Uplaods

Submitted by: Submitted by

Views: 293

Words: 343

Pages: 2

Category: Business and Industry

Date Submitted: 10/02/2010 06:18 PM

Report This Essay

Checkpoint Internet Privacy

Internet privacy is a big topic on everyone’s mind these days. When you are on the internet you assume that your data is safe and your personal information is secure at, home and in the office. Depending on the situation and what the use is for the internet you should feel safe using the internet. But, this is not the case at home or work.

Home:

When using the internet at home should be the safest place because it is your own service. Some time at home we unintentionally leave our system vulnerable to hackers by using common passwords. In addition , we are not checking your system on a regular basis.

Work:

At work employees should have a secure feeling that their information systems are safe to use without interruptions from any outside intruders. The company should have the most security than any of the other situations. Nonetheless there is always a slight risk that hacker will invade the companies system and steal the companies private information

Public, Wi-Fi zone and local library:

When you are in the public using Wi-Fi and libraries you are at your own risk for hackers. Using the in the public put you at a greater risk more than the other situations. It is advisable to use more well-known web-site this will lessen your risk of getting attack by a virus. Individuals should have their own spyware or internet security to keep their private information safe.

These are opened hot spot where anyone can have access to your information and hack into your computer. With Wi-Fi there is no security password for the service. So accessing the internet this way brings more risk for your computer to have more intruders then any others.

In conclusion, it is best to learn as much as you can about your system and take the proper precautions so hackers will intrude on your information. Network should never be used without the owner’s permission

Reference

Chapter 3 Ethics, Privacy, and information Security.

More like this