A Comprehensive Report on the Threat to Personal Privacy in Networking

Verified

Added on  2020/04/07

|8
|1587
|60
Report
AI Summary
This report addresses the increasing threats to personal privacy in the context of emerging networking technologies. It begins with an introduction highlighting the impact of information technology on modern lifestyles and the associated privacy concerns. The report identifies key issues, including the vulnerability of technologies with weak security protocols, the rise of social media attacks, and the risks associated with third-party access and lack of data encryption. An analysis section delves into the implications of these threats, emphasizing the role of IP addresses in accessing personal data, the impact of data assurance laws, and the potential for misuse of personal data in research and online platforms. The report concludes by offering recommendations for mitigating these risks, such as avoiding sharing personal information online and using updated antivirus and firewalls. It emphasizes the importance of cyber security in safeguarding personal data in the digital age. The report uses multiple references to support its arguments.
Document Page
Running head: THREAT TO PERSONAL PRIVACY POSED BY THE EMERGING
NETWORKING
Threat to personal privacy posed by the emerging Networking
Technologies
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1THREAT TO PERSONAL PRIVACY POSED BY THE EMERGING NETWORKING
Table of Contents
Introduction......................................................................................................................................3
Identification to issues.....................................................................................................................3
Analysis...........................................................................................................................................4
Recommendations............................................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Document Page
2THREAT TO PERSONAL PRIVACY POSED BY THE EMERGING NETWORKING
Introduction
The information technology have helped in enhancing the life style of the human being in
the world. The use of the information technology in the market have modified the technological
aspects of the human being. There are various associated with the privacy of the information
technology.
This report discusses about the privacy issues in the networking. There has been a proper
analysis of the threats in the info ration technology on the networks.
This report outlines the basic threats that are prevailing in the network. A proper
evaluation of the threats has been done in the report. There are various recommendation have
been provided that helps in mitigating the challenges in the network security.
Identification to issues
The use of the internet has increases the threats to the privacy of the personal data and
information of the users all over the world [1]. Cybercriminals are causing major risk to the
personal data d information of the users. There are gas been many reports of the cyber-attacks in
the world that have caused data loss in the organization and at personal level.
Technology with weak security
Many new technologies are released in the market in a daily basis. However, the security
protocols of these devices and technologies are not so good to prevent form cyber-attacks in the
world [2]. The hackers cab easily breach into these devices and breach all personal information.
Social media attacks
Document Page
3THREAT TO PERSONAL PRIVACY POSED BY THE EMERGING NETWORKING
Hackers are now focusing in the social media including the Facebook and Twitter. Many
users are sharing their personal information over these social media websites [3]. This has been
attracting the hackers to attack their accounts and breach their personal data and information.
Third-party entry
Security experts have seen chance in mobile phone security since the initial of
availability to Internet. Considering the way of life's unbreakable dependence on mobile phones
and how little cybercriminals have focused on them, it makes a cataclysmic risk [4]. Target is the
ideal specimen of a noteworthy system attacks through outsider section focuses [5]. The
worldwide retailer's HVAC merchant were deplorable worker whose qualifications were stolen
and used to take money related informational indexes for 70 million clients [6].
Lack of Encryption
The lack in the encryption of data has been a major cause for the cyber-attacks in the
network. The data packets needs to be encrypted during transmission. Ensuring sensitive
business information and still is measure couple of businesses presently cannot seem to grasp, in
spite of its adequacy [7]. The encrypted from data and information in the network helps in
maintaining the security of the data. The data packets over the network are transmitted with
encryption.[8].
Analysis
The various cyber-attacks in the network has been causing a great threat to the privacy of
the users over the network. The lack in the security of the data and information over the network
have caused cyber-attacks over the network. The security of the personal data over the network
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4THREAT TO PERSONAL PRIVACY POSED BY THE EMERGING NETWORKING
