logo

Digital Legacy & Privacy Assignment

8 Pages2088 Words556 Views
   

VICTORIA UNIVERSITY

   

NIT2201- IT Profession & Ethics (NIT2201)

   

Added on  2019-11-12

Digital Legacy & Privacy Assignment

   

VICTORIA UNIVERSITY

   

NIT2201- IT Profession & Ethics (NIT2201)

   Added on 2019-11-12

ShareRelated Documents
Running head: DIGITAL LEGACY & PRIVACY Digital Legacy & Privacy Name of the StudentName of the UniversityAuthor’s note
Digital Legacy & Privacy Assignment_1
1DIGITAL LEGACY & PRIVACY This essay will focus on the privacy, digital privacy will show lights on how the aliveand deceased persons can be protected on the digital platform, examples have been providedto show the difference of legislation with respect to deceased persons between Australia andthe US. This essay will grandstand how to own ownership of digital assets in a safe andsecure manner by a Will.Privacy is the basic right required for everyone to protect self-dignity of individuals,the rights also signify the base on which the human rights are built upon (Glennon, 2014).Privacy creates a boundary where the user should limit themselves and should abide by therules so that one’s privacy remains intact.Digital privacy is basically connected to the digital media and digital media andcloud computing. The intruders attack the computer system and threaten the authenticity andprivacy of one's system (Ferrante, 2013). The use of cryptographic software assists inprotecting the privacy of the system. The digital privacy law of Australia consists of the following parameters-themanagement of the personal data that must have a privacy policy, the user should use an aliasname for where there is a chance or capability, the accumulation of solicited data whichinvolves the personal data must be secured and unsolicited data involving the notice which isreceived from the external sources must be taken care of (Hopkins, Lipin & Whitham, 2014).The principle includes the procedures by which the data can be handled, used or eventuallyputting an end to the activities regarding the personal data. The principle also includes theright to access the correct personal data and also includes the modification of the personaldata.The digital assets or the materials can be at risks and cyber criminals can exploit those data for their benefits. The malware, virus and the worms are the matter of concerns.
Digital Legacy & Privacy Assignment_2
2DIGITAL LEGACY & PRIVACY The virus generally replicates by the intruders and spread from system to system via onecomputer file to another computer file. The worms are self-replicant and they spread throughthe various computer system and they do not require any other plugins or software orapplications to spread the fatal effect. A program affected by Trojans look like one programwhen executed looks another. Spyware or adware is another one that is also vulnerable. Thedigital materials can be hacked by the intruders and this procedure is known as the socialengineering. The Denial of Service attack associates the hijacking of one’s system anddisallow the owners to use their own system (Haworth, 2013). In this way, the data can berobbed of. Another concerning issue is the cloud technology, with the help of cloud serviceone can store important files and data in the store, the cloud technology can be vulnerable andput to risks if the network is poorly secured.The digital privacy can be secured by the following means. The hardware andsoftware applied firewalls can prevent the unauthorised access and thus allow the authorisedports, protocols and applications access. The antimalware software can secure the systems’contents by mitigating the virus and worms’ effects. The access points of the wirelessequipment must be secured to get flawless internet security services. Here the securityscanning tools can assist any unauthorised access to the system (Kundi et al., 2014). Thenetwork components should be properly authenticated and authorised that means thepassword files must be checked and verified whether it is strong enough or not.Digital legacy is the procedure to protect the digital materials from the vulnerabilitiesand the risks. The digital files include files, images, videos, online accounts, e-wallets. Thebusiness organisations run their business organisations online, deliver emails online, they alsoconduct their business activities in the cloud, so it is important to prepare a will for all thedigital assets (Banta, 2014). The assets provide a sort of privacy as well; it helps when heaccounts gets frozen or gets attacked by malware.
Digital Legacy & Privacy Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
NIT2201- Digital Legacy & Privacy
|8
|2196
|474

Worm Attack: Types, Impact, and Prevention Measures
|11
|1984
|483

Malware Analysis Assignment PDF
|29
|6377
|378

Network Security Issues
|7
|1115
|226

IMAT5262 Research, Ethics & Professionalism in Computing : Assignment
|28
|4390
|18

Issues in Cloud Computing
|8
|1820
|86