StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Main Areas and Aspects of Cyber Safety - Essay Example

Cite this document
Summary
The paper "Main Areas and Aspects of Cyber Safety" has identified that after the evolution of the new technology-based system, the world has completely changed. New technology has offered a great deal of support and facility in case of better handling and management of the business operations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful

Extract of sample "Main Areas and Aspects of Cyber Safety"

CYBER SAFETY JOURNAL ARTICLE Cyber Safety Journal Article Name Date Abstract After the evolution of the new technology based system the world has completely changed. New technology has offered a great deal of support and facility in case of better handling and management of the business operations. Our new generation is more and more involved the new technology based systems and platforms. In this scenario there is a great deal of advantages and associated issues have been evolved. Security and privacy is one of main and fundamental issues in case of such technology based armaments. Cyber-safety is the responsible and safe utilization of the web/internet services as well as the entire communication and information technology devices, comprising digital cameras, mobile phones and webcams. Additionally, it also comprises security for the equipment from viruses and or scum-ware. In today’s information technology based world people are surrounded with lots of threats of information theft and leakage. In this way, they are all the time under the danger of possible information security attacks. This leads to some of the main security concerns in this technology based era. This research is aimed to assess some of the main and possible aspects and issues regarding cyber-safety, its possible influences and protection mechanisms. INTRODUCTION Recognizing the liability that came through new age of technology is a main safety concern. It is improbable that we would send our child out to cross the street with no first giving the instructions for safe crossing. Nor would we hand over keys of car to our teens previous to learning how to drive as well as earning a driver’s license. In addition the consequences of an error in analysis of online surfing can be immediately as severe and continuing. So that we require allowing both ourselves as well as our family to utilize the internet and take pleasure in the entire the positive advantages it presents (The Alliance of Guardian Angels, Inc., 2007). In this scenario, the current web based technology is able to be a magnificent resource for knowledge and information for all the types of people. This technology is presently in use of government servers, public services and business management. However in last few years it is assessed that open access to internet is able to present a number of hazards. For instance, an 8 year old child might perform an online search intended for "Lego." Although by means of immediately one overlooked keystroke, the word "Legs" is searched in its place; moreover the child can be heading for to a slew of internet sites by means of a focus on legs; a number of which can hold pornographic material. For this reason it is significant to be conscious of what our kids watch and listen on the web, which they convene, as well as what they share regarding themselves on the web. In addition, simply like some protection issue, it is intelligent way to talk to your kids regarding your fears, get benefit of resources their protection, as well as keep a close eye on their behaviors (KidsHealth, 2011). This research is aimed to analyze some of the main and basic security issues regarding Cyber-safety and their possible influences on children and other working areas. Why Cyber-Safety? This section will assess some of the main aspects of cyber-safety those are required to know about why we require the cyber-safety. A cyber-safety paradigm involves a lot of issues. In case of any cyber-safety attack the cyber attacker makes use of the Internet to search for victims to get benefit at any rate and way through using emotionally, sexually, financially or psychologically (Wikispaces, 2011). In addition, the cyber attackers are familiar with how to influence kids, making trust as well as friendship where not any such thing exists. In this scenario, the cyber-bullying is a new term which refers to the utilization of new age technology intended for social cruelty that is able to comprise impersonation, harassment, trickery, denigration, stalking, and exclusion (Wikispaces, 2011). Moreover, these cyber-bullies can make use of chat rooms, email, instant messaging, discussion forums, well-known teen websites and mobile phone text messages. Unsuitable content has been described in the Children’s Internet Protection Act as illustration that are child pornography, obscene or such abused online material "harmful to minors" types comprising hate groups, pornography, illegal activity, violence, online advertising and extremist groups (Wikispaces, 2011). What are the ways of Cyber-Crimes? This section outlines some of the main ways and methods those are used in case of possible increase in cyber crimes. These main aspects turn out to be major reasons of increasing overall cyber-safety mechanism. The basic purpose of this section in the article is to offer awareness about the utilization of online resource for the possible protection of safety of information and data. In this scenario, the first basic source of cyber-crime could be web surfing, which is the process of visiting documents as well as viewing online websites. Additionally, sometimes web surfing is not so appropriate. For instance, in case of a keyword mistake or relevance of some topic an inappropriate material appears on the web that leads to possible issues about children mindset (The Alliance of Guardian Angels, Inc., 2007). Another important source of cyber-crime is online chatting, which has turned out to be a much loved method intended for people to link online in a group (or to a chat