can be accessed by using the IP address of the user over the network. Data assurance laws are in
compel in all countries. The data standard hidden these laws is the prerequisite of educated
assent for preparing by the information subject [9].
These improvements have on a very basic level changed practices of data innovation.
Even inside the scholarly research field, momentum practices of composing, submitting,
inspecting and distributing writings, for example, this one would be incomprehensible without
data innovation. In the meantime, many gatherings group data about distributions, creators, and
so on. This empowers suggestions on which paper researchers should read, however in the
meantime manufactures a detailed profile of every individual researcher [10].
As network expands for accessing the data, it additionally for specialists to act in light of
the new wellsprings of data. When these sources contain personal data, risks of damage,
imbalance, separation, and loss of self-sufficiency effortlessly rise [11]. Besides, frameworks
instead of clients may choose which data is shown, in this manner defying clients just with news
that matches their profiles [12]. The lack in the security of the data and information over the
network have caused cyber-attacks over the network. The security of the personal data over the
network can be accessed by using the IP address of the user over the network.
Recommendations
There are various techniques that helps in preventing the personal data and information
for hacking. The users are recommended not to share their personal information over the internet
including social media. The personal data and information includes contact number, address, age
and banking information. These are not secure over the internet. The use of an updated antivirus
Document Page
5THREAT TO PERSONAL PRIVACY POSED BY THE EMERGING NETWORKING
and firewall helps in providing security to the system. This prevents viruses and malwares from
entering into network of users. Therefore, it prevents form the cyber-attacks over the internet.
Conclusion
It can be concluded that the cyber security over the network. Many new technologies are
released in the market in a daily basis. The hackers can easily breach into these devices and
breach all personal information. There are various recommendations provided in the report for
mitigating the challenges in the risk of the personal data and information.
Document Page
6THREAT TO PERSONAL PRIVACY POSED BY THE EMERGING NETWORKING
References
[1] Cao, Ning, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. "Privacy-preserving multi-
keyword ranked search over encrypted cloud data." IEEE Transactions on parallel and
distributed systems 25, no. 1 (2014): 222-233.
[2] Li, Yibin, Wenyun Dai, Zhong Ming, and Meikang Qiu. "Privacy protection for preventing
data over-collection in smart city." IEEE Transactions on Computers 65, no. 5 (2016): 1339-
1350.
[3] Xia, Zhihua, Xinhui Wang, Xingming Sun, and Qian Wang. "A secure and dynamic multi-
keyword ranked search scheme over encrypted cloud data." IEEE Transactions on Parallel and
Distributed Systems 27, no. 2 (2016): 340-352.
[4] Hashem, Ibrahim Abaker Targio, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar,
Abdullah Gani, and Samee Ullah Khan. "The rise of “big data” on cloud computing: Review and
open research issues." Information Systems 47 (2015): 98-115.
[5] Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini.
"Security, privacy and trust in Internet of Things: The road ahead." Computer Networks 76
(2015): 146-164.
[6] Aggarwal, Charu C., Naveen Ashish, and Amit Sheth. "The internet of things: A survey from
the data-centric perspective." In Managing and mining sensor data, pp. 383-428. Springer US,
2013.
[7] Perera, Charith, Rajiv Ranjan, Lizhe Wang, Samee U. Khan, and Albert Y. Zomaya. "Big
data privacy in the internet of things era." IT Professional 17, no. 3 (2015): 32-39.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7THREAT TO PERSONAL PRIVACY POSED BY THE EMERGING NETWORKING
[8] Roman, Rodrigo, Jianying Zhou, and Javier Lopez. "On the features and challenges of
security and privacy in distributed internet of things." Computer Networks 57, no. 10 (2013):
2266-2279.
[9] Fallahi, Amin, Xi Liu, Yuzhe Tang, Shuang Wang, and Rui Zhang. "Towards Secure Public
Directory for Privacy-Preserving Data Sharing." In Distributed Computing Systems (ICDCS),
2017 IEEE 37th International Conference on, pp. 2577-2578. IEEE, 2017.
[10] Nandwani, Mona, and Rishabh Kaushal. "Evaluating User Vulnerability to Privacy
Disclosures over Online Dating Platforms." In International Conference on Innovative Mobile
and Internet Services in Ubiquitous Computing, pp. 342-353. Springer, Cham, 2017.
[11] Tso, Raylin, Abdulhameed Alelaiwi, Sk Md Mizanur Rahman, Mu-En Wu, and M. Shamim
Hossain. "Privacy-Preserving Data Communication Through Secure Multi-Party Computation in
Healthcare Sensor Cloud." Journal of Signal Processing Systems89, no. 1 (2017): 51-59.
[12] Gangadharan, Seeta Peña. "The downside of digital inclusion: Expectations and experiences
of privacy and surveillance among marginal Internet users." new media & society 19, no. 4
(2017): 597-615.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]