introduction to Computers, Fourth Edition. Singapore: McGraw-Hill.
Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology.
TechiesGuide. (2011). How does a Computer Virus Work . Retrieved July 13, 2011, from http://www.techiesguide.com/how-does-a-computer-virus-work.html

Similar Documents

Premium Essay

Data Privacy

...Data Privacy G.Maruthi What is data privacy? • Protection of personal data • Why do we need protect personal data? – The need to control personal data • • • • Fear of misuse Identity Theft Cases of Fraud Other form of cyber crimes What is Personal Information? • According to the European Directive on Data Protection – Article 2: “Personal Data shall mean any information relating to an identified or identifiable natural person (‘data subject’); an identifiable person is one who can be identified , directly or indirectly, in particular, by reference to an identification number or to one or more factors specific to his physical, physiological, mental economic , cultural or social identity” – Article 8: Personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, data concerning health How collected? • Some examples: – Registering with email service – Online shopping – Online bill payment – Social networking – Online gaming Recent Incidents • The Vodafone Germany case (12 September 2013, BBC News): – Personal information of customers stolen by hackers – Affected – Two million – What kind of information? • • • • Names Addresses Bank Account Numbers and Birth Dates Recent Incidents • Adobe Data Stolen(4 October, 2013, BBC News): – Personal information stolen – About 2.9 million customers affected – Nature of information stolen • Encrypted customer passwords • Other private information ...

Words: 1053 - Pages: 5

Premium Essay

Data Privacy Trends

...Bessie Napper IT 547 OL Data Privacy Trends April 28, 2016 Abstract: The purpose of this paper is a reflection on Data Privacy Trends of 2015. This paper will summarize my opinion on the talk about what matters most in data privacy. It will show how the panel has laid out a compelling discussion about the issues facing data privacy. Churchill Data Privacy Trends 2015 presented on what matters most in data privacy. They talked about the ever-growing demand for big data. How increasingly effective “bad actors,” leading to the worst year on record for data breaches. That privacy practices was designed only to deal with compliance or breach response. The conflicting global privacy laws and a growing concern among consumers about whose doing what with their data. Businesses are very aware of how consumers are increasingly aware of the risks and options as their personal data has effectively become a form of currency. As an example, telemarketers are always selling your information to other telemarketers in ways of contacting you in order to get you to buy things from them. As we live and breathe privacy all day we want to feel safe that we are not being violated whenever we go online and open a web page or email attachment. So by choosing the encrypted form of email is one way they talked about helping with privacy issues. With privacy and security one of the things they talked about is understanding where the risks are and how you can alter your behavior. This to me would mean...

Words: 621 - Pages: 3

Premium Essay

Manage Market Research

...Develop market research plan Assessment objective: Establish guidelines for researching and gathering information and work with the staff to gather and evaluate the data. Written organizational guidelines for conducting research OHS: Compliance with legislation. Ensure safety of customers, contractors and staff at all the times. The enjoyment of these standards at the highest levels is a basic human right that should be accessible by each and every worker. Regardless of the nature of their work, workers should be able to carry out their responsibilities in a safe and secure working environment, free from hazards. These rights are set out in legislation to ensure that employers are clear about the obligations and the consequences for neglecting them. Data privacy: the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. To keep safe all recorded interviews, audio tapes, video recordings and group interviews. Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources, Staff involvement: The direct participation of staff to help an organization fulfill its...

