Friday, December 6, 2019
Threat to Personal Privacy Posed by the Emerging Networking
Question: Discuss about theThreat to Personal Privacy Posed by the Emerging Networking. Answer: Introduction The information technology have helped in enhancing the life style of the human being in the world. The use of the information technology in the market have modified the technological aspects of the human being. There are various associated with the privacy of the information technology. This report discusses about the privacy issues in the networking. There has been a proper analysis of the threats in the info ration technology on the networks. This report outlines the basic threats that are prevailing in the network. A proper evaluation of the threats has been done in the report. There are various recommendation have been provided that helps in mitigating the challenges in the network security. Identification to issues The use of the internet has increases the threats to the privacy of the personal data and information of the users all over the world [1]. Cybercriminals are causing major risk to the personal data d information of the users. There are gas been many reports of the cyber-attacks in the world that have caused data loss in the organization and at personal level. Technology with weak security Many new technologies are released in the market in a daily basis. However, the security protocols of these devices and technologies are not so good to prevent form cyber-attacks in the world [2]. The hackers cab easily breach into these devices and breach all personal information. Social media attacks Hackers are now focusing in the social media including the Facebook and Twitter. Many users are sharing their personal information over these social media websites [3]. This has been attracting the hackers to attack their accounts and breach their personal data and information. Third-party entry Security experts have seen chance in mobile phone security since the initial of availability to Internet. Considering the way of life's unbreakable dependence on mobile phones and how little cybercriminals have focused on them, it makes a cataclysmic risk [4]. Target is the ideal specimen of a noteworthy system attacks through outsider section focuses [5]. The worldwide retailer's HVAC merchant were deplorable worker whose qualifications were stolen and used to take money related informational indexes for 70 million clients [6]. Lack of Encryption The lack in the encryption of data has been a major cause for the cyber-attacks in the network. The data packets needs to be encrypted during transmission. Ensuring sensitive business information and still is measure couple of businesses presently cannot seem to grasp, in spite of its adequacy [7]. The encrypted from data and information in the network helps in maintaining the security of the data. The data packets over the network are transmitted with encryption.[8]. Analysis The various cyber-attacks in the network has been causing a great threat to the privacy of the users over the network. The lack in the security of the data and information over the network have caused cyber-attacks over the network. The security of the personal data over the network can be accessed by using the IP address of the user over the network. Data assurance laws are in compel in all countries. The data standard hidden these laws is the prerequisite of educated assent for preparing by the information subject [9]. These improvements have on a very basic level changed practices of data innovation. Even inside the scholarly research field, momentum practices of composing, submitting, inspecting and distributing writings, for example, this one would be incomprehensible without data innovation. In the meantime, many gatherings group data about distributions, creators, and so on. This empowers suggestions on which paper researchers should read, however in the meantime manufactures a detailed profile of every individual researcher [10]. As network expands for accessing the data, it additionally for specialists to act in light of the new wellsprings of data. When these sources contain personal data, risks of damage, imbalance, separation, and loss of self-sufficiency effortlessly rise [11]. Besides, frameworks instead of clients may choose which data is shown, in this manner defying clients just with news that matches their profiles [12]. The lack in the security of the data and information over the network have caused cyber-attacks over the network. The security of the personal data over the network can be accessed by using the IP address of the user over the network. Recommendations There are various techniques that helps in preventing the personal data and information for hacking. The users are recommended not to share their personal information over the internet including social media. The personal data and information includes contact number, address, age and banking information. These are not secure over the internet. The use of an updated antivirus and firewall helps in providing security to the system. This prevents viruses and malwares from entering into network of users. Therefore, it prevents form the cyber-attacks over the internet. Conclusion It can be concluded that the cyber security over the network. Many new technologies are released in the market in a daily basis. The hackers can easily breach into these devices and breach all personal information. There are various recommendations provided in the report for mitigating the challenges in the risk of the personal data and information. References [1] Cao, Ning, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. "Privacy-preserving multi-keyword ranked search over encrypted cloud data."IEEE Transactions on parallel and distributed systems25, no. 1 (2014): 222-233. [2] Li, Yibin, Wenyun Dai, Zhong Ming, and Meikang Qiu. "Privacy protection for preventing data over-collection in smart city."IEEE Transactions on Computers65, no. 5 (2016): 1339-1350. [3] Xia, Zhihua, Xinhui Wang, Xingming Sun, and Qian Wang. "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data."IEEE Transactions on Parallel and Distributed Systems27, no. 2 (2016): 340-352. [4] Hashem, Ibrahim Abaker Targio, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar, Abdullah Gani, and Samee Ullah Khan. "The rise of big data on cloud computing: Review and open research issues."Information Systems47 (2015): 98-115. [5] Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. "Security, privacy and trust in Internet of Things: The road ahead."Computer Networks76 (2015): 146-164. [6] Aggarwal, Charu C., Naveen Ashish, and Amit Sheth. "The internet of things: A survey from the data-centric perspective." InManaging and mining sensor data, pp. 383-428. Springer US, 2013. [7] Perera, Charith, Rajiv Ranjan, Lizhe Wang, Samee U. Khan, and Albert Y. Zomaya. "Big data privacy in the internet of things era."IT Professional17, no. 3 (2015): 32-39. [8] Roman, Rodrigo, Jianying Zhou, and Javier Lopez. "On the features and challenges of security and privacy in distributed internet of things."Computer Networks57, no. 10 (2013): 2266-2279. [9] Fallahi, Amin, Xi Liu, Yuzhe Tang, Shuang Wang, and Rui Zhang. "Towards Secure Public Directory for Privacy-Preserving Data Sharing." InDistributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on, pp. 2577-2578. IEEE, 2017. [10] Nandwani, Mona, and Rishabh Kaushal. "Evaluating User Vulnerability to Privacy Disclosures over Online Dating Platforms." InInternational Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 342-353. Springer, Cham, 2017. [11] Tso, Raylin, Abdulhameed Alelaiwi, Sk Md Mizanur Rahman, Mu-En Wu, and M. Shamim Hossain. "Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud."Journal of Signal Processing Systems89, no. 1 (2017): 51-59. [12] Gangadharan, Seeta Pea. "The downside of digital inclusion: Expectations and experiences of privacy and surveillance among marginal Internet users."new media society19, no. 4 (2017): 597-615.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.