Internet Privacy and Security: Challenges, Threats, and Solutions

Verified

Added on  2020/06/06

|7
|1992
|42
Report
AI Summary
This report provides a comprehensive overview of internet privacy, addressing the increasing challenges posed by fake websites, phishing attacks, and the vulnerability of personal data. It explores the importance of cybersecurity in protecting sensitive information, including financial details, education, and medical records. The report highlights the ethical and unethical practices of hackers, the prevalence of cyberbullying, and the risks associated with sharing personal data online. It emphasizes the need for strict government regulations, user awareness, and the adoption of security measures like anti-malware software and cautious online behavior. The report also discusses the significance of trustworthy websites, privacy settings, and the ongoing evolution of cyber threats, concluding with a call for vigilance and proactive measures to safeguard personal data in the digital age. The report references several books and journals to support its claims.
Document Page
Privacy on the internet
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODCUTION...........................................................................................................................1
OVERVIEW ................................................................................................................................1
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
Document Page
INTRODCUTION
Internet has provide various facilities to this society. In this era, it is considered as one of
the most important part of human life. Most of the people are concerned about their privacy
(Shilton, 2012). This file will discuss about increasing number of fake websites and other social
platforms which are considered as severe challenges for cyber security. It will also include an
explanation of personal data which is available online sites.
OVERVIEW
Personal data is an information regarding identity of a person. This concept contain
content regarding personal life of an individual (Barua, Kay and Paris, 2013). It covers point like
financial status, education, medical condition etc. Cyber security is a big concern in this era.
Their are many hacker groups who are stealing significant information. Most of the companies
and government of various nations want to use internet because it increasing the efficient of an
organisation and help them in performing different task in effective manner. People think that no
one is watching them on internet but their are many ethical and unethical hackers who examine
every website which is visited by an individual. Enhancing number of data stealing is raising
questions regarding trustworthiness of online data. Cyber bulling is a major problems of this
matter, some institutions intimidate their competitors that they may release private information
of people who are sitting in top level management of a company.
Activities relating to phishing is continuously enhancing, hacking groups are stealing
important data like passwords, detail of credit cards etc. These incidents is creating problems in
growth of internet. According to a report, 90% content that is present on social media is fake.
Most of the companies and government institution use these information for making significant
policies relating to public welfare (Fuster, 2014). This is critical problem for society. People are
concerned about personal data, their are many organisation who claim that no one can find flaw
in their cyber security like Bitcoin but they have also failed to protect vital content relating to
their clients. Their are many fake websites which create apply various strategy for getting
personal information from visitors of their websites. People find it difficult to decide the correct
site where they should enter their personal data. This problem of online trustworthiness is
reducing the faith of internet users.
1
Document Page
Privacy is another big concern, government in developed countries are serious about it
but developing nations like India, China are not making strict rules against it. This ignorance
create a big problem at global level. Most of the news that is present on online newspapers is
fake, companies pay these website to promote their brand. The activities of phishing is enhancing
because of online chat. Their is a big question mark on security of various accounts that is
present on different social networking platforms. Hacker use these websites for stealing personal
information of an individual.
In order to solve issues relating to protection of personal data, government have to make
strict rules against stealing or selling of own information. In present scenario, most of the nations
do not have any regulation regarding privacy of data (Acquisti, John and Loewenstein, 2013).
This is generating different kind of problems at global level. Internet users need to be very
careful at the time of visiting a website. They should not fill any personal details on any social
media platform. Some people are very choosy about sharing their information. One should lock
down their hardware because hackers can steal data from a mobile device or a tablet. At the time
of online shopping, people must adopt option of 'cash on delivery'. They should never fill any
details relating to their credit or debit card on an unknown website.
Some online platforms have vital data relating of their customers. They sell it to anyone
who pay them money against it. This kind of unethical deals is enhancing in present time,
government need to make rules against these activities because it has direct impact on privacy of
an individual. Rules relating to cyber security should be revised in regular interval of time
because technology is changing rapidly. This essential changes will raise trust of people on
online websites and incidents relating to phishing will go down. Rules regrading spam should be
tighten because hackers are using irrelevant content and message for stealing personal data.
Every authentic social media site has privacy setting, people should read instruction that is
