Privacy and Security in Cyberspace/cyber Crime and Cyber-Related Crimes
Autor: Kat M • June 6, 2017 • Course Note • 260 Words (2 Pages) • 811 Views
Privacy and Security in Cyberspace/Cyber Crime and Cyber-Related Crimes
There are numerous ways that a person can be tracked by their personal devices. Many phone applications, free Wi-Fi hotspots, and websites require you to (most of the time unknowingly) give information regarding your search history, and location. This raises the question of whether people should be allowed to use essential services using technology without having to knowingly or unknowingly give away personal information. This topic streams into the topic of security. Many people use cloud services to store personal data. I am a frequent user of cloud services such as Dropbox, but not much thought is given as to who actually has the rights to the data that is uploaded. To be more precise I’ve never thought about what the owners of these services could do with the data that I’ve added. Or who is held accountable when it is stolen. The next class will expand on this topic.
This week’s topic covers a broad spectrum of crimes that are made through technology. Some, are done in the light of proving a point while others are made with malicious intent. However, on the news, you would only see stories of individuals who were being arrested for information theft. A person with malicious intent would allow themselves to get caught. Encouraging the rigorous testing of a system by a third party allows for a stronger security for sensitive information that is on the cloud. Technology is fairly accessible; anyone is able to gain the expertise in it given time and dedication.
...