Cyber Security and Privacy Techniques.

Topics: Computer security, Security, IP address Pages: 5 (1684 words) Published: June 12, 2013
Cyber Security and Privacy Techniques
Tammy Sublett
Harrison College
Cybercrime
Thomas Hart
12/05/12

In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world. CURRENT TRENDS

It is difficult to control and protect individual computer users as there are many different ideas of what the concept of privacy means in different countries. However, there are some basic activities that are considered an invasion of privacy no matter where you live in the world. Examples of these are as follows: * Collecting and analyzing user data without the user’s knowledge/consent or authorization. * Employing user data in a way other than was authorized. * Disclosing or sending user data to others without the user’s knowledge and authorization. These things are considered don’t in cyber space, so even if there are international laws on privacy, [some countries and companies would still be likely to operate in an opprobrious way] (Subramanian, 2008). In 1991 the president of the Association for Computing Machinery showed his support for the fair information practices, which included the principles of notice, choice, access, and security, which urged all organizations to observe the rights of people they collect personal information about as well as their online activity. Later, our government asked the commerce department to assist the Federal Trade Commission to encourage organizations to place self-regulatory practices in place, but as of 2002 these approaches were found to be ineffective in protecting consumer information (Subramanian, 2008). Right now in cyber space personal information is collected by the use of web cookies, these cookies are digital information sent from a web server and stored on the individual’s hard drive by way of the browser or network applications, “Cookies were designed to address the problem of statelessness inherent in the Hypertext Transfer Protocol (HTTP)” (Subramanian, 2008, p. 9). These cookies provided a solution to the statelessness for they allow for continuity between browser and web server. They have been proven to be the most reliable and network friendly means to provide needed state functionality on the web. However, this function can also be provided by embedding state information in URLs simply using hidden fields in the HTML forms and or using the client’s IP address (Subramanian, 2008). There are two types of cookies, the session cookie which last only as long as the browser session with the server and the persistent cookie which remains stored on the hard drive of the individuals computer or other device until it expires or is deleted. Although persistent cookies can help the user visit websites previously visited, “The persistent cookie also has more significant privacy implications because storage of navigational streams and log-in information could be used to monitor and track user browsing behavior and linked to any other personal information provided” (Subramanian, 2008, p. 10). These cookies can also be shared by third part web hosts and are likely used to track activities of a specific web-site or can track the user’s moves from web-site to web-site (Subramanian, 2008). One of the technologies used to protect privacy on the internet is called an Anonymizer. This technology [provide the ability to sanitize packet headers passed from the client to the server] (Subramanian, 2008, p. 11). The early version was software...

References: Schwartz, M. J. (2012, January 17). From cyber espionage to Android malware, expect to see a greater variety and quantity of attacks than ever before. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392
Sans Technology Institute, (2011, February 23). Sec Lab: Predictions and Trends for Information, Computer and Network Security. Retrieved from http://www.sans.edu/research/security-laboratory/article/security-predict2011
Subramanian, R. (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. Hershey • New York: IRM Press.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Principles of Information Security and Privacy Essay
  • Cyber Security Essay
  • Security and privacy Essay
  • Cyber Security Essay
  • Cyber Security Essay
  • Security and Privacy Essay
  • Essay on Cyber Security
  • cyber security Research Paper

Become a StudyMode Member

Sign Up - It's Free