Paper 2.docx - Security vs Privacy EXECUTIVE SUMMARY As the...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Security vs. Privacy EXECUTIVE SUMMARY As the internet and basic technology increasing rapidly, fast advancing trends of so called Information Communication Technology industry can be predicted. But beside the good aspect of ICT industry, we should focus on the problems that rise from the new industry. If societies do not advance at a pace that correlates to the change in technology, it is entirely possible that many problems will come from the people that cannot keep up with the society change. So the new opportunities from ICT will also encounter challenges and concerns such as privacy and security. We will talk about the basic issue of privacy and security in the ICT world and try to find a solution that both sides can live with.
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
The Security Information Communication Technology industry has a fast advancing trends by the rapidly increasing of the internet and basic technology. Therefore beside the good aspect of ICT industry, we should also focus on the problems that rise from the new industry which the most important part is security problem. Nowadays, security discusses broadly and causes the debate among people. From my perspective, the debate is more concern about should we be fully protected, partially protected or just we protect ourselves as far as possible. Some people believe internet security is more significant and we need to build some strict legislation since large amounts of information seem to be missing, especially regarding computers and networks crime become absolutely soaring. But the oppose says compare this to actual numbers of investigations and judgments of other crime, it’s a relatively low number. The best example of network crime is phishing. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication(wiki). Someone may think I must protected from phishing by using rigid security method, but it shift the responsibility to other people who protect themselves as far as possible by using common sense, firewall, and virus scanner. It is unfair for the person just use common sense to protect themselves. We should balance the security and protection level and make a
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern