StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Sciences and Information Technology - Essay Example

Cite this document
Summary
The author of the paper titled "Computer Sciences and Information Technology" identifies the kinds of websites which can be found on the Darknet, and whether there are valid reasons for the Darknet to exist, and explains why don’t authorities shut down these websites…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Computer Sciences and Information Technology
Read Text Preview

Extract of sample "Computer Sciences and Information Technology"

? Computer sciences and information technology Computer sciences and Information technology Part The DarkNet What is dark net? DarkNet is a network of secretive websites that cannot be viewed on the regular internet. Sites on DarkNet are usually hosted on regular servers. However, in order have access to them, one needs special kind of software, something that will encrypt traffic of every user and allows them relative secrecy (Thomas, 2013). DarkNet can also be thought of as a separate internet. For one to access DarkNet, it is necessary to have access to the regular internet and then make a connection to The Onion Router (TOR) network, a network that comprises virtual tunnels which allow individuals and groups to improve their security and privacy of the internet (Smith, 2009). What kinds of websites can be found on the Darknet? Web sites that can be found on the DarkNet are those of nasty or at the very least, unlawful activities including pedophile rings, arms sales or illegitimate drugs; websites that have something to hide. It is notable that websites on DarkNet are those that support things such as private communications, private communities like those who look for anonymity on the web, and besieged file sharing community. DarkNet also contains websites for outright criminals and is the source of the majority of the sneakiest attacks on the private and public infrastructures of the web (Smith, 2009). Why don’t authorities shut down these web sites? The DarkNet is a deeper and more difficult to access parts of the internet. It is not possible to police the internet in its entirety since individuals as well as groups are always devising new ways of remaining off the grid. Thus, the websites cannot be shut down since the people and groups behind them will always revive them. The authorities would always battle with the DarkNet (Thomas, 2013). Are there valid reasons for the Darknet to exist? Even though DarkNet is a haven a perverts as well as arms dealers, it can also be seen as a citadel of a more dignified cause, that of free speech. It is of note that many nations around the world do not offer their people the freedom of speech. DarkNets offer every user the power of speaking in a free manner with no fear of persecution or censorship (Thomas, 2013). Making Hidden Services anonymous has been a refuge for dissenters in countries such as Mauritania, Lebanon as well as nations that were marred by the Arab Spring. DarkNet is utilized to host blogs in nations wherein the exchange of ideas is disapproved of. Moreover, DarkNet websites also reflect sites which draw corporate or governmental angst, like Wikileaks. Other than granting a bastion of free speech, DarkNet websites also help organizations to increase their security intelligence, and as a result, it enhances their security posture. Using DarkNet, security administrators could identify scanning activity devoid of employing complex analysis technology that requires committing already overstrained resources, and, with a decreased incidence of false positives (Smith 2008). Reference Smith, M. (2009). DarkNets. Montreal, Canada: CRC Press. Thomas, G. (2013). The Silk Road is Shut Down, and the Owner Is In Custody. Retrived from http://motherboard.vice.com/read/the-silk-road-is-shut-down-and-the-owner-is-in-custody Part 2: Privacy In general, which privacy policies do the applications have in common? The following privacy policies are common in all the applications: All collect private information of the users. Policy on now they collect, use and share the information collected from users. Policy on the choices which the privacy policies offer the users, such as how to update and access information. Policy on the circumstance under which personal information of the users will be shared with other parties – it will only be shared for legal reasons. Policy about information that will be always public. Which are different? Only Twitter has policy towards children, stating that the services it provides are not directed to people below the age of 13 years. Only Facebook has policy that describes how the user can delete and deactivate his/her account. Only Google provides description regarding information security; protecting users from unauthorized alteration, unauthorized access, destruction or disclosure of information that it holds (Marr, 2011). What do companies use this type of private information for? Companies use this type of private information about a user in connection with the features as well as services the companies offer the user and others like the friends of the user, the partners of the company, the marketers who buy adverts on the website, and the developers who build the websites, applications and games that users use. Essentially, Facebook uses private information of users to serve them adverts which may be pertinent to them, or to inform the user and her/his friends about happenings or people nearby. Google uses the private information of users in providing, maintaining, protecting, and improving its services such as advertising services, and develop new services. Google lets marketers to display adverts to users basing on their earlier online interactions. Twitter might share private information of the users with 3rd parties only to perform functions and offer services to Twitter (Whittaker, 2013). Should this be legal? No, sharing personal information with third parties, especially to advertisers should not be legal. Privacy of users needs to be respected. The companies should only share the private information of users with their consent. In general, private information needs to be protected at all times (Marr, 2011). Do we as individuals need to worry about privacy and why? Yes, as individuals and users of social networks, we should worry about privacy. This is primarily because there are things that people do not want them to come up since that may impact their job prospects, their prospects to have dates and such things. People also need to worry about privacy because the lack of privacy exposes users to corporate as well as government intrusions. Moreover, lack of privacy may hinder jobseekers since social networks might unintentionally expose details that jobseekers may not choose to expose regarding themselves (Marr, 2011). Reference Marr, B. (2011). How Facebook Exploits Your Private Information. Crescent City, CA: Springer Publishers. Whittaker, Z. (2013). Under CISPA, Google, Facebook, Twitter, Microsoft, others Can’t Promise to Protect Your Privacy. Columbus, OH: AMACOM. Part 3: Hidden Lynx What is the Hidden Lynx group? The Hidden Lynx group refers to an expert team of attackers that has advanced abilities based in China comprising between 50 to 100 proficient hackers. It is a professional firm which provides a hackers for hire services. They can attack multiple organizations with the use of simultaneously running hacking campaigns. The group operates in an efficient manner and usually moves methodically and fast (Doherty et al., 2013). What are they doing? The group provides hackers for hire operation and it often retrieves particular information from a variety of government as well as corporate targets. This group is essentially a very proficient team who have the capacity to partake a wide range of campaigns straight away, contravene some of the highly-protected corporations in the world and have the capacity to alter their approach fast in order to accomplish their objective (Viyajan, 2013). Hidden Lynx group often attack with the use of several customized Trojans which are intended for particular purposes. Team Naid usually distributes Trojan Naid employed for specific operations against targets that are of high value, whereas Team Moudoor distributes Backdoor Moudoor which is reserved for bigger and large-scale campaigns and has seen wide ranging distribution typically across multiple industries. It is noteworthy that the group often utilize zero-day exploits and can rework and customize exploits fast (Doherty et al., 2013). What can be done about them? Since the group is believed to be based in China, they can be traced and brought to justice. Moreover, their ways should be learnt in order to understand how to effectively stop them and fight them. In general, companies, particularly those in the United States should install the appropriate software that detects malware and helps stop attacks by hackers. Over half of all hacking attacks are targeted at American organizations (Viyajan, 2013). Reference Doherty, S., Gegeny, J., Spasojevic, B., & Baltazar, J. (2013). Hidden Lynx – Professional Hackers for Hire. Symantec. Viyajan, J. (2013). China-based Hacking Group Behind Hundreds of Attacks on U.S. Companies. Austin, TX: Prentice Hall. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Journal Essay Example | Topics and Well Written Essays - 1000 words - 2”, n.d.)
Journal Essay Example | Topics and Well Written Essays - 1000 words - 2. Retrieved from https://studentshare.org/information-technology/1495602-journal
(Journal Essay Example | Topics and Well Written Essays - 1000 Words - 2)
Journal Essay Example | Topics and Well Written Essays - 1000 Words - 2. https://studentshare.org/information-technology/1495602-journal.
“Journal Essay Example | Topics and Well Written Essays - 1000 Words - 2”, n.d. https://studentshare.org/information-technology/1495602-journal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Sciences and Information Technology