room) to share related interests. Online chatting is similar to discussion, apart from that we type words rather than converse them. On the other hand, nowadays the cyber attacker makes use of such chat rooms to attack and hijack the overall cyber safety of individual (The Alliance of Guardian Angels, Inc., 2007). In addition, e-mail is also one of the majority usually employed features of computers by means of Internet links. E-mail could be employed efficiently in a range of methods through children to write to friends and family members, communicate by teachers, and yet link to well-known people as well as experts in a variety of fields. Moreover, nowadays the email technology is used for the fishing and online farads (The Alliance of Guardian Angels, Inc., 2007). Another well known technique known as instant messaging (or just IM) permits two or more people to converse with each other by typing from side to side in real time. However, such type of online communication channel presently also involved some of issues and aspects regarding the personal security hijacking. A number of issues and problems emerge due to theft of personal information due to such instant messaging systems (The Alliance of Guardian Angels, Inc., 2007). In the same way another most important aspect is regarding file sharing. It is one of the best tools utilized by the online hackers and attacker to share and send invitation for some software downloading. Some of the hidden programs are attached to such attachments and applications those install and secretly transmit information to such hacker (The Alliance of Guardian Angels, Inc., 2007). Furthermore, nowadays the social network is one of favorite online platforms for the people in order to transfer information and sharing information to friends. Though a great deals of personal information and security attacks are performed through such platforms. Here user personal information hacking and a number of security issues and popular (The Alliance of Guardian Angels, Inc., 2007). Another entertainment aspect on internet is known as gaming, which is an extra alternative intended for young people, as well as gaming online are able to be extremely exciting. The thrill of rivalry, the easiness of right to use to novel games and excellent graphic properties makes this activity amusing intended for children. However for the reason that of the capability to as well chat with other players, safety problems emerge in case of better security management and handling. Such issues can lead to personal information theft and hacking related issues (The Alliance of Guardian Angels, Inc., 2007). What are the consequences of lack of cyber-safety? There are lots of issues and aspects those emerge due to the lack of cyber safety. This leads to some of main issues and aspects those are really damaging to some individual or corporate credibility. There are lots of aspects those we need to consider in case of overall assessment of the possible online attack. This section outlines some of the critical influences of the lack of cyber safety (The Alliance of Guardian Angels, Inc., 2007) and (Shelly, Cashman, & Vermaat, 2005). The first and prime problem which occurs due to the lack of cyber safety is identity theft that is one of the main issues today. In case of such attack a hacker can hack your personal identity and use it in wrong means. This leads to some of possible issues regarding personal security and information management (The Alliance of Guardian Angels, Inc., 2007). Another issue is about data theft which causes many other issues as well as it is most serious issue for the business and corporate areas. In case of possible attack to business arrangement leads to some of issues. In such kind of attack a person and take the whole corporate data or damage it. This cause an overall corporate working and operational breakdown (The Alliance of Guardian Angels, Inc., 2007). Another security threat known as denial of service or DoS attack is highly venerable for the business working arrangement. In such kind of attack the overall business information technology based arrangement stop working or processing some possible network requests. Such type of issues leads to possible corporate working and operational damage (The Alliance of Guardian Angels, Inc., 2007). In the same way there are different kinds of viruses’ attacks, which are approximate experienced by every user of computer system. In case of such types of attacks the overall system working can be disturbed and issues regarding effective working performance can emerge. In such condition there is huge influence of smooth working of personal or corporate computer systems (The Alliance of Guardian Angels, Inc., 2007). Moreover, the sense of anonymity on the web formulates it an ideal playground intended for students to take on in nasty behavior. In a research of 2007 by the National Crime Prevention Council (or NCPC) outlined that 43% of teens outlined as being victims of cyberbullying. Additionally, the Cyberbullying is able to compose of distribution lies as well as rumors regarding a person, targeting and insulting someone’s sexuality or physical look, unreliable students into revealing secret data and information and then distributing it, plus posting victim’s photos and information without his consent. Technology employed is this process can be instant message applications, cell phones, e-mail, chat rooms, polls, websites as well as blogs (The Alliance of Guardian Angels, Inc., 2007). What are online protection tools? Online tools are accessible that allow us to manage and control our systems working and in-coming internet traffic. Such types of systems are great deal of more suitable in for kids' personal management particularly for the handling and controlling the access to adult material as well as facilitate guard them as of Internet predators. No alternative is going to assure that they will be kept away from 100 percent of the dangers on the Internet. Consequently it is significant to be aware of our kids' computer actions as well as teach them online risks (KidsHealth, 2011). In addition, a lot of ISPs (Internet service providers) offer parent-control alternatives to block some data or material as of coming into a computer. We are able to as well obtain software that facilitates to block right of entry to specific websites based on a "bad site" list that our ISP produces. Moreover, filtering computer programs is able to block websites from coming inside and limit personal data and information from being transmitted online. Other applications can also be used for checking and tracking online working and activity. As well, ensure our kids produce a screen name to defend their real identity (KidsHealth, 2011). What should be the Protection Strategy? This section presents some of the main protection strategies regarding the protection against the cyber crimes and establishment of effective cyber-safety. In case of cyber safety management there is greater need for the safety of our PC through systems such as anti-virus, anti-spyware in addition to a firewall. The attempt to put into configuring, facilitating as well as updating this vital software will additional as compared to pay off in the long run through protecting us as of malicious intrusions online. As well, keep protected both our operating system plus information safety software state-of-the-art (Lavasoft, 2011). In addition, people can protect themselves from some possible attacks by keeping their eyes open in a web based transaction and working arrangement. This will offer a better opportunity in case of enhanced personal security management. Additionally, they need to make use of only those websites which are offering SSL based security and provision of better management (Lavasoft, 2011). Nowadays the wireless communication networks are highly popular in case of communication and collaboration. In such cases there is higher need for the security management and protection in case when we are working in wireless communication network arrangements. This will lead to better handling and management of security and privacy of personal information and data (Lavasoft, 2011). In addition, we should not loan our PC out to friends as well as peers however if we do, confirm they are working under a limited-user working account as well as not offer them a supreme powers of the administrator account. This will reduce rage of damage in case of any accident (Lavasoft, 2011). In such scenario we need not to offer and post excess of data and information regarding our self, whether it is on a private website, chat room or blog. Identity theft is a factual as well as rising difficulty, and openness on the Web is able to lead to someone producing our data and information for their advantage (Lavasoft, 2011). Passwords facilitate defend our information and computer plus our variety of accounts as of illegal access. Make use of complex passwords that are at least 10 characters, encompassing symbols, letters and numbers. In such case we need not to leave our browser store passwords and log-in documents, this is particularly significant to keep in mind if we are making us of shared computer (Lavasoft, 2011). Furthermore, we do not need to open suspension emails and instant messages in case of holding possible protection for the personal and secrete information protection. Here we also need to click on web based links given in the instant messages or open e-mail attachments if not we expect it. In addition, we need to confirm the attachment previous to opening as well as scan by means of updated anti-virus software initially (Lavasoft, 2011). Moreover, taking back up data is also one of the main attempts in case of protection regarding the possible attack. In case of proper data backup we can have a great deal of improved protection regarding the data and information. This will offer us a better opportunity in case of business and corporate arrangement (Lavasoft, 2011). CONCLUSION With the growing development in internet technologies the trend of cyber safety is also growing. Cyber-safety is the responsible and safe utilization of the web/internet services as well as the entire communication and information technology devices, comprising digital cameras, mobile phones and webcams. Additionally, it also comprises security for the equipment from viruses and or scum-ware. In this research and analysis based report I have presented a deep and detailed analysis of some of the main aspects of the cyber safety. In this scenario I have outlined some of the main areas and aspects of the security those need to be implemented for the better management of online security aspects. This research has highlighted some of the possible dangers those are required to be dealt with for online security and privacy management. REFERENCES KidsHealth. (2011). Internet Safety. Retrieved May 08, 2011, from http://kidshealth.org/parent/positive/family/net_safety.html Lavasoft. (2011). Cyber Safety 101: Tactics for Teens and Young Adults. Retrieved May 06, 2011, from http://www.lavasoft.com/mylavasoft/securitycenter/articles/cyber-safety-101 Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology. The Alliance of Guardian Angels, Inc. (2007). Cyber Safety Guide. Retrieved May 09, 2011, from http://www.cyberangels.org/docs/cybersafetyguide.pdf Wikispaces. (2011). D9 Cyber Safety WebSite. Retrieved May 04, 2011, from http://cybersafety.wikispaces.com/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cyber Safety, the Ways of Cyber-Crimes, Consequences of Lack of Cyber- Essay, n.d.)
Cyber Safety, the Ways of Cyber-Crimes, Consequences of Lack of Cyber- Essay. https://studentshare.org/information-technology/2058714-cybersafety-journal-article
(Cyber Safety, the Ways of Cyber-Crimes, Consequences of Lack of Cyber- Essay)
Cyber Safety, the Ways of Cyber-Crimes, Consequences of Lack of Cyber- Essay. https://studentshare.org/information-technology/2058714-cybersafety-journal-article.
“Cyber Safety, the Ways of Cyber-Crimes, Consequences of Lack of Cyber- Essay”. https://studentshare.org/information-technology/2058714-cybersafety-journal-article.
  • Cited: 0 times

