StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Electronic Frontier Foundation - Essay Example

Cite this document
Summary
The essay "The Electronic Frontier Foundation" focuses on the critical analysis of the major issues in the operation of the Electronic Frontier Foundation (EFF). It was established to increase security awareness to help people secure their privacy in the digital world…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
The Electronic Frontier Foundation
Read Text Preview

Extract of sample "The Electronic Frontier Foundation"

While browsing, one must not go for searching their private information, such as username, address, and other sensitive information like social security number and credit card number. Such searches provide a way to access the user’s doorway. And thus, hackers can easily attack, and users face the issues like identity theft as well as other phishing problems (Eckersley, Schoen, and Bankston).

As the ISP has the information regarding the user’s identity, it can connect this information with the user’s searches, or also it can bundle up all the user’s searches within a solo search history. One must be careful or must not use URLs like http://search.comcast.net when the user has a subscription from Comcast Broadband. In the same way, if the user is an AOL subscriber, then it should avoid using the search icon within the AOL client software or URL http://search.aol.com (Eckersley, Schoen, and Bankston).

Usually, search engines provide the user with the option to form a private account and go searching. However, it also happens that these search engines are linked to further services, which creates a situation where the user either login to a search engine or any linked service, then these services are associated with one another or all in all, to the private account of the user. Examples of such affiliations include the association of MSN with the MSN messenger and Hotmail, Google with Google Chat and Gmail, as well as A9 links with Amazon. Thus, if the users are using the services like Hotmail or Gmail, then they must not use their linking search engines, for example, using a Hotmail account, the user should search from MSN, particularly when they are using that account (Eckersley, Schoen, and Bankston; McCandlish).

Additionally, there are some small pieces of information named cookies, which are entered into the computer by the websites, when the users use these websites. These cookies allow the websites to associate the user’s searches and other functions with the website.  Subsequently, these cookies put in the computer can allow the websites to find the user’s information, yet if the user is using diverse internet linkages in diverse places. Only if the user is using another computer, then these cookies cannot do anything like this (Eckersley, Schoen, and Bankston).

From the viewpoint of security concerns, the best solution would be to impede these cookies. But as the cookies are mandatory for retrieving some websites, thus another solution for this, while less secure, would be to permit the temporarily using of session cookies. As these cookies survive just for the time when the user has opened the browser, consequently, when the user leaves the browser and revives it while entering again into search engines, then the search engine is unable to provide the user a link between recent searches with the old ones through cookies (Eckersley, Schoen, and Bankston).

The user can also use other systems as proxies to shield the user’s IP address from the linked computers through the internet and the websites the user is visiting. The proxies are used by users to transmit the message to the proxy that is transmitted to the projected receiver, and after getting a response from that receiver, the proxy transmits the response to the computer. Though it seems to be very complex and can also be much more complex, but is possible (Eckersley, Schoen, and Bankston).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“I'll attach it Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1677121-iaposll-attach-it
(I'Ll Attach It Essay Example | Topics and Well Written Essays - 500 Words - 1)
https://studentshare.org/miscellaneous/1677121-iaposll-attach-it.
“I'Ll Attach It Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/miscellaneous/1677121-iaposll-attach-it.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Electronic Frontier Foundation

Is Google and Verizon's Net Neutrality Proposal Socially Responsible

This research paper "Is Google and Verizon's Net Neutrality Proposal Socially Responsible?... perfectly described that Google and Verizon represent two of the largest and most influential companies in America in information technology and telecommunications.... .... ... ... That these two companies should have an advanced legal position on the proposed net neutrality regulations is to be expected, because such legislation would directly affect their business operations in the U....
18 Pages (4500 words) Research Paper

SEARCH AND SEIZURE- CRIMINAL LAW

SEARCH AND SEIZURE- CRIMINAL LAW Introduction The laws of every nation continue to see amendments with the hope of making the laws as infallible as possible.... On the whole, laws undergo the transitions they go through because of the ultimate aim of ensuring that laws of the nation become the most comprehensive tools for ensuring fairness, justice and equality for all citizens of the nation....
5 Pages (1250 words) Research Paper

Illegal P2P File Sharing on Institutions of Higher Learning

Name: Professor: Course: Date: Illegal P2P File Sharing on Institutions of Higher Learning 1.... Introduction Illegal P2P File Sharing is a phenomenon that has negatively affected the music industry.... Napster was in 1999 becoming the first peer-to-peer file sharing.... ... ... ... With such internet networks and software, users are able to copy and distribute millions of copy righted files such as music tracks leading to a reduction in legitimate sales....
5 Pages (1250 words) Research Paper

Rating Sites Flourish behind a Veil of Anonymity

Kurt Opsahl, a staff attorney for The Electronic Frontier Foundation, a nonprofit San Francisco digital rights group, argues that if some people think that they have been misrepresented.... The paper 'Rating Sites Flourish behind a Veil of Anonymity' evaluates some sites, which can be manipulated to give us false information....
3 Pages (750 words) Essay

Brave New World of Technology

This paper ''Brave New World of Technology'' tells that Radio Frequency Identification (RFID) the latest surveillance technology raises new concerns about invasion of privacy.... While RFID has a valid service to provide how it can be used can be intrusive in situations where individuals have a reasonable expectation of privacy....
9 Pages (2250 words) Essay

Legislative and Executive Powers

A San Francisco federal district court judge struck down as unconstitutional the provisions of the law in this regard last year on an action brought by The Electronic Frontier Foundation (Sledge, 2013).... The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001,''most commonly known as the USA PATRIOT ACT contains provisions that, on its face, infringes upon the civil rights and liberties of the citizens....
1 Pages (250 words) Coursework

Network Security, the Heartbleed Bug

The paper "Network Security, the Heartbleed Bug" states that users should frequently change their login credentials such as passwords and they need to make sure that they opt for something that does not redirect to their personal likes for example a pet's name.... .... ... ... Generally speaking, the heartbleed bug subsists in a piece of open-source software called OpenSSL (Secure Sockets Layer)....
4 Pages (1000 words) Essay

Risks of Using the Internet

The United States Secret Service has an electronic Crimes Special Agent Program (ECSAP) and a network of electronic Crimes Task Forces mandated by the Patriot Act of 2001 ('electronic Crimes') and dedicated to fighting these kinds of online fraud....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us