logo

NIT2201- Digital Legacy & Privacy

8 Pages2196 Words474 Views
   

NIT2201- IT Profession & Ethics (NIT2201)

   

Added on  2019-10-31

NIT2201- Digital Legacy & Privacy

   

NIT2201- IT Profession & Ethics (NIT2201)

   Added on 2019-10-31

ShareRelated Documents
Running head: DIGITAL LEGACY & PRIVACYDigital Legacy & Privacy Name of the StudentName of the UniversityAuthor’s note
NIT2201-  Digital Legacy & Privacy_1
1DIGITAL LEGACY & PRIVACYThis essay will highlight the privacy, the digital privacy, digital legacy. This essaywill also highlight and focus on both alive and dead persons so that each and every personcan be protected on the social media long with all kinds of digital media. The comparison hasbeen made on legislations among Australia, US and British. This essay will primary showlights on the scenario on how the digital assets can be protected and made secure simply bymaking a digital will.Privacy is the right and it is needed to everybody. Privacy is required to safeguardone's safety and security, the rights contain the legislations which individual should know orshould be aware of (Ferrante, 2013). Anyone should remain in their boundary should notcross the limit and interfere with others' privacy.Digital Privacy is correlated with the privacy of the digital media cloud computing.The digital privacy is threatened when the intruders attack one’s system and exploit thepersonal files (Glennon, 2014). To check this attack digital privacy must be secured, specialcryptography software must be implemented to ensure the digital security and digital privacy.The digital privacy law of Australia comprises the components-The personalinformation of the individuals must be made secured maintaining the privacy policy, whilesurfing or browsing the internet the users should use an alias name, the alias name can protectone's identity, the real name can be breached and one's privacy can be threatened. Thegathered solicited data, as well as the unsolicited data, should be protected and made secure,especially the unsolicited data coming from the external sources must be consideredseparately and with special care (Glennon, 2014). The digital law also includes the principlein which it has been stated that everyone has the right to access one’s private digital andeveryone has the right to modify his or her personal data.
NIT2201-  Digital Legacy & Privacy_2
2DIGITAL LEGACY & PRIVACYThe digital assets can be vulnerable to threats and cyber criminals can exploit one’spersonal data for their own benefits. The cyber criminals and the intruders take advantage ofthe weak network and the users who are not used to operating system and software fall intheir trap and become the victim (Hopkins, Lipin & Whitham, 2014). The intruders mainlycarry out their activities and spread vulnerabilities via malware and worms. The virus isspread by the intruders from one computer to another computer via stored files in the system.The worms are opposite to virus, they do not require human intervention at all and theyspread automatically without any plugin or without the help of any software or anyapplication programs. The worms are more dangerous compared to a virus. Trojans look likeone program, once opened one can find that it is another program. Spyware and adwareshould be added to the list as they are equally destructible like a virus and the worms(Haworth, 2013). There are various kinds of attack that the cyber criminals carried out, thatattack involves Denial of Service attack, this attack basically involves hacking individual'scomputer and robbed the vital data and prevent the owner of the system to enter his or herown system. Now with the advent of cloud technology individuals can store data in the cloudif the network is weak and is not secured properly the intruders can take advantage and canmake the exploit the cloud database and robbed of vital data. However, the digital data can be made secure by the following techniques. The usermust implement both hardware and software firewalls to ensure both security and privacy ofoneself (Kundi et al., 2014). The firewall is responsible for preventing unauthorized accessOne should alongside install the antivirus and antimalware software to secure the computersystem. The antivirus or the anti-malware software is capable of securing one's systemmitigating the virus' and the worms' harmful and fatal impact. This firewall helps theauthorized users to access the ports and protocols (Banta, 2014). In case of a wirelessnetwork, the wireless components should be made secure to get the faultless security and
NIT2201-  Digital Legacy & Privacy_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Legacy & Privacy Assignment
|8
|2088
|556

Critical Analysis of WannaCry Ransomware
|6
|1196
|210

Maintaining Data Privacy: Roles and Responsibilities in Australia
|9
|2331
|79

ISYS100 Information Technology and society
|13
|3604
|69

ASSIGNMENT WHAT IS CYBER CRIME ?
|8
|1982
|28

Security Threats in Maritime Industry and West Africa: Risks, Impacts, and Recommendations
|12
|3176
|136