CHECK THESE SAMPLES OF Main Areas and Aspects of Cyber Safety

Security Risks on the Web: Problems and Solutions

Routinely every week, you have checked your bank account online and find you have several transactions which were carried… With these, these questions arise: How and when did these companies gather my information?... An example given by Smith (2005) is that in identity theft, there are many conditions that these thieves got the information of their victims from online databases used by credit card...
9 Pages (2250 words) Essay

Methods to Stop Different Cyber Crimes

urther, Internet users can stop cyber crime by using their computer's firewall protection feature.... Further, cyber crime also involves the sale of drugs through the… Although many Internet users end up being victims of these illegal activities, there are ways by which these criminal activities can be stopped or prevented (Ehow, 2012). The password used to secure one's online accounts or information Methods to Stop Different Cyber Crimes Cyber crimes are illegal activities done by individuals over the Internet....
2 Pages (500 words) Essay

A factual cyber atack

With the increase in the utilization of internet-based applications including financial and control applications, online crimes are also increasing in number.... The simplest type of cyber crime is No: A Factual Cyber Attack With the increase in the utilization of internet-based applications including financial and control applications, online crimes are also increasing in number.... The simplest type of cyber crime is to spread the virus online (“What is Cyber Crime?...
2 Pages (500 words) Essay

Cyber Insecurity

The paper "Cyber Insecurity" states that unless pragmatic steps are taken to give total protection to users of the internet and other information systems against cyber insecurities, the interest that people have in using technology in advancing communication and commerce will bring down.... Cyber security is a term that is often used to represent the kind of protection given to personal information and digital documents.... In his article “Countermeasures for cyber security”, Deritck (2011) clearly states that unless pragmatic steps are taken to give total protection to users of the internet and other information systems against cyber insecurities of all forms, the interest that people have in using technology in advancing communication and commerce will bring down....
2 Pages (500 words) Research Paper

Latest Cybercrimes According to Cyber Security Bloggers

According to statistics by USA Today poll, 24% of Americans have… This presents an unfortunate situation since even the most careful online shoppers are not guaranteed 100% protection from identity theft or credit card fraud.... This presents an unfortunate situation since even the most careful online shoppers are not guaranteed 100% protection from identity theft or credit card fraud.... Most shoppers have the view that online shopping is more risky than ever....
1 Pages (250 words) Essay

Cyber Chase Challenges

This current scenario is a monumental change from the last century in terms of not just the profile of the malware 'specialist' but the various tools, modus operandi and the scope and span at his command today.... The paper "cyber Chase Challenges" names malware writers and cybercriminals as the white ants of the internet era, eating into the foundations of our networks.... If anything, it is vast tracts of technology and systems security that have gasped to keep pace with the enterprise and ingenuity of the present-day cyber-criminal....
5 Pages (1250 words) Case Study

Security Issues of Bitcoin

Moreover, the storage facility of Bitcoin is provided as online wallets, which are very risky because hackers can develop programs to decrypt security measures and use the information of Bitcoin owners to steal them (Cook, 2010, p.... n attacker can control the network of a client in several ways....
5 Pages (1250 words) Essay

Why Organisations Outsource Business Activities

here activities such as payroll processing, website management, health and safety training are deemed time consuming and difficult to manage as organizations expand, they outsource such services.... … Why organizations choose to outsource business activities;There are many reasons why organizations choose to outsource business activities some of which include;The need to concentrate on core business activities- this has the effect of freeing up Why organizations choose to outsource business activities;There are many reasons why organizations choose to outsource business activities some of which include;The need to concentrate on core business activities- this has the effect of freeing up internal resources thus allowing the organization to concentrate on the more critical activities....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us