StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ow is the internet privacy being attacked now-a-days - Essay Example

Cite this document
Summary
The internet privacy is under attack through identity theft, which has become so common that more than 10 million people were made target of identity theft in 2005 in the U.S. only. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Ow is the internet privacy being attacked now-a-days
Read Text Preview

Extract of sample "Ow is the internet privacy being attacked now-a-days"

Q1. According to the how is the internet privacy being attacked now-a-days? What are the dangers involved with the loss of privacy? To whatextent—if at all—do you think the authors are correct about their concerns? The internet privacy is under attack through identity theft, which has become so common that more than 10 million people were made target of identity theft in 2005 in the U.S. only. The major risk of identity theft is not from computer users but from the companies’ security systems, keeping detailed histories of individual information, such as credit statements, critical social security and driving license numbers.

This internet theft causes huge losses to the companies, as thieves know about the product choices of individuals, which helps them in stealing. Private information about people is targeted through hacking by compromising the systems of companies, as it happened in May 2006 when detailed individual information of twenty-six million military veterans was stolen. Attack on individual privacy is violation of a person’s right over such information. It is a criminal act, which has endangered the right to privacy.

As consumers of products, individuals are almost feeling like they are on the two-edged sword of privacy and violation. Danger is from such wicked people bent on stealing personal information by any possible means, such as inspecting the papers thrown in garbage for reading the bank account numbers and by sorting through the online trails. Once, such criminals get their hands on the bank account numbers of the customers, they start interacting with the bank officials, pretending to be bank customers.

Such news is common that after getting access to critical banking information, customers’ mobile numbers are declared non-operative, indicating that the SIM card of that mobile number has lost. New SIM cards are presented to the bank so that when the bank’s online system sends a new password to transact online, that messaged password is used by criminals to operate the bank account online. It has been happening, as one reads through newspapers. Such risks end up in financial frauds when to the surprise of the bank account holder, the account shows zero balance, as all funds have been transferred by such unscrupulous elements.

Financial frauds are not the only danger of the theft of personal information. Personal life of the common man has been taken for granted by corporations for their product promotion timing and stock-keeping even with the invention of Radio Frequency Identification Devices (RFIDs). These are tiny microchips with small antennas embedded on the bar codes of all types of products. This way, manufacturers can trace the product to know the consumption pattern and time so that new stock could be made available.

Online sale of RFIDs products helps in storing the consumer data through the credit card for that product use. Suddenly databases have gained significance, as all information is stored in databases of the companies, which are on the hit lists of cyber criminals for using that information to fulfill their nefarious aims. Future holds the key how the critical information gathered by government agencies and corporations is going to be misused through cyber frauds. Dangers, therefore, are that companies might misuse this information or could be sold to third parties for earning bucks by the employees of such corporations.

Nevertheless, the more important question is the legal aspect of the issue of privacy, as the right of a person is taken away without the knowledge of that person. Therefore, dangers are both at personal level and financial level. There is no guarantee that financial dangers can be avoided even if consumers are alert enough because the systems of services providers are not robust enough to keep cyber criminals away. At the same time, the right to personal privacy is in danger for totally different reasons of corporations using RFID technology to get business leverage.

The authors are fully correct about their concerns for attack on individual privacy for stealing financial information through mobile numbers and passwords. It is a genuine concern, as no one would want such things to happen at their cost. It is the prime responsibility of financial companies to create awareness on maintaining secrecy of their customers’ bank account information. Hackers are always on the search of finding new means, which the same technology provides to them of corrupting account information by stealing a person’s identity.

Systems of financial firms need to be robust enough to protect the possibility of identity theft. At the personal level, companies desire to use customer information without informing customers, which is totally wrong. Various uses of RFIDs need to be controlled for misusing the information. Companies should openly declare their intentions of using the personal information. Generally, it is seen that personal information of customers is sold to third parties for monetary benefits without taking customers into confidence.

