.

Thursday, March 14, 2019

Safe Personal Computing to National Security :: Computers Technology Internet Essays

Safe Personal calculation to farmingal Security Am I Safe at my data processor? Ive posed that question and others to myself many time. argon the e-mails I send almost daily truly assure? Are my confidential e-mails from the Ohio Universitys server truly confidential? Who else can cipher what I see? Sure in a perfect public we all would analogous to believe were safe but the naive fact is that we ar not safe all the time and the humans is not perfect. People hack, as it is referred to, into almost anything or anywhere. Id like to think that most people would have the ethical motive not to violate my ad hominem protective covering, but thats just it they put one overt. This since increasingly our e-criminal of today has the technical skills of an adult and the ethics of a dainty child (Shuchman). Most astonishing of all is that this is occurring because they are small children, or teens. I choose this topic because computers, e-mail, and the World Wide Web a re increasingly becoming the dominate necessity of my daily life. I am at a computer a least three times a day for lengthy periods of time. I send out individualized account nurture, my social tribute number and other important secure information across the web and not mention all the information I store my computers hard drive. So I ask in one case again am I safe? Hacked at Home and Nation Wide You use to only here about the serious e-crimes. You make out the ones that try to take down the CIA or the stock exchange. Now the hackers and security risks are hitting home. In the form virus that can do anything from crippling your PC to sending in worms that eat up your files. The attacks arent just personal wither. In the spring of 2001 there were attacks on hundreds of personal computers connected to the web via the new broad band connections. Two attacks involving or so 500 Windows-powered PCs with broadband connections were used to shut down a security consultants Web site in Southern California (Thorsburg). Hundreds of home computers were plain recruited into some sort of malicious cyber army. This or these hackers used computer like yours and mine to work for them turn them against a larger network.

No comments:

Post a Comment