present on these websites because they provide necessary warning and educate internet users.
There are several websites that are present in the whole internet it is mandatory for any
person to identify its trustworthiness. Trust worthy websites increase the faith of user (Uteck,
2013). These sites are generally made with a purpose of stealing user's private data. Their are
various components of trustworthy websites like reputation, security, design, assurance, anti
malware and hacker safe and having SSL certificate. Since these sites are hacking proof hence it
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ensures the privacy of data that user enters. For example bank websites needs to be secured
otherwise data can get leaked which can lead to monetary losses to the customers.
Fake emails with a link in it are highly malicious as when users open these links personal
data present in the system gets leaked (Benndorf and Normann, 2017). It can be seen in the
internet that many spams are sent via emails or some message when these links are opened
hacker can enter into your system without your permission and can do whatever they want. It is a
form of Phishing. It has a much wider effect as the hacker can make use of your data for their
interest. There must be a anti malware which can be used for detecting this and preventing
system for privacy leaks.
It could be highly dangerous to share personal information as various theories suggests
that it may lead to stealing of personal data which can be utilized by them for their profit
(Sevignani, 2013). Sometimes when you provide smaller data like your mail Id or phone number
can be used for the marketing purpose. Sharing personal information is generally done by social
media links. For example some gaming links are sent on the social media sites when user allows
to share their data then their personal data is on stake. Some of the information should not be
provided at these websites like their bank account details, social media passwords. Data of higher
importance such as their identification marks, finger prints details, their identity numbers. If they
have any information that could lead to your personal security or national security must not be
published on these websites. Links of your profile on social media and many others must not be
connected. User must be alert that if any website is asking for details that are different from what
usually asked then do not provide it.
When user restricts others to penetrate into their account then there personal data remains
safe (Bowie, 2013). As user cannot provide the extent up to which others can access your data so
it becomes more important that user do not provide it to others any any levels. Some of the other
key methods of protections are as follows:
Do not click on the links that seems to be unusual.
Use data protection software.
Install anti malware.
If any email or website is asking you for any personal detail do not give it without
checking its trustworthiness.
3
Document Page
Behavior of online user are changing considerably as they are going for the links that
provides them entertainment or the links that seems to be innovative. The quest of people are
increasing which leads users to be in the trap of hackers (11 Simple Ways to Protect Your
Privacy. 2017). More number of people these days are looking for some extra from any websites
which may lead to privacy threats.
Various researches have showed the trend that stealing data is becoming easier due to
lack of understanding of user about the authenticity of websites. In future almost everything is
going to be present online and hacker can make use of this Big data. Black hat hackers are
increasing day by day which is increasing the risk chances.
There are many policies that are present in the world regarding the personal data safety.
Respecting these policies is important for every individual (Roman, Zhou and Lopez, 2013).
These policies safeguard personal data from being misused. These policies must be enforced
properly. Personal data must not be attached or published on the websites as it can be misused.
Hackers make use of methods like threading to enter into user's system. If user do not provide
their personal information, then it will not be easier for the hackers to use user's data for their
personal benefits.
CONCLUSION
From the above mentioned report it has been concluded about the privacy on the internet
and its significant for appropriate security of personal and professional data. There are various
aspects disused in this report such as Online Trustworthy website, online persona data, Sharing
personal information etc.
4
Document Page
REFERENCES
Books and Journals
Acquisti, A., John, L.K. and Loewenstein, G., 2013. What is privacy worth?. The Journal of
Legal Studies. 42(2). pp.249-274.
Barua, D., Kay, J. and Paris, C., 2013, April. Viewing and controlling personal sensor data: what
do users want?. In International Conference on Persuasive Technology (pp. 15-26).
Springer, Berlin, Heidelberg.
Benndorf, V. and Normann, H.T., 2017. The willingness to sell personal data. The Scandinavian
Journal of Economics.
Bowie, N.E., 2013. Privacy and the Internet. The International Encyclopedia of Ethics.
Fuster, G.G., 2014. The emergence of personal data protection as a fundamental right of the EU
(Vol. 16). Springer Science & Business.
Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and privacy
in distributed internet of things. Computer Networks. 57(10). pp.2266-2279.
Sevignani, S., 2013. The commodification of privacy on the Internet. Science and Public Policy.
40(6). pp.733-739.
Shilton, K., 2012. Participatory personal data: An emerging research challenge for the
information sciences. Journal of the Association for Information Science and
Technology. 63(10). pp.1905-1915.
Uteck, A.E., 2013. Reconceptualizing Spatial Privacy for the Internet of Everything (Doctoral
dissertation, Université d'Ottawa/University of Ottawa).
Online
11 Simple Ways to Protect Your Privacy. 2017. [Online]. Available Through:
<http://techland.time.com/2013/07/24/11-simple-ways-to-protect-your-privacy/>.
[Accessed On 28th September 2017].
5
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]