Scan the PowerPoint Information Assurance & Privacy: 2010 Annual Briefing and th
ID: 3678661 • Letter: S
Question
Scan the PowerPoint Information Assurance & Privacy: 2010 Annual Briefing and the white paper The Information Assurance Process: Charting a Path Towards Compliance. Ensure that you understand the IT vocabulary words related to security risks, such as malware and viruses. Make note of precautions users and organizations can take to protect their privacy and data. Consider how the tracking of your online usage and cell phone affects your privacy. Why is it important to pay attention to the use of cookies by websites? What is the impact of technology on privacy, and how does this affect web and technology us? What are the different points of regulation, including the major governmental agencies?Explanation / Answer
Viruses and malware infections are the number one risk and worry for PC users at the moment. Viruses can cause havoc with your PC and make it completely unusable, steal information from your computer and more embarrassingly spread the infection to other people you know. These five precautions can help you avoid falling victim:
1. Make sure that you have adequate Antivirus protection that is kept up to date and includes real-time protection. Many times I have arrived onsite to deal with an infected PC and people think they are protected with antivirus software – only to find that it hasn’t been updated for six months.
2. Avoid pirated software – you may think that it might be worthwhile getting a copy of some software, particularly if you aren’t going to use it very frequently, but pirated software often comes with viruses embedded. You could suffer far harsher consequences if your software abuse gets out, so it’s best to pay for an extra license and avoid both malware and lawsuits.
3. Use an up to date internet browser – don’t continue to use Internet Explorer 6 or 7 because they contain vulnerabilities that Microsoft will take a long time to fix and they could easily be exploited by hackers and virus creators.
4. Make sure Windows updates are installed – Windows updates often contain security updates which Microsoft release to patch up vulnerabilities found within Windows. These loop holes are often used by viruses to infect your system
5. Don’t click on unknown or suspicious links – Even if they are sent from somebody you know avoid clicking on unknown links; often friends or colleagues can get infected and be sending a virus on without realising.
1. Your personal information is valuable. More valuable than you might think. When we originally published our guide to stop Facebook from tracking you around the web, some people cried "So what if they track me? I'm not that important/I have nothing to hide/they just want to target ads to me and I'd rather have targeted ads over useless ones!" To help explain why this is short-sighted and a bit naive, let me share a personal story.
2. Before I joined the Lifehacker team, I worked at a company that traded in information. Our clients were huge companies and one of the services we offered was to collect information about people, their demographics, income, and habits, and then roll it up so they could get a complete picture about who you are and how to convince you to buy their products.
3. In some cases, we designed web sites and campaigns to convince you to provide even more information in exchange for a coupon, discount, or the simple promise of other of those. It works very, very well.
4. The real money is in taking your data and shacking up with third parties to help them come up with new ways to convince you to spend money, sign up for services, and give up more information. Relevant ads are nice, but the real value in your data exists where you won't see it until you're too tempted by the offer to know where it came from, whether it's a coupon in your mailbox or a new daily deal site with incredible bargains tailored to your desires.
5. It all sounds good until you realize the only thing you have to trade for such "exciting" bargains is everything personal about you: your age, income, family's ages and income, medical history, dietary habits, favorite web sites, your birthday...the list goes on.
6. It would be fine if you decided to give up this information for a tangible benefit, but you may never see a benefit aside from an ad, and no one's including you in the decision. Here's how to take back that control.
7. Human beings value their privacy and the protection of their personal sphere of life. They value some control over who knows what about them. They certainly do not want their personal information to be accessible to just anyone at any time.
8.But recent advances in information technology threaten privacy and have reduced the amount of control over personal data and open up the possibility of a range of negative consequences as a result of access to personal data.
9.The 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data.
10.The revelations of Edward Snowden have demonstrated that these worries are real and that the technical capabilities to collect, store and search large quantities of data concerning telephone conversations, internet searches and electronic payment are now in place and are routinely used by government agencies
11. For business firms, personal data about customers and potential customers are now also a key asset. At the same time, the meaning and value of privacy remains the subject of considerable controversy. The combination of increasing power of new technology and the declining clarity and agreement on privacy give rise to problems concerning law, policy and ethics. The focus of this article is on exploring the relationship between information technology (IT) and privacy. We will both illustrate the specific threats that IT and innovations in IT pose for privacy, and indicate how ITitself might be able to overcome these privacy concerns by being developed in a ‘privacy-sensitive way’. We will also discuss the role of emerging technologies in the debate, and account for the way in which moral debates are themselves affected by IT.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.