The issue of privacy has for a long time been of great concern to the American people. Computer based threats has always been perpetuated and victims always pays a high price for it. This paper discussed computer based threats to individuals, factors behind these threats and trade off between privacy and security. The prevention of these threats is also highlighted with the current technological advancement in the fight against these threats.
Computer Based Threats to in American Culture
The main computer based threats in the current American culture is caused by social engineering. The manipulating of users like enticing them so that you get their passwords is the easiest way of gaining access individuals’ computers. This can lead to reduced privacy to the individuals.
Some of the other computer based threats in my information privacy include hacking of my social media account and exposing my private information. The other ones can be someone using my credentials to log in to systems that might include banks and compromise my privacy. Also, attacks like phishing where my information is exposed after receipt of an infected email. My computer can also be attacked by browsing infected web pages where downloaded files can infect my computer and compromise on my security. Also using infected removable devices can lead to my individual computer to be compromised .
Behind the Threats
The recent advances in technology has threatened the individual privacy and reduced the amount of control over personal data. This has opened up the possibility of a range of negative consequences as a result of access to personal data . There is a lot of development of big data and advanced information technology makes it possible for storage and processing of large amount of data. The demonstration by Edward Snowden has shown that this big data, like telephone conversations, electronic payments and internet searches are in place and used by the government every day.
Also my individual privacy is threatened by my own carelessness. In sharing and putting all my private information on platforms that can easily be compromised like social media network, I threaten my own privacy.
Acceptance of Privacy Loss
Although I am a proponent of not giving out any individual privacy whatsoever, I believe that as far as security is concerned I can give part of it. The circumstances under which I can forfeit is if it is of national interest like terrorism monitor.
Prevention of Computer Threats to Privacy
The thing that can be done to limit computer based threats is firstly to lay down tougher laws on the privacy of citizens. Any person should not be allowed to access my data outside the set laws on privacy and confidentiality. The people should always be notified in the eventuality of personal data gaining by individuals or companies .
Promising Technologies for Privacy Security
They are various privacy-enhancing technologies and identity management technologies that remove the human oversight as far as privacy is concerned. The only challenge is how to incorporate privacy requirements and work processing in a way that makes privacy violation impossible
The softwares that protect us from privacy related issues include tools like Tor for anonymity during browsing of the web and Freenet for free sharing . They use the principle of users using k-anonymity value for k and encryption of the messages so the original sender cannot be distinguished from the rest .
References
Office of the Privacy Commissioner of Canada. (2014, December). Privacy and Cyber Security: Emphasizing privacy protection in cyber security activities. Retrieved February 26, 2016, from http://www.priv.gc.ca/
Privacy Technical Assistance Center. (2011, December). Data Security: Top Threats to Data Protection. Retrieved February 26, 2016, from nces.ed: http://nces.ed.gov/ptac
Stanford University. (2014, November 20). Privacy and Information Technology. Retrieved February 28, 2016, from Stanford Encyclopedia of Philosophy: http://plato.stanford.edu/entries/it-privacy/