This is a wrong practice. It should be legally punishable. At government level also, systems’ security needs to be given top priority so that cyber crimes are not repeated, as it happened in 2005, when hackers compromised the systems of big financial companies, such as Bank of America, Ameritrade, Cityfinancial, Time Warner, and other companies.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ow is the internet privacy being attacked now-a-days Essay”, n.d.)
Retrieved from https://studentshare.org/english/1466817-ow-is-the-internet-privacy-being-attacked-now-a-days
(Ow Is the Internet Privacy Being Attacked Now-a-Days Essay)
https://studentshare.org/english/1466817-ow-is-the-internet-privacy-being-attacked-now-a-days.
“Ow Is the Internet Privacy Being Attacked Now-a-Days Essay”, n.d. https://studentshare.org/english/1466817-ow-is-the-internet-privacy-being-attacked-now-a-days.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ow is the internet privacy being attacked now-a-days

Denial of Service Attacks

Denial of Service (DoS) attacks on internet-connected systems can be particularly virulent.... 2] The TCP/IP protocols form the basis of today's internet, but these protocols lack even the basic mechanisms for security, such as validation or encryption.... Agreed....
4 Pages (1000 words) Essay

Internet Safety: How to Protect Yourself

This paper "Internet Safety: How to Protect Yourself" discusses how to protect an organization network that has a connection to the internet.... hellip; The results show the security issue includes vulnerability and social engineering and how it becomes a threat to any organization which has a connection with the internet.... With the advanced technology that we have right now, a security issue has become an essential problem for any organization, which uses the internet, around the world....
15 Pages (3750 words) Case Study

Conducting Cyber Intelligence and Restricting Cyber Attacks on Organizations

This paper discusses how cyber intelligence has played its important role and how the cyber attacks can bring problems for organizations whenever they hit them.... nbsp;Cyber intelligence is a method through which security threats are tracked, countered and analyzed in a number of different ways....
12 Pages (3000 words) Essay

Network Security and Growing Problems Protecting your Privacy

The methods can be done from across the globe being sent thru an email to millions of people to entice them to open or allow access from them to the network.... Another method used by hackers is to use devices that passively listen to networks by accessing the broadcast being sent between the networks.... In Wi-Fi signals, the information being broadcasted is usually "open" since you cannot see what is being sent over the stream....
18 Pages (4500 words) Research Paper

The Analysis of the Heartbleed

This affords hackers with a method of infiltrating and exploiting information across the internet.... SSL, this shorthand represents Secure Sockets Layer—It is a security standard that allows secure transmission of information to occur between you and a service without the risk of interception of vital information by a third party....
16 Pages (4000 words) Essay

Effectiveness of SSL and Certification Authentication to Protect Clients

To this end, the SSL and Certificate Authentication processes have been developed and refined over the years to better protect the client and enhance the security of information stored digitally and electronically via the internet and other mediums (Alnatheer, 2014).... The problem is that the internet is increasingly becoming a place where the transmission of private information, such as credit card data, is a potentially dangerous activity that could result in the data being intercepted by hackers that would seek to do harm....
14 Pages (3500 words) Research Paper

Types of Hacking

The paper "Types of Hacking" discusses that recent years have seen the development of a number of interesting developments which detail how the techniques of cyber intrusions and attacks may be used on a national level, executing of host applications, and specific malicious actions.... hellip; Stuxnet may officially be the first know “worm” ever designed that was purposefully geared to target “real worlds” infrastructure, like water plants and power plants....
24 Pages (6000 words) Coursework

Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers

The proponents of counter-strikes emphasize that allowing companies to hack back would reduce the risk of being attacked repetitively and also make it possible to protect their key intellectual properties (IPs).... The objective of this paper "Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers" is to demonstrate why private companies and governments can mitigate a cyber-attack by destructively counter-striking against attackers....
10 Pages (2500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us