Term Paper on "Security and Privacy on the Internet"

Term Paper 5 pages (2048 words) Sources: 1+

[EXCERPT] . . . .

Security and Privacy on the Internet

The importance of privacy is understood at all levels including the American government. Thus in matters of importance, including the Department of Homeland Security, the government has put if offices for minimizing the impact of government actions on the privacy of the individuals, while not loosing sight of the aims of the government. (the Privacy Office of the U.S. Department of Homeland Security) This brings us to the question of what is privacy on the Internet, and that also includes the right of individuals to privacy. Sometimes the data that is being collected about us is being used and sometimes we are not like the data collected in cookies on a Web site. These cookies come into operation when one registers with it, and it requires giving the name, e-mail address etc. This enables the site to know what the users are doing online. In turn it is possible that this information is passed on to others, and some amount of protection against it is only through the privacy policies of the sites that are published in the sites. Privacy permits us to collect information about others and know that the information is correct, and it leads us to anonymity on the Internet. The final point in this is the sending of e-mail or other messages in a manner that they will not be read or intercepted by individuals other than the one for whom it is intended. Most of the time, this requires encryption to be done. (Security, privacy, and confidentiality issues on the Internet)

Some associations require that confidentiality be maintained on the data, and this is also legally required by different laws. The laws require that identification of individuals be
Continue scrolling to

download full paper
maintained in terms of its collection, storage and disclosure. This requires that one makes the required security arrangements for the storage and transmission of personal information, get proper advice before connecting to a network, ensure that the electronic equipment stay in a proper area. At the same time, one has to realize that e-mail can be intercepted. Not maintaining security can lead to unfortunate incidents. A few years ago, a bank purchased a hospital and the hospital had it own medical records. Since both were in the same area, the bank compared its own records with the hospitals and used this to close all accounts where the account holders with a diagnosis of cancer. This is the damage that data in wrong hands can do. However this is not the meaning of security for ordinary users and generally means keeping those attempting unauthorized access from the private data stored in your computer. This data is at risk even before computer connects and may be lost due to fire, floods, stolen, damaged by bad software, reached by the wrong people, and so on.

Thus the system has to be properly backed up in a manner that the system can be re-built from the back ups. This also requires the system to be automatically logged out when it is not likely to be used for some time, and this is possible to be done generally. Also the information in the computer should be visible only to people who are authorized to see it. At the same time, privacy is not seen from a rational angle, but only from an emotional one. Data is only formatted information that has been fed into a system and that system can use the data to identify people while deciding about the characteristics of the person on the information collected. To avoid conflicts on this issue, it is important that organizations using this be clear about how it is going to be used. This includes being open about the use of collected information, clearly outlining the organization's privacy principles, offer the customers an opportunities not to be a part of the system should they desire and educating concerned staff, contractors, affiliates about the importance of privacy and the concerned laws. (Privacy - a strategic viewpoint)

Regarding the practical aspects of privacy on the Internet, the first aspect is the password that one uses. This should be kept secret and not near the computer, or other places, where one may find them. The password may also be changed from time to time. Sometimes it seems that an e-mail has arrived from the Internet service provider or some other contact, asking for confirmation of the password, and this should not be done till the matter is checked with the company. The second matter that one has to take care of is the e-mail, but it is essential to remember that it is like a postcard and even others can read it as long as they have access to the computer. At the same time, it is not a very secret or sure way of communication and sensitive information like credit card numbers or other similar matter through the e-mail service. Of course to some extent the security of -email can be improved with the use of cryptography software, and that is like mixing up your message in a private code. In general one can say that e-mail is a good way for communication, but one may sometimes receive mail from companies or charities that one does not deal with. This is like telemarketing calls and this sort of e-mail can be even a scam and not genuine. (Essentials for Online Privacy: Keep your passwords secret)

In normal cases, if one is not interested, it may be better to delete the message. Another problem may come with protection of privacy online then one can use anonymous facilities like re-mailers for hiding the identity. This may be in situations like personal health etc. Another problem is with group emails that are received and the reply is meant to be seen only by the sender, then one can use a facility like "reply to author." Another important factor is the cookies. These are in general bits of electronic information stored in the computer when one visits a particular Web site. They generally provide a store of the work done in the site, and might also contain a record of other sites that have been visited during that operation. The use of cookies is for identification of visitors so that improved levels of customer service can be provided, customizing information and preferences for the user, marketing the site, and other facilities like quick check out. The browser or special software can be used for finding out the cookies and deciding when and whether they should be kept in the computer. (Essentials for Online Privacy: Keep your passwords secret)

Cookies are used in the computers to solve many interconnection difficulties, but their greatest use is for maintaining a Session ID and this keeps identifying the user of the site to be the same while the entire interaction goes on. This is useful for sites that must have authentication for interaction, this cookie is passed on to the user after the session is completed and thus maintains a permanent possible link to the site. Some attackers can use different methods like sniffing or cross site scripting for getting a SID, then they may use that identity to go on with their own session. At the same time, the site identifies them as the other user who has the SID. The solution to this is that the site that is using the cookie for getting its users identified protects itself from defective arguments by using arguments from users who have similar hosting environment. (Cookie Path Best Practice)

To a certain extent privacy can be protected through the efforts of the sites also and they should inform the users as to how the financial account numbers and other personal information are saved from prying eyes during the time that they are sent. They should also inform whether the information is safe even after the computer session if it being stored by them. Another aspect is not opening attachments to e-mails from previously unknown people as they may have a virus to cause damage to the computer programs or existing files. Another new problem is through the broadband services which give users rapid access to the net. This is being now distributed by telephone companies, cable companies and also through satellite. This service connects one to the Internet whenever the computer is working, and one should be even more careful. (Essentials for Online Privacy: Look for information about security on Web sites)

Another aspect one has to consider is that violations of privacy are of two types and these may be called targeted attacks and data harvesting, and these two types of violations are fundamentally different. When the objective by an attacker is to gain all information about another individual or organization, it may be called stalking the person or industrial espionage for the company. When the objective is only data harvesting the user of the data goes through a lot of data about a lot of subjects and… READ MORE

Quoted Instructions for "Security and Privacy on the Internet" Assignment:

Please use recent references with clickable links.

Within the term paper be sure the following questions are answered:

1. Possibility of security & privacy on the

Internet

2. Best software products and tools to improve privacy &

security.

3. What are cookies and what is their role in

privacy/security?

How to Reference "Security and Privacy on the Internet" Term Paper in a Bibliography

Security and Privacy on the Internet.” A1-TermPaper.com, 2005, https://www.a1-termpaper.com/topics/essay/security-privacy/59637. Accessed 4 Oct 2024.

Security and Privacy on the Internet (2005). Retrieved from https://www.a1-termpaper.com/topics/essay/security-privacy/59637
A1-TermPaper.com. (2005). Security and Privacy on the Internet. [online] Available at: https://www.a1-termpaper.com/topics/essay/security-privacy/59637 [Accessed 4 Oct, 2024].
”Security and Privacy on the Internet” 2005. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/security-privacy/59637.
”Security and Privacy on the Internet” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/security-privacy/59637.
[1] ”Security and Privacy on the Internet”, A1-TermPaper.com, 2005. [Online]. Available: https://www.a1-termpaper.com/topics/essay/security-privacy/59637. [Accessed: 4-Oct-2024].
1. Security and Privacy on the Internet [Internet]. A1-TermPaper.com. 2005 [cited 4 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/security-privacy/59637
1. Security and Privacy on the Internet. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/security-privacy/59637. Published 2005. Accessed October 4, 2024.

Related Term Papers:

Security Privacy Term Paper

Paper Icon

Security vs. Privacy in the National Intelligence Debate

Too often, when people are afraid, privacy -- as well as other civil liberties -- is sacrificed on the altar security. There… read more

Term Paper 9 pages (2504 words) Sources: 1+ Topic: Government / Politics


Internet Privacy Issues the Digital Revolution Essay

Paper Icon

Internet Privacy Issues

The digital revolution has already changed contemporary society in numerous ways. One of the more important emerging issues is the need to balance the privacy concerns and… read more

Essay 3 pages (901 words) Sources: 6 Topic: Government / Politics


Security Policy Dr. Fossett's Dental Office Term Paper

Paper Icon

Security Policy of a Dental Office

Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the… read more

Term Paper 3 pages (1254 words) Sources: 0 Topic: Computers / IT / Internet


Security Issues of Online Communities Term Paper

Paper Icon

Security Issues of Online Communities

Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials.… read more

Term Paper 60 pages (15576 words) Sources: 1+ Topic: Computers / IT / Internet


Internet Privacy Term Paper

Paper Icon

Internet Privacy

The Internet has become nowadays more and more a part of our lives. Business is transacted online, relationships are maintain through this virtual global space, the public services… read more

Term Paper 4 pages (1357 words) Sources: 3 Style: MLA Topic: Computers / IT / Internet


Fri, Oct 4, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!