Internet has become an important part of our lives, it makes a lot of our basic duties easier such as paying bills, buy articles or even getting education online, but is it is all the information that we are storing on our computer secure? . The information stored on our computer is definitely not completely secure. There is many threats that can compromise users’ identity and data on internet, which could lead to serious problems if the appropriated security measures are not taken.
The risk is present every time a computer is turned on. Every computer is hackable, the only one that is not is the one is turned off. The technology and internet has grown so much that we are connected to the internet from our phones, computers, tables etc. therefore privacy infringements through the Internet have gotten out of hand. Until privacy becomes a principal concern for Internet users, they remain unsafe, the list of threat would be enumerable and I would like to mentions just a few examples like social engineering, cookies or the most popular social networks such as Facebook, twitter or LinkedIn
While internet is an important part of our modern lives, the majority of users usually don’t take the appropriate measures. Internet users don’t realize that the risk is real and can compromise identity, financial and personal information.
Privacy and security are two things that are hard to find on the Internet today, there are millions of skilled computer professional trying to get people information, but sometimes they don’t use their computer skills they use tool such as social engineering.
Believe it or not tricking a person into giving personal information away is not that hard to do. Hackers know this, and use it in so many wa...
... middle of paper ...
... good privacy settings for their profile and not having any unknown user as friend or contact on their accounts.
I would like to make a call to the computer and internet users to be cautious how you use the social-networking sites, because after you share your information it is always going to be out there no matter if the user deletes the post, after a person post a picture or information on internet or social sites is out of his control.
Finally, is good for users to remember that risk and treat on internet and computers against privacy are present in the computing world. Examples such as social engineering, cookies and social-networking sites are just a few of the millions of the risk users could face every day in the internet. The prevention starts on each one of us, we need to be aware of the risk at the same time be concern about our own private information.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Computer based information systems are an important part of the world today. We use them to make educated decisions that would have been just plain guesses in years past. We use them to collect data from all sorts of different sources and to turn all that raw data into useful information. The information that is created is shown to us in many ways. It can be in the form of reports, graphs, images, or even sounds. They can even help an organization gain a competitive edge on their rivals. Organizations can use computer based information systems to gather consumer data to judge which of their products is selling the best to get a feel for what they should be working on next.... [tags: Computer, Operating system, Internet, Information]
863 words (2.5 pages)
- ... A common technique of providing facts assurance is to have an off-site backup of the records in case one of the cited problems arise. It is obvious that the reason why those organizations value information security so high, due to the condition to be a hacker is getting simpler and simpler. As of nowadays internet environment, some factors that might contribute to the increasing vulnerability of information resources: 1. Today’s interconnected, interdependent, wirelessly networked business vulnerability; 2.... [tags: Computer, Computer security, Information security]
983 words (2.8 pages)
- ... The task of the GPU is to calculate advanced algorithms which will render an image onto the screen. All video output being displayed onto a screen is being rendered by the GPU. A computer also needs to store data so it has two ways of doing that: long term storage via Hard Drive, or short term storage via RAM (Random Access Memory). The hard drive is a nonvolatile type of memory meaning that all information stored on it will be retained even after the computer has been powered off. RAM is a volatile type of memory, it loses all data once the computer has been powered down.... [tags: Konrad Zuse, Computer, Computer data storage]
732 words (2.1 pages)
- ... Storage capacity is another method of measuring aspects about an information system. Printed circuit boards can contain thousands of circuits used to store information. The most basic type of storage unit is a bit. This is a digital unit where it is either turned on or off. Eight bits strung together equals one byte. Bytes are the base unit when discussing storage capacity in a computer based information system. Prefixes are added which multiply. Table 2.12 Name Abbreviation Number of Bytes Byte B 1 Kilobyte KB 1,000 Megabyte MB 1,0002 Gigabyte GB 1,0003 Terabyte TB 1,0004 Petabyte PB 1,0005 Exabyte EB 1,0006 Zettabyte ZB 1,0007 Yottabyte YB 1,0008 Computer memory has differing forms.... [tags: Computer data storage, Computer, Hard disk drive]
1104 words (3.2 pages)
- ... Social media has grown dramatically in the last decade and this gives hackers just one more route to get to personal information. A great way to eliminate information being taken advantage of by unwanted attackers is the use of a little something called The CIA Triad. When you hear the term CIA, you probably automatically think of the Central Intelligence Agency. But in this particular instance, we are going to be talking about Confidentiality, Integrity and Availability. The CIA Triad is a venerable, well-known model for security policy development, used to identify problem areas and necessary solutions for information security (Perrin, 2008).... [tags: Computer security, Information security, Security]
732 words (2.1 pages)
- Microcomputers: (Notebook, Laptop, Desktop and Tablet PC) Microcomputers are the smallest systems in the market. The size range is from calculator to desktop size. Its CPU is microprocessor. It also known as PC, their aim is to satisfy the needs of public and are single-user computers. They are used for common applications such as gaming, social networking, and internet research. Justify the performance, limitations Justify why this type is suitable to a particular environment Desktop: Desktop wasn’t designed to be portable.... [tags: Personal computer, Computer, Minicomputer]
1212 words (3.5 pages)
- Input Data is factual information and it needs to be accurately captured in order to be processed. There are many methods to input data and each situation warrants a different method. There can be several different ways to input the information and it can be done in an automatic fashion, as with a computer, or it can be done manually, as with a human writing the information down. For instance, printed questionnaires would best use a special scanning device called an optical data reader that uses optical mark recognition (OMR); when people complete the OMR form using pencils to fill in boxes on OMR paper an optical mark reader (OMR) can convert the pencil marks into digital data.... [tags: Technology Computer Components]
1169 words (3.3 pages)
- History of the Computer The first devices that resemble modern computers date to the mid-20th century (around 1940 - 1945), although the computer concept and various machines similar to computers existed earlier. Early electronic computers were the size of a large room, consuming as much power as several hundred modern personal computers. Modern computers are based on tiny integrated circuits and are millions to billions of times more capable while occupying a fraction of the space. Today, simple computers may be made small enough to fit into a wristwatch and be powered from a watch battery.... [tags: Technology Innovation Computer History]
1231 words (3.5 pages)
- Alternative Solutions Computer System Using a computer system would solve a lot of problems. When a customer wants to join the shop bonus club, their information could be added to a special file. All the information would be stored in a database using a program such as "access" in three tables, stock table, customer table, and employee table. This data would be linked Using a HCI like Visual Basic, someone in the company could create an easy way for customers to add their details, amend current details or delete their details if they wanted to stop being a member.... [tags: Computer Science]
517 words (1.5 pages)
- Computer Security in the Information Age Computers; they are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today’s society and the lives of the people who live in it. They have crossed every national, racial, cultural, educational, and financial barrier, which consequently ushered in the information age. A computer is a programmable electronic device that can store, retrieve and process data, and they come in all shapes, and sizes.... [tags: essays research papers fc]
2236 words (6.4 pages)