Essays24.com - Term Papers and Free Essays
Search

The Threat Of Internet Privacy

Essay by   •  November 2, 2010  •  1,108 Words (5 Pages)  •  2,523 Views

Essay Preview: The Threat Of Internet Privacy

Report this essay
Page 1 of 5

The Threat of Internet Privacy

With the ever rising use of the internet, as well as online banking in businesses, this brings the concern that hackers and viruses may have the ability to access your private information. Recent developments in internet security have been shown to decrease and destroy nearly all internet viruses. Microsoft associates have proven that there are many ways around our man made barriers called 'firewalls'. The question is whether or not your private information can be safe while under this protection.

Internet privacy has always been one of the most concerning subjects for you the consumer. Since the invention of the computer and the internet, there has always been someone who wanted to 'conquer' it. We in the computer world like to call these people hackers. Due to this common threat, we as consumers have developed software to repel these hackers. These software programs are called firewalls and anti-virus scanners. Currently, there is an ongoing battle between the hacker and the hackee. Unfortunately, hackers have developed loopholes and software's of there own to work in there favor. Due to the hacker's resources, they can counteract the consumer's software, find alternate loops to the goal and access your computers vital and personal information.

One method that hackers may use to proceed on through your system is to send you a virus. A virus is a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. "A true virus cannot spread to another computer without human assistance"(Miller). These viruses can be used to cripple ones computer. An anti-virus software/firewall can only handle so much information at one time. You can obtain a virus from the internet by downloading files to your computer as well as something as simple as sending an e-mail (Gralla). When your computers software is concentrating mainly on the virus, this leaves a giant hole in the firewall where it is not protected. This is where the hacker will make his move. While the firewall is distracted, the hacker will steal the information that he came for without suspicion.

Another threat posed by a hacker is a Microsoft based program called cookies. The 'cookie' file is a file that works on the consumer's computer. It contains data passed from web sites, so that web sites can communicate with this file when the same client uses the site again. The web site only has access to the part of the cookie file that represents the cooperation with that website. Cookies are bits of data put on a hard disk when someone visits certain websites (Gralla). The webmaster of the website that installed its cookies to your hard drive is then given a degree of access to your computer. This poses the problem where the webmaster may steal some of your personal information if you were to place an order for a product through their site. Some cookies could also contain viruses which lead to infestation of files and eventually your entire system.

One of the most commonly used and most harmful software's that a hacker can obtain is spyware.

Spyware is software that watches your surfing activities without you knowing about it, reports on them, and then delivers target ads to you based on your activity. Spyware typically is installed on your computer when you install a piece of free software, such as the file sharing software, Kazaa (Gralla).

The hacker is basically viewing all of what you do and access on your computer, like a tape recorder taping your every movement. Anything you do, type, or say is recorded.

Hackers have all proven to have used all of these skills to destroy and collect someone else's personal information in the privacy of their own homes. Although we know that many

...

...

Download as:   txt (6.2 Kb)   pdf (85.8 Kb)   docx (10.9 Kb)  
Continue for 4 more pages »
Only available on Essays24.com