Смекни!
smekni.com

Privacy And Security On The Net Essay (стр. 2 из 2)

Zdjelar 10

computers, it is only reasonable that for the trained hacker, the acquisition of private information from home users is like a walk in the park.

Conclusion

It is obvious that the Internet is here to stay. As the Internet grows and more and more of our everyday activities and errands become available on the Internet, so will the necessity for disbursement of more personal information. This is turn will make hacking, computer crime, Internet break-ins, information theft, and security infiltration more widespread. Action needs to be taken to remedy this problem, and insure the privacy and security of all computer and Internet users, as well as corporate companies and their assets. It is imperative that the safety and privacy of people be preserved, and the integrity of the Internet is assured for future generations. As the largest network in the world and a seemingly endless tool of education, information, amusement, management, communication, convenience, and commerce, it is likely that the Internet is the greatest evolution and revolution in the last 50 years. In this age where almost everything you ever wanted to know about someone can be found on a computer, companies need to ensure that the people whose information they are collecting and using know what is being collected and how and why it is to be used. Security and privacy on the Internet is both simple and complex at the same time. Simple because the problem that plagues the Internet and its security is easy to identify. Complex because at this point in time there exists no way to solve all of the problems and security concerns (Stein 1). The world’s accessibility to the Internet makes the development of global standards and privacy codes difficult – but imperative.

Bibliography

Ahuja, Vijay. Network and Internet Security. Boston: AP Professional, 1996.

Berinato, Scott. Hack alert: Where’s the Outrage? IT managers, in rush to create Web presence, leave sites vulnerable (Industry Trend or Event). eWeek Sept. 2000: 1.Q.

Bott, Ed. We Know Where You Live Work Shop Bank…And So Does Everyone Else! Here’s How to Protect Yourself and Your Business. PC/Computing Mar. 2000. p80.

Breeden, John II. Justice offers a victim’s perspective on hacking (Government Activity). Government Computer News Apr. 1997: v16, n10, p3(2).

Caryl, Christian. Russia’s hackers: reach out and rob someone. U.S. News & World Report Apr. 1997: v122, n15, p58(1).

Littman, Jonathan. Hacked, cracked and phreaked. PC Week Jan. 1997: v14, n4, p1(2).

Roberts, Sally. Hacking incident moves Web security to front page. Business Insurance Sept.1998: v32, n38, p1(2).

Rothfeder, Jeffrey. Hacked! Are your company files safe? PC World Nov. 1996: v14, n11, p170(7).

Stein, Lincoln D. Web Security: A Step-by-Step Reference Guide. Reading: Addison-Wesley, 1998.

Ziff, Davis. The Feds Are following You. PC/Computing Mar. 2000 1996: p94.

346