• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet Privacy and Security

Extracts from this document...

Introduction

        Internet Safety and Security

        Internet Safety and Security

        Internet Safety and Security        

        Internet Safety and Security        

As the internet continues to grow, we may never be able to completely protect our privacy especially when it comes to shopping online and social networking sites.  

A THESIS


Abstract

I chose this topic because it seems to always be in the news and there is also an interesting section about this topic in chapter three in the text.  Whether it has to do with online shopping or social networking sites, it seems like once we make it on the internet, anyone can be located and can be at risk.  Just Google anyone’s name and you may be surprised about what comes up.  If you Google my name, you may find that in 2003, I won a year’s supply of dog food!  A friend found it and I had no idea that it was posted online.

There are so many ways that we lose our privacy on line and the ways we need to protect ourselves and our personal information.  There are so many avenues where our names can end up on line and everyone needs to use caution when sharing any personal information on line.  Even though I do not think we can be completely successful with securing our privacy on line, there are preventative measures that can be taken.  


Contents

Abstract        

Chapter I Safey and Security On Line: Will we ever be completely safe?        

Works Cited        


Will we ever be completely safe?

As the internet continues to grow, we may never be able to completely protect our privacy on line especially when it comes to utilizing social networking site, shopping online or by simply surfing the web.  There are also so many potential invasions of privacy while spending time on line.

...read more.

Middle

Another instance of this took place on May 14, 2009.  Hackers attacked some of Facebook’s 200 million users by successfully gathering passwords from them in a phishing attack. (reuters.com, 2009) A phishing attack is when phishers send out emails that seem to come from a legitimate site such as Ebay, PayPal and other banking institutions where a link is provided.  The email will direct the receiver to update or validate their information after clicking on the provided link and logging in.  These e-mails may sometimes ask to enter more information such as a full name, address, phone number, social security number, and credit card number.Once you enter the username and password, the phisher will have access to your information. (www.techterms.com, 2009)  Once the hackers had the passwords on May 14, 2009, emails were sent to their friends directing them to click on a link.  Once they clicked on the link, they were brought to the log on screen where they actually logged into a fake site designed to look like Facebook but controlled by the hackers.  The purpose of these attacks is usually for identity theft or spam and this one in particular was believed to be for sending spam for pharmaceuticals and other goods.  

Both Facebook and Myspace require senders of messages to be members and hide user information from those who do not have accounts.  Because of this, most users are not as suspicious of messages they receive.  It is important to be aware of hacker activities and the potential of what they can accomplish (www.reuters.com).   It is also very important to avoid clicking on links within messages or posts of people that you don’t know or accept friend requests from unknown people or groups.

...read more.

Conclusion

www.techtarget.com)    



Works Cited

"Denial of Service Attack". Business Dictionary. August 2, 2009 <http://www.businessdictionary.com/definition/denial-of-service-DOS-attack.html>.

Associated Press, "Hacker Attack Silences Twitter Users". Fox News. August 6, 2009 <http://www.foxnews.com/story/0,2933,537653,00.html>.

"Social Networking Security and Safety Tips". National Consumer League. August 1, 2009 <http://www.nclnet.org/technology/social_networking.htm>.

"Practical Tips for Protecting Online Privacy". Media Awareness Network. August 1, 2009 <http://www.media- awareness.ca/english/resources/issues_resources/issues_tipsheets/protecting_online_privacy.cfm>.

Finkle, Jim. "The Hacker Diaries". August 1, 2009 <http://blog.parametersecurity.com/tag/social-networking/>.

Melugin, Jessica. "Protecting Privacy on the Internet: Melugin Op-Ed in Washington Times". Competive Enterpise Institute. August 2, 2009 <http://cei.org/gencon/019,01787.cfm>.

Associated Press, "Hacker Attack Silences Twitter Users". Fox News. August 2, 2009 <http://www.foxnews.com/story/0,2933,537653,00.html?test=latestnews>.

Finkle, Jim. "Hackers launch phishing attack on Facebook users". Reuters. August 6, 2009 <http://www.reuters.com/article/newsOne/idUSTRE54D6BN20090514>.

 Bradley, Tony. "Introduction to Wireless Network Security". About.com. August 6, 2009 <http://netsecurity.about.com/od/hackertools/a/aa072004b_2.htm>.

 "Port Scanning". Audit My PC. August 6, 2009 <http://www.auditmypc.com/freescan/readingroom/port_scanning.asp>.

 Reavis, Jim. "Are you safe from scanning?". Network World. August 6, 2009 <http://www.networkworld.com/newsletters/sec/0906sec2.html>.

 "Botnet". SearchSecurity.com. August 6, 2009 <http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci1030284,00.html#>.

"The Tech Terms Computer Dictionary: Hacker". TechTerms. August 6, 2009 < http://www.techterms.com/definition/hacker>.

"The Tech Terms Computer Dictionary: Trojan Horse". Tech Terms. August 6, 2009 < http://www.techterms.com/definition/trojanhorse>.

"The Tech Terms Computer Dictionary: Phishing". Tech Terms. August 7, 2009 <http://www.techterms.com/definition/phishing>.

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. The intention of this study is to analyze and explore the emerging field of ...

    of physicists around the world are taking place in compute-intensive simulation studies of the detector, which will help in detector design. It is expected that data from this experiment will be analyzed by more than 2000 physicists at more than 150 universities and laboratories in 34 countries.

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    will fulfil all of the above mentioned requirements of The Whole Earth Restaurant, for example: * User Interface Forms can be created allowing the end-user to enter information into the database without seeing the less user-friendly table format. * The use of features such as Validation Rules and Input Masks

  1. Use the Internet to find ways that some companies currently destroy their data before ...

    Normally, people will either recycle it or throw it away. Although the obsolete computer does not perform well, if at all, the data on hard disk often is contact. Now, here comes the main question which we should ponder. What should we do with those valuable data?

  2. Website Design. This is a Texans Credit Union online website. It has recently ...

    IF customer enters invalid account information then immediately notify customer via web page. 3. a1. IF the customer lacks the necessary funds then immediately reject the CD creation request. 2. Open Account Primary Actor: Customer Stakeholders: Bank teller Trigger: Submission of a "Open an Account" form Relationships: Include: Verify Account Information Extend: Normal Flow of Events 1.

  1. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    On average banks charge about $1.50 for each ATM transaction, this amounted to $2.1 billion transaction surcharges last year. If one network goes down for one hour affecting two thousand Citibank ATMs, how much would Citibank lose? How much more would Citibank be willing to pay for network equipment and services to ensure their network never failed?

  2. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants ...

    in management applications o Backing up network configuration and restoring it in case there is a failure or natural disaster o Manage software images running on network equipment * Accounting Management techniques will allow us to measure network utilization and activities of individual or group uses on the network, for the purpose of network usage regulation and billing.

  1. This research is about Management of network operating system at Natural Forest Resources management ...

    Secondly, I owe to thanks my friends Shagina Isack, Meyasi Anzameni and Deogratius Mosha for their supports and advise about the study. Thirdly I would like to thank my friends, who kept encouraging me to struggle on despite my complaints about some difficulties.

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    Each of the methodologies has there advantages as well as disadvantages. Task 4 In this section of the assignment I am going to discuss what I learnt each week, and how this helped me to do my coursework and built up my understanding of Organizational information systems.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work