StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internet Security and Privacy - Book Report/Review Example

Cite this document
Summary
This paper examines the implications of the issues of security and privacy on anything exchanged on electronic network sites such as electronic commerce (e-Commerce), business (e-Business) and government (e-Government). It is the high time people are made aware of security and privacy concerns…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful

Extract of sample "Internet Security and Privacy"

 INTERNET SECURITY AND PRIVACY TABLE OF CONTENTS Topics Page Numbers Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 A. Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. User-friendly Features . . . . . . . . . . . . . . . . . . . 3 2. Authentication Procedures . . . . . . . . . . . . . . . 4 3. Safety from Attacks . . . . . . . . . . . . . . . . . . . . . 4 B. Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1. Individual Users . . . . . . . . . . . . . . . . . . . . . . . . 5 2. Business Firms . . . . . . . . . . . . . . . . . . . . . . . . . 5 3. Government Agencies . . . . . . . . . . . . . . . . . . . . 5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Reference List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Introduction The Internet today has evolved to such an extent it has become ubiquitous in daily life. It is a great tool mainly for communications but there are now many other applications too, such as doing a myriad of daily tasks like banking, shopping, chatting with friends, buying groceries, reading the news on-line or meeting new friends on social networking sites. The widespread use of the Internet has also sparked some serious concerns on certain issues, namely security and privacy. This is because people do many things on-line, thinking that everything they do is confidential and secure, such as giving out personally identifiable information (PII). This paper examines the implications of these issues on anything exchanged on electronic network sites such as electronic commerce (e-Commerce), business (e-Business) and government (e-Government). It is high time people are made aware of security and privacy concerns. Discussion People use the Internet today in many ways and the media available has multiplied. Internet access can be done through personal computers, laptops, netbooks and mobile devices. There are security and privacy issues whichever Internet device is used and are discussed below. A. Security – although the standard for secure computer communications today is the SSL or the secure socket layer, there is still the potential for security lapses when people access their Internet connections for transacting whatever business they have in mind. The most common mistake that many people commit is at the so-called human-computer interface (HCI) where people do not know the security features embedded in the software program, according to the research done by the group of Radke, Boyd, Brereton & Nieto (2010). 1. User-Friendly Features – hardware designs, such as those on mobile or smart phones, must be simple to use and easily understood. This will prevent oversight that makes their computer communications vulnerable to hackers, for example, that leaves them open to possible fraud. 2. Authentication Procedures – it is vital people use the proper authentication process before even starting transacting on-line. The most common procedures are those requiring personal identifiable information such as birth dates, social security numbers or passwords. These are to be done upon logging in to their accounts to make sure it is not somebody else using their account, like in hacker attacks or the so-called MITM attack (man-in-the-middle) where there is another person pretending to be someone else. A warning can also be posted on the site itself, telling users to beware of such dangers or risks. Anyone asking for passwords or PIN (personal identification numbers) should be ignored outright. 3. Safety from Attacks – the amount, in absolute financial terms, transacted annually through business-to-business (B2B), business-to-consumer (B2C) and also on government Web sites, makes it imperative that sites and networks are safe from hacker attacks. Vulnerability and its consequence is best exemplified by the Wikileaks scandal, wherein sensitive diplomatic posts were made available publicly, compromising global security and intergovernmental relations. Most businesses today put up a digital presence because of cost considerations and for wider reach of its target audience, thereby making market penetration much easier. People who may transact with these business Web sites must be reassured the data they will provide to open an account are secure, and firms must likewise do their best to protect the sanctity and privacy of the said data being provided, as these could be used by other people compromised in most cases with identity thefts resulting in potential liabilities or damages to firms. The Internet has evolved so fast, with new applications being invented at a quick rate, that the laws on Internet security have not kept up with these developments and lagged behind. On the other hand, the laws pinpointing the exact responsibility and extent of liability in cases of compromised network security have not yet been fixed and are a nebulous area in terms of ethics, according to an article by Rutherfoord & Rutherfoord (2010) precisely on such a topic. B. Privacy – people entrust sensitive personal information to companies’ Web sites expecting in return this information is kept safe and secure. Some information, once released intentionally or inadvertently by security breaches, can be used for good purposes or ill intents. Hacking is now quite rampant, despite many security measures undertaken by organizations, and the loss of privacy is a violation of a basic human right. Personal information, all proprietary business data and classified materials that are hacked represent a serious threat and adverse concerns to individuals, business firms and governments worldwide, because it is a digital invasion. 1. Individual Users – the most serious thing that happens to people is identity theft, causing serious consequences with stolen personal data that used to impersonate that person. The use of that information can be seen in financial fraud, such as the fraudulent use of credit cards. 2. Business Firms – entities engaged in business should be extra vigilant, as the loss of any of their company data can be disastrous. Important information, such as a customer database, the list of suppliers and buyers, bank account, and sources of its financing are vital to its survival and should be safeguarded adequately at all times before anything untoward happens. 3. Government Agencies – state and federal agencies are not exempt from security threats and must also protect themselves. An example will be a state pension agency that handles pension claims of senior or retired citizens. Many old people may just opt to file claims on-line for the convenience but leave themselves vulnerable, since many of them are not very familiar with all security protocols. Their idea of security and confidentiality may not match that of reality; or their cognitive functioning may have been impaired by old age (Gudur et al. 2010). Conclusion Organizations with Web sites are morally and ethically bound to protect the people who gave information to their site because they trusted the site; gaining unauthorized access to a digital account is a crime, but users must be on the lookout (Andert & Burleson, 2005, p. 122). Reference List Andert, S. & Burleson, D. K., 2005. Web Stalkers: Protect Yourself from the Internet Criminals and Psychopaths. Kittrell, NC, USA: Rampart TechPress. Gudur, R. R., Blackler, A., Mahar, D. & Popovic, V., 2010. The Effects of Cognitive Ageing on Use of Complex Interfaces. OZCHI 2010, November (22-26), pp. 180-183. Radke, K., Boyd, C., Brereton, M. & Nieto, J. G., 2010. How HCI Design Influences Web Security Decisions. OZCHI 2010, November (22-26), pp. 252-255. Rutherfoord, R. H. & Rutherfoord, J. K., 2010. Privacy and Ethical Concerns in Internet Security. SIGITE 2010, October (7-9), pp. 131-134. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Internet Security and Privacy Book Report/Review, n.d.)
Internet Security and Privacy Book Report/Review. https://studentshare.org/information-technology/1779889-the-internet-has-changed-the-face-of-conducting-our-affairs-today-from-ebusiness-ecommerceas-a-result-of-these-changes-there-are-also-ethical-concerns-that-have
(Internet Security and Privacy Book Report/Review)
Internet Security and Privacy Book Report/Review. https://studentshare.org/information-technology/1779889-the-internet-has-changed-the-face-of-conducting-our-affairs-today-from-ebusiness-ecommerceas-a-result-of-these-changes-there-are-also-ethical-concerns-that-have.
“Internet Security and Privacy Book Report/Review”. https://studentshare.org/information-technology/1779889-the-internet-has-changed-the-face-of-conducting-our-affairs-today-from-ebusiness-ecommerceas-a-result-of-these-changes-there-are-also-ethical-concerns-that-have.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internet Security and Privacy

