Internet Security, Privacy Risks and Vulnerabilities
Internet Security, Privacy Risks and Vulnerabilities
Introduction
Technological solutions are rapidly changing and the internet is accessible to almost everyone hence bringing about many benefits as well as improving the quality of life. However, serious downsides of security and privacy risks and vulnerabilities are involved. This essay looks into the risks of security and privacy, its technological effects, common attack strategies and damage mitigation.
Despite the numerous benefits of internet usage, it serves as an avenue of breeding criminals as hackers and other devious people who steal information for illegal purposes. This makes the internet as much risky as it is beneficial. Some of the risks involved include hackers who steal data, disable systems and infiltrate networks. The security is vulnerable to viruses that skilled hackers use to access computers and private documents. Meanwhile, companies that collect large amounts of data face increased risks of data departing from consumer expectations. This is because hackers are becoming more and more skilled at exploiting and finding security issues and vulnerabilities.
Common Attack Strategies and How they Work
Some attack strategies include eavesdropping, data modification and password-based attacks. Eavesdropping is the biggest security problem faced by administrators in an enterprise. This attack takes place in networks that lack strong encryption services hence making data readable by others when passing through the network. Another type of attack is data modification whereby data alteration is done by an attacker who has read your data. The attacker in this case modifies a data packet without the sender or receiver knowing. The other form of attack is password based. In this scenario an attacker finds an authentic user account and enjoys the same rights as the actual user. Once the attacker obtains a valid account, he or she can obtain valid network information and computer names, reroute, delete or modify data as well as modify network configurations.
Technology Effects on the Security and Privacy of Individual Users and Organizations.
The effects of technology in security and privacy include increased challenges and complexities. This is due to companies working on a global scale. The frequent outsourcing of important tasks brings about the complexity of legal reality as it does not always coincide with relationships that are organized in practice. A good example is an internet company headquartered in a non member state of EU, and outsources to other countries while making profits through processing personal information of residents of EU. In such a case it is hard to determine whether EU laws apply or even who is responsible. Another effect is the growth in use and collection of personal data without individual knowledge or control. This has been caused by the increase of exchange of personal data. Internet content and delivery services are often link data collected to a user habit or preference. An example is the Facebook that reaches quite a number of growing individuals especially the young ones as it is not limited to business.
Damage Mitigation
Technological damages can be mitigated through strong legal frameworks that protect personal data and individual privacy. An example is the EU e-Privacy Directive that set rules on data use and individual rights. When the responsible organization is formed in a member state of EU then the laws apply when the personal data gets processed in EU or elsewhere. However, special rules apply when the personal data is transferred to countries that lack adequate protection levels. Furthermore, individual rights on data protection should be reinforced such that whenever any private data of an individual falls on wrong hands, then that individual should be informed. Additionally, companies should be transparent regarding their deals with consumer information.
Conclusion
Despite the numerous benefits of the internet, it serves as an avenue of breeding criminals as hackers and other devious people steal information for illegal purposes. Some attack strategies used include eavesdropping, data modification and password based attacks. Meanwhile, the effects of technology in security and privacy include increased challenges and complexities. Another effect is the growth in use and collection of personal data without individual knowledge or control. All in all, technological damages can be mitigated through strong legal frameworks that protect personal data and individual privacy.
References
Alba, D. (2015, January 27). FTC Warns of the Huge Security Risks in the Internet of Things. Retrieved from Wired: http://www.wired.com/2015/01/ftc-warns-huge-security-risks-internet-things/
Allaboutcookies.Org. (2015). Windows Security. Retrieved from Allaboutcookies.Org: http://www.allaboutcookies.org/security/windows-security.html
FTC Staff . (2015, January). Internet of Things: Privacy & Security in a Connected World. Retrieved from FTC: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf
Hustinx, P. (2010). Protection of Personal Data in Digitalized World. Retrieved from European Data Protection Supervisor: https://secure.edps.europa.eu/EDPSWEB/webdav/shared/Documents/EDPS/Publications/Speeches/2010/10-11-29_article_digitalized_world_EN.pdf