Computer Sciences and Information Technology: IPSec and Cryptography

The author of the "Computer Sciences and Information Technology: IPSec and Cryptography" paper offers a clear discussion of the major functions of IPsec in relation to the cryptographic functions employed by the protocol suite during the packet exchange process.... Cryptography refers to the change of plaintext information into a coded form.... The aim of cryptography is to offer the necessary security and frontier access to private information....
6 Pages (1500 words) Research Paper

Computer Sciences and Information Technology in Humanity

This paper ''Computer Sciences and Information Technology in Humanity'' discusses that the technology has been very essential in human beings' daily lives, typically in many human beings have proved to be more dependent on technology that that they cannot exist without.... Again this machine is very critical in elaborating evolutions in technology.... This piece of machine depicts a real evolution in technology and furthermore, the machine inclines more on the new invention as compared to development of an existing technology....
6 Pages (1500 words) Research Proposal

Computer Sciences and Information Technology. User Experience

In order to get information regarding their experiences of using the website, the users are given a website usability form to be filled so that the website of the Phone4u can be evaluated.... This will require acquisition of user opinions and to present analysis of the information to guide the decision on the areas of improvement.... The evaluation will lead to the decision making for the new version of the website based on the information from user response....
9 Pages (2250 words) Essay

Discussion 1 and 2

Jobs in the networking industry are highly competitive therefore it is important that if one Computer Sciences and Information Technology Computer Sciences and Information Technology Part Employment Possibilities in the Networking Area There are a lot of employment opportunities in the networking area.... Some of the job titles related to a job in the area of networking include network administrator, network systems engineer, network service technician, network programmer/analyst and network/information systems....
1 Pages (250 words) Assignment

The Internet Provider ASA

Computer Sciences and Information Technology al affiliation Computer Sciences and Information Technology The moment users in the direct network or firm network desire an access to servers in the DMZ, the most appropriate practice would be enabling the verification of the internet provider's ASA.... Principles of information Security....
1 Pages (250 words) Essay

Comparison of Closed Mobile Ecosystems with the Open One

The author states that the current market share in the United States is on rising where most people are opting to use Open Mobile ecosystem, as they are flexible since they can be used anywhere.... The most developers that have lost in the United States market is the Blackberry.... .... ... ... A closed mobile ecosystem, on the other hand, is one that does not allow its users to have access to wireless networks using mobile devices....
1 Pages (250 words) Assignment

Computer Sciences and Information Technology - Scheduled Installment System

The paper "Computer Sciences and Information Technology - Scheduled Installment System " highlights that with all the functionalities and qualitative features of the two applications, it is evident that Microsoft Dynamic GP stands a better chance than the Scheduled to be selected by organizations.... s Scheduled Installment gives an ordinary system user interface with real time accessibility to all of the properties, Microsoft Dynamics GP gives each user a customized and personal interface, which is task-oriented and with pre-defined, customized roles and information look....
7 Pages (1750 words) Case Study

Planning Stage in Computer Sciences and Information Technology

The paper "Planning Stage in Computer Sciences and Information Technology" explains that before initiation of an IT project it is great to conduct research of the context of the project in terms of will encompass and time for its implementation and collecting data pertaining to project conducting....
14 Pages (3500 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us