Challenges of Internet Privacy and Data Security

computer ethics l.w
1 / 8
Embed
Share

"Explore how the Internet impacts privacy and data security, including increased data collection, globalization of information, and challenges in maintaining control and centralization. Learn about the unique threats posed by the Internet and the need for effective protection measures."

  • Internet privacy
  • Data security
  • Globalization
  • Privacy challenges
  • Information technology

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. COMPUTER ETHICS : 1. Why the Internet is different from other means in relation to privacy 2. Modern technologies and their impact on information privacy

  2. Why the Internet is different from other means in relation to privacy: - The development of a system to protect privacy environment must take into account the nature of the specific threats to which it is exposed privacy in the scope of the use of internet operations, the internet creates a series of new challenges in the face of plans consumer protection and protection of privacy. These challenges are as follows: in the internet

  3. 1.The Internet increases the amount of data collected, processed and stored The Internet has seen a growing trend towards data collection in the real world as it becomes easier in the internet environment in terms of accessibility, more convenient for tabulation due to computing techniques, and becomes easier to exchange in the light of the means of exchanging information in all its forms made available by the Internet and the software of navigation.

  4. 2.The Internet has facilitated the globalization of information and communications::In the Internet environment, information and communication flows across boundaries without regard to geography and sovereignty. Individuals give their information to internal and external entities and possibly to unknown entities. This raises the risk of misuse of this data, especially in countries where there is no legal protection for personal data.

  5. 3.The challenge of loss of centralization and mechanisms of control and control The adoption of a national law or the development of an appropriate national strategy for the protection of a human rights may be effective due to the element of control and sovereignty and the ability to control and prevent or perpetrate aggression, which also allows compensation and prosecution of violators, but how is the situation under the Internet owned by each person and which are not owned by anyone, and where there is no central authority or sovereign authority that provides protection or provides the opportunity and mechanism for legal protection when an attack occurs.

  6. Modern technologies and their impact on information privacy The risks of modern technologies are increasing in terms of privacy protection, such as video surveillance cameras, identity cards, electronic databases, means of intercepting and controlling mail and communications, and controlling the work environment. The breach of privacy on the Internet can be done by three basic entities: Internet Service Provider and Sites visited by the browser, as well as Internet Individuals or security agencies. personal databases, hackers, and (Hackers) intelligence

  7. That the Internet Service Provider can monitor everything you do on the Internet (place and time of access to the network, sites visited, words searched, messages, emails exchanged etc.), from Internet Protocol the user's Internet number and other devices through Packet, Proxy,Sniffer : It is a software capable of analyzing every movement on the web. , The websites visited by the browser are able to determine the movement of the browser, through the introduction of small files known as Cookies on the hard disk in the computer.

  8. In addition to the E-forums and social networking sites, most notably Twitter and Facebook, contain gaps that allow hackers to see the details of personal details of their subscribers, although these sites are constantly working to devise ways to protect privacy. It represents the biggest challenge facing individuals, businesses and websites, and it seems, Hacking is a breakthrough it is like an open war, not a fixed base, but only for each side to benefit from the gaps of the other. It is usually done through complex programs and different forms, which may reach to the extent of monitoring our personal movements, by penetrating laptops, and watching us inside our homes

Related


More Related Content