preview

Cyber Security and Privacy Techniques.

Good Essays

Cyber Security and Privacy Techniques
Tammy Sublett
Harrison College
Cybercrime
Thomas Hart
12/05/12

In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.
CURRENT TRENDS …show more content…

However the current version uses secured socket layers or (SSL) technologies when sending URL requests. This version acting as a firewall like technology encrypts the communication tunnel between the sender and the anonymizer proxy, routing the traffic through many different proxy servers, which helps to disguise the users IP address (Subramanian, 2008).
Another option is a web filter, these software programs block cookies, advertisement’s as well as web bus. But there are some negative things that happen when using a filter. One example is the software fails to think about asking for consent from the user. It simply blocks all cookies and prevents the user from using the personalized setting they prefer, even if the site is trustworthy, such as government sites, or bank sites. Still, this does not mean that it is impossible to invade the user’s privacy, personal information can still be gotten through the users IP address, how long a user is interacting with the internet, and the geographical location. Therefor it is wise to use additional privacy protection (Subramanian, 2008).
Next we have “Evidence Erasers,” these programs delete any and all stored internet activity that might be stored in log files or other hidden file that most people never know about. Some of these programs even exceed the Department of Defenses’ standards when it comes to destroying data. But it also frees up disk space

Get Access