Words: 716 - Pages: 3

Premium Essay

Data Class

...Data Classification and Privacy: A foundation for compliance Brian Markham, CISA University of Maryland at College Park Office of Information Technology Goals for today: Give you a solid understanding of both Data Classification and Data Privacy with respect to compliance; Link data classification and privacy to ongoing compliance issues; Discuss various best practices, methodologies, and approaches that you can take with you; Do my best to answer any questions you may have on audit related issues regarding these topics. So...who am I? IT Compliance Specialist @ the Office of Information Technology at UMCP Responsible for audit and compliance initiatives within OIT Formerly employed by KPMG LLP and Grant Thornton LLP as an IS Auditor Have worked with many federal, state, and local governments as well as public companies, hospitals, and not-for-profits. Why do we want to be in compliance? No one likes audit findings; Reduces organizational risk; Processes based on best practice and widely adopted standards are more effective than ad-hoc processes; Systems and data are more secure as a result of good internal control practices. What is Data Privacy? Data Privacy - the relationship between technology and the legal right to, or public expectation of privacy in the collection and sharing of data. The U.S. has trailed the E.U. and other countries in data privacy regulations and legislation; Passed Legislation: HIPAA, Gramm-Leach-Bliley, COPPA; Proposed Legislation: Data...

Words: 1305 - Pages: 6

Premium Essay

What the Heck

...2015 International Compendium of Data Privacy Laws COUNTRY BY REGION Australia Australia................................................................................................................................. 6 Central Asia China (People’s Republic) .................................................................................................. 37 Hong Kong........................................................................................................................... 78 India..................................................................................................................................... 88 Japan................................................................................................................................. 106 South Korea....................................................................................................................... 149 Taiwan ............................................................................................................................... 157 Central America Bahamas ............................................................................................................................. 16 Costa Rica ........................................................................................................................... 43 Trinidad and Tobago.......................................................................................................... 160 Europe Austria .............

Words: 64291 - Pages: 258

Premium Essay

Miss

...Accountability in Managing and Protecting Users’ Data October 2010 This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. You may not modify this document without written consent from Microsoft. Microsoft Corp. • One Microsoft Way • Redmond, WA 98052-6399 • USA All rights reserved. Contents The Evolution of Privacy Models in Computing .................................................................................... 1  The Principles of Accountability ......................................................................................................... 2  The Use–and-Obligations Model ........................................................................................................ 3  A Privacy Governance Framework ...................................................................................................... 4  Conclusion....................................................................................................................................... 5  1 The Role and Importance of Organizational Accountability in Managing and Protecting Users’ Data The Evolution of Privacy Models in Computing Since the early 1970s...

Words: 2353 - Pages: 10

Free Essay

Hr Policies and Hr Prospectives

...proposals include the following: Acts      Limitation Act 1980 Data Protection Act 1998 Freedom of Information Act 2000 The Regulation of Investigatory Powers Act 2000 Anti-Terrorism, Crime and Security Act 2001 Statutory instruments    Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2003/2426) The Regulation of Investigatory Powers (Acquisition and Disclosure of Communications Data: Code of Practice) Order 2007 (SI 2007/2197) The Data Retention (EC Directive) Regulations 2009 (SI 2009/859) Directives   Data Protection Directive 95/46/EC Privacy and electronic communications Directive 2002/58/EC Further special provisions may arise affecting the retention of or access to data, for example:    In the context of the criminal law, the Anti Terrorism, Crime and Security Act 2001 Part 11 provides a lengthy code of practice for voluntary retention of communications data. To provide security services with a reliable log of mobile and fixed phone calls, telecommunication companies must keep telephone call logs for one year. Internet service providers must retain communications data (including internet access, email and telephone calls - mobile and landline) for one year. In the field of immigration, the UK Borders Act 2007 and the Immigration, Asylum and Nationality Act 2006 may enable access to HR records in certain circumstances. Access to HR records The Data Protection Act (DPA) applies to most HR records, whether...

Words: 1158 - Pages: 5

Free Essay

Cipd Rai

...organization. Data relating to employees is of a highly contentious and potentially litigious nature and has to be managed in accordance with compliance regulations. While sharing characteristics with other types of records, personnel records have some special characteristics; importance, sensitivity, longevity, quantity and ownership. We will base this report in the company called CASTELLON SA, manufacturing factory with more than 250 employees. NOTE TO THE CASTELLON SA HR DIRECTOR ABOUT WHY RECORDING, ANALYSING AND USIN HR DATA IS IMPORTANT I. Two reasons why organisations need to collect HR data. Collecting and recording HR data is vitally important to our organisation. We need to keep certain records, some because the law requires them, and some for company’s internal purposes. Being a production factory we have to ensure we are in compliance with Health and Safety laws and regulations ensuring that all staff is maintaining high health and safety awareness. To avoid any act of discrimination in our company and to prove that the company is adhering to UK’s current law and legislation we have to implement the Data Protection Act to our data collection policies. The HR data collection could help in our company’s overall performance measurement process. The data collected enable managers to make sound decisions more effectively. Some of the benefits of data collection are; helps identify or confirm a problem that exists; allows us to work with facts and empirical data; provides...

