Large databases, private networks, the internet, and the web impact privacy by enabling vast amounts of personal data to be collected and used. Privacy laws aim to protect individuals' financial, medical, and educational information online. Security involves protecting against threats while computer crimes are illegal acts that steal or damage private data. Malicious programs like viruses, worms, trojans, and zombies can infect systems and deny access. Rogue Wi-Fi, data manipulation, identity theft, internet scams, and cyberbullying also endanger privacy and security online.
Large databases, private networks, the internet, and the web impact privacy by enabling vast amounts of personal data to be collected and used. Privacy laws aim to protect individuals' financial, medical, and educational information online. Security involves protecting against threats while computer crimes are illegal acts that steal or damage private data. Malicious programs like viruses, worms, trojans, and zombies can infect systems and deny access. Rogue Wi-Fi, data manipulation, identity theft, internet scams, and cyberbullying also endanger privacy and security online.
Large databases, private networks, the internet, and the web impact privacy by enabling vast amounts of personal data to be collected and used. Privacy laws aim to protect individuals' financial, medical, and educational information online. Security involves protecting against threats while computer crimes are illegal acts that steal or damage private data. Malicious programs like viruses, worms, trojans, and zombies can infect systems and deny access. Rogue Wi-Fi, data manipulation, identity theft, internet scams, and cyberbullying also endanger privacy and security online.
Large databases, private networks, the internet, and the web impact privacy by enabling vast amounts of personal data to be collected and used. Privacy laws aim to protect individuals' financial, medical, and educational information online. Security involves protecting against threats while computer crimes are illegal acts that steal or damage private data. Malicious programs like viruses, worms, trojans, and zombies can infect systems and deny access. Rogue Wi-Fi, data manipulation, identity theft, internet scams, and cyberbullying also endanger privacy and security online.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 3
1.
Define privacy and discuss the impact of large databases, private
networks, the Internet, and the Web? - Privacy provides protection for users, concerns the collection and use of data about individuals
Large databases Private networks The Internet and the Web
- Large organizations - People are not
- Employee monitoring compile information concerned about privacy about us daily software when surfing the Internet - Big Data is exploding - Employers can or when sending e-mail and ever-growing monitor e-mail legally - When browsing the web, - 90% of the data - A proposed law could critical information is collected has been stored on the hard drive collected over the last prohibit this type of 2 years electronic monitoring or at least require the employer to notify the employee first
2.Define and discuss online identity and the major privacy
laws? - Online identity is the information that people voluntarily post about themselves online, archiving and search features of the Web make it available indefinitely, the username identifies the user (the process of identification) - Laws regarding privacy policy requirements for websites are generally included in information privacy or data protection laws for a country: Gramm- Leach-Bliley Act protects personal financial information, Health Insurance Portability and Accountability Act (HIPAA) protects medical records, Family Educational Rights and Privacy Act (FERPA) resists disclosure of educational records
3. Define security ? Define computer crime and the impact of
malicious programs, including viruses, worms, Trojan horses, and zombies, as well as denial of service attacks, rogue Wi-Fi hotspots, data manipulation, identity theft, Internet scams, and cyberbullying. - Security involves protecting individuals or organizations from theft and danger - Computer crime is alternatively referred to as cyber crime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. - Malicious Programs or Malware are designed by crackers, computer criminals, to damage or disrupt a computer system - 3 most common programs: Viruses – migrate through networks and attach to different programs Worms – fills the computer with self-replicating information Trojan horse – programs disguised as something else Zombies are computers infected by a virus, worm, or Trojan Horse - Denial of Service: (DoS) attack attempts to slow down or stop a computer system or network by flooding it with requests for information or data - Rogue Wi-Fi hotspots: Imitate free Wi-Fi networks and capture any and all information sent by the users to legitimate sites including usernames and passwords - Data manipulation: Finding entry into someone’s computer network and leaving a prankster’s message - Identity Theft: Illegal assumption of someone’s identity for purpose of economic gain - Internet scam is any use of internet technology to defraud people. Internet scams are carried out by cybercriminals for some type of personal gain, financial or otherwise. Scammers use deceptive methods like phishing emails, fake websites, and malicious software to gain access to their victims’ data, files, and personal information. - Cyber-bullying: Use of the Internet, cell phones, or other devices to send or post content intended to harm