[10]Privacy and Security

[10]Privacy and Security - Module 10: Privacy &...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Module 10: Privacy & Security In this section we will take a broad look at topics in privacy and security and how they can be threatened in a progressively more online world. The purpose of this module is not to introduce you to the latest software developments but rather to provide you with a general overview of some of the privacy and security issues in information science. ______________________________________________________________________ ______________ Privacy and Security These two topics are difficult to discuss separately from one another. In the context of this discussion, privacy will refer to information about oneself or about another user, and security will refer to the possibility of this information being used in a damaging or malicious fashion. In an increasingly electronic world, privacy can be difficult to maintain. The activities of an individual or group are relatively easy to monitor and to track over time. The importance of privacy varies among individuals; some feel it of vital importance while others feel it less so. But in the United States, the right to privacy has legally been determined a civil right. Threats to personal privacy can come from sources both on and offline. A common method of committing identity theft is simply going through trash cans. Pre-approved credit card offers are easy to retrieve and use for identity theft. Altering the billing address, so that the intended recipient never receives a statement, allows thieves to apply for credit cards and make purchases or use them to secure loans, all the while damaging the credit rating of the unsuspecting victim. Identity theft is one of the fastest growing crimes in and outside of the United States and is expected to continue to increase as more information migrates to the Internet. Cell phone use worldwide has been increasing exponentially for the past several years. Cordless and cellular telephones present several opportunities for compromising privacy. Simple eavesdropping becomes easier when users conduct conversations in public places, often giving out personal information such as their full name or address in earshot of others. Tapping of cellular telephones requires little special equipment, and cordless frequencies are similarly easy to monitor. Children are especially vulnerable to cellular eavesdropping if they have not been taught never to give out personal information in public. ______________________________________________________________________ ______________ Threats to privacy and security: There are two basic types of privacy invasion: malicious and benign. We will first look at some malicious threats to Internet security. Hacking/cracking The generic term "hacking" refers to the act of gaining unauthorized access to the computer or data of a user. Originally, "hacker" referred to a person with considerable computing expertise and was not usually associated with criminal activity. But as
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/14/2009 for the course INF 304w taught by Professor Staff during the Spring '09 term at University of Texas at Austin.

Page1 / 9

[10]Privacy and Security - Module 10: Privacy &...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online