Words: 1217 - Pages: 5

Premium Essay

Bring Your Own Device

...Bring your own device Victor Morgan CIS330 Strayer University Bring your own device As practice shows, a growing number of employees use at work their own mobile devices. This year, many tech sites are increasingly flashes by acronym BYOD (Bring Your Own Device) – “Take your own devices to work”. As of today, when it is posible connect to different cloud services and harness the power of personal device to perform the work steps, literally holding the phone, and the range of devices has become a truly enormous, sometimes for an employee computer standing on his desk has no value. With the ability to perform the same work tasks, but with the help of his personal device employee, in practice, will seek to do so. The task of company IT-service – is to provide him such. BYOD (bring your own device) – is a term that describes a situation where an employee of organization instead of corporate computer uses to run his own device, whether it is his personal laptop, tablet, or, in extreme cases, even a smartphone. BYOD term appeared at least since 2004. However, the explosive popularity of this idea is found only recently and mainly due to the activity of suppliers of IT-services and the rapid development of functional diversity and cloud services. Today, the growing popularity of BYOD concept affects the number of positions in many areas of IT: from the technical support department to department of development of mobile applications and security management and monitoring of compliance...

Words: 1133 - Pages: 5

Free Essay

Cipd Hr Dat

...organisations it has become evident that HR departments must collect and store various types of data. Through reference to data stored, this can be used to influence business decisions as the data is analysed and used in conjunction with the company’s strategy and objectives. This report will discuss examples of the reasons why HR must collect data, types of data, how this can be stored and legislation that the organisation must comply with. Why HR Data is collected There are various reasons why there is a need for organisations to collect and store HR data. Firstly, it is important to collect and store accurate information to comply with legislation. For example, Right to Work, supporting documents from employees, equality act, documentation to prove the organisation is compliant with UK policies. Health and safety at work act (1974), documents providing evidence of training carried out which ensures that all staff are trained in compliance with the law. By storing the accurate, up to date documentation the data can be used as evidence to support the organisations either legally or at audits. Another example of why data should be recorded to highlight patterns or concerns that may lead to other problems in the workplace. For example, absence records. By storing information on employee absence, it allows for trends in employee absence to be highlighted and took to the next stage. The data can be used as evidence and support for investigating or disciplinary procedures, equally...

Words: 818 - Pages: 4

Premium Essay

Btec Business

...Explain the legal and ethical issues in relation to the use of business information Legal Data Protection Act 1998 Many businesses store and use information about people. The Data Protection Act protects the information being held about people from being misused. The information stored by businesses on databases must be: * Obtained fairly and lawfully * Used only for the purposes stated during collection * Adequate, relevant and not excessive in relation to intended use * Accurate and up to date * Not kept for longer than necessary * Proceeded in line with your rights * Subject to procedures to prevent unlawful processing, accidental loss, destruction and damage to personal data * Protected from transfer to an area outside the European Economic Area (EEA) unless adequate protection exists for that data in the area. This Act restricts Toyota Malawi from using the information of their customers illegally and without permission. This also means that Toyota Malawi has to ask for permission when they want to collect information from their customers and the general public. In addition Toyota Malawi has to make sure at all times that the information never falls into the wrong hands or get lost when processing or while in storage. Freedom of Information Act 2000 The Freedom of Information Act came into effect in 2005. It provides individuals or organisations with the right to request information held by a public authority. The public...

Words: 402 - Pages: 2

Free Essay

3rai

...Legal requirements relating to the recording, storing and accessibility of HR data: The Data Protection Act 1998 The Data Protection Act controls how your personal information is used by organisations, business or the government. Everyone who is responsible for using data has to follow strict rules called ‘data protection principals’. They must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate, relevant and not excessive * accurate * kept for no longer than is absolutely necessary * handled according to people’s data protection rights * kept safe and secure * not transferred outside the UK without adequate protection There is stronger legal protection for more sensitive information, such as: * ethnic background * political opinions * religious beliefs * health * sexual health * criminal records Source: https://www.gov.uk/data-protection/the-data-protection-act Freedom of Information Act 2000 The Freedom of Information Act gives you a wide-ranging right to see all kinds of information held by the government and public authorities. You can use the Act to find out about a problem affecting your local community and to check whether an authority is doing enough to deal with it; to see how effective a policy has been; to find out about the authorities spending; to check whether an authority is doing what it says and to learn...

Words: 572 - Pages: 3

Free Essay

Data

...Data & Information Define Data: Data is just raw facts and figures it does not have any meaning until it is processed into information turning it into something useful. DATA Information 01237444444 Telephone Number 1739 Pin Number A,C,D,B,A* Grades Achieved At GCSE Define Information: Information is data that has been processed in a way that is meaningful to a person who receives it. There is an equation for Information which is: INFORMATION= DATA + CONTEXT + MEANING DATA 14101066 Has no meaning or context. CONTEXT A British Date (D/M/YEAR) We now know it says 14th of October 1066. Unfortunately we don’t know it’s meaning so it’s still not information yet. MEANING The Battle Of Hastings We now know everything so it can now be defined as information. How Is Data Protected? You’re data is protected by a law called the Data Protection Act this controls how your personal information is used by organisations, businesses or the government. This means legally everyone responsible for using data has to follow strict rules called ‘data protection principles’ there are eight principles. How Your Data Is Protected Use strong an multiple passwords. Too many of us use simple passwords that are easy for hackers to guess. When we have complicated passwords, a simple “brute force attack”—an attack by a hacker using an automated tool that uses a combination of dictionary words and numbers to crack passwords using strong passwords doesn’t mean this can’t happen it just means...

Words: 904 - Pages: 4

Premium Essay

Edward Snowden's Right To Data Privacy

...contractor by the name of Edward Snowden disclosed classified information from the National Security Agency (NSA). The root of the data that was leaked was regarding the way the United States Government was gathering browsing habits and personal data of citizens. Basically, their ability to monitor the average citizen without their knowledge. Snowden’s feeling was that our privacies and liberties did not need to be crumpled upon to secure the nation. As a result, this was weakening our nation and causing mistrust by the government instead of securing it. The very popular debate was born, people’s right to data privacy versus the necessity for appropriate intelligence gathering. In this paper...

Words: 792 - Pages: 4

Premium Essay

Privacy Endangerment with the Use of Data Mining

...Privacy Endangerment with the Use of Data Mining An emergent Information Technology (IT) issue that has been rising in the past few years has been data mining. Data mining is utilized to retrieve personal identifiable information provided by individuals through the use of Internet services such as: social media networks, email, and other networks that contain data bases full of personal information. If such data retrieval if not done careful, it can cause ethical issues for the companies that are involved. The ethical issues related to data mining are violation of privacy, confidentiality, and respect of persons’ rights. Issues that required the immediate attention regarding data mining are: What stops corporations from sharing personal identifiable information with other companies?; How effectively and ethically data mining is use by the government?; Is our privacy and confidentiality truly protected? Social network companies such as Facebook, Twitter, and Google provide users agreements upon joining their services. These agreements underline how the information provided by the user will be utilize by the company and it allows the user to understand how to protect their personal identifiable information while utilizing these social network sites. These companies pride themselves in protecting users’ personal information. However, what happens when the company or an unethical company employee violates these agreements? Personal identifiable information is then released...

Words: 1027 - Pages: 5