Privacy and Internet Policy

hellip; It deals with the desire of personal privacy that concern the transmission of data through the internet.... You should never base on fake emails to update your security information.... Doing so, would compromise your security.... security Socket Layer (SSL) it is a technology that enables users to set up sessions with internet sites that are secure.... Introduction The internet policy statement is applied to all types of on-line services that are accessed over the internet....
5 Pages (1250 words) Essay

The Use of the Internet for Purchasing Goods and Services Has Enormous Potential

The paper "The Use of the internet for Purchasing Goods and Services Has Enormous Potential" describes that the use of the internet for purchasing goods and services has enormous potential.... The internet enables consumers to shop or do transactions 24 hours a day, all year round from almost any location.... hellip; The internet has brought the whole world together and in addition to it, the tastes and interests of the people are organized well....
8 Pages (2000 words) Essay

Social Media Platform

In terms of its security, there are aspects that deem a great deal of attention especially since the people all over the world make use of it and hence have to be sure that they are using a website which ensures complete security and data protection.... Privacy is related with how Facebook users prevent disclosing their respective information to people who are unwanted and have no say internet security Facebook is a social media platform that is renowned all over the world....
2 Pages (500 words) Essay

Contribution of Internet Use to Privacy

The author concludes that internet has endangered people's privacy, making their private information vulnerable to fraudulent activities.... hellip; While technological advancements have progressed at an alarming rate, the measures to protect the privacy of its users have not been modernized to accommodate these advancements....   Even with the appropriate legislative policies enacted by government authorities these measures still fail to protect people's privacy....
2 Pages (500 words) Essay

Assignment 2: Building on Prior Success

Securing privacy in the Internet age.... This version of operating system… Protecting the contained data from unauthorized access remains critical to the success of the network; therefore, installation of an operating system with security Building on Prior Success Inserts His/Her Inserts Grade Inserts 22.... This version of operating system contains numerous security protocols that could significantly enhance security of the network system once installed....
2 Pages (500 words) Research Paper

Internet Privacy

College: internet security involves aspects of internet privacy and set up.... Such privacy is guarded by terms and policies of information creation, ownership and rights to intellectual property.... Home security on the other hand applies the same Internet privacy.... Such privacy is guarded by terms and policies of information creation, ownership and rights to intellectual property.... For work places, internet privacy encloses staff and third parties that may be invited by the firm or allowed to access internet by that firm....
1 Pages (250 words) Essay

The NSA, Government Spying, and Privacy

Bush executed the National security Agency's domestic spying program after the September 2001 attack.... From the revelations of Edward Snowden and other independent reporters, we have learned about a numbers of ways the National security Agency is spying on… Given authority by the Patriot Act, the NSA gets the business records related to the terrorist investigations.... With nine major internet companies, the PRISM program lets the National security Agency and access to the private user data on the online services....
4 Pages (1000 words) Essay

Healthcare Informatics

om and Facebook among many others, people openly share their health information with little knowledge of its implications ( One critical question that one should reflect on is whether the patients are aware of the privacy risks involved in exposing their personal health data?... Awareness and education of the users are of paramount importance in mitigating the privacy risks.... Li (2013) observes that there policy implications of using the health social networking sites and the stakeholders and the policy makers should elaborate them to protect the privacy of online health data....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us