Friday, June 14, 2019
Cybersecurity Coursework Example | Topics and Well Written Essays - 500 words - 6
Cybersecurity - Coursework Exampleg to the increasing significance of technology in the daily lives of mankind, many people overlap their personal information on the internet which can at times prove dangerous due to web hackers who can misuse the data due to immoral practices.Anonymity helps to maintain the secrecy of individuals identity. This also helps to protect specific actions performed by the individuals. For instance, anonymity helps protecting funds and monetary transfers make by individual over internet. It has often been observed that people feel uncomfortable to share banking or personal information on the internet as it might hamper their personal interests. Anonymity is often regarded as the option which can be useful in such situations as it creates a palpate of security and helps to protect privacy by a large extent. There are many negative effects of anonymity on individuals as well. To be illustrated anonymity also helps people who have malicious intentions to h amper the interests of other users and escape without being identified. It also creates misrepresentation about the users pen on internet. In the recent phenomenon, the most apparent negative effect of anonymity can be identified as cyber crime. Hence, as it can be observed from the above discussion, to a certain extent, the negative impacts of anonymity tend to be stronger and more effectual than its benefits, which in turn outweigh its advantages.Question 2 Are non-literate internet users at a higher run a risk for experiencing identity theft? Explain specifically how end-user tracking and recording technologies may either accession or reduce cyber security risks for non-literate users when using the internet, or when shopping at a brick and mortar establishmentThe non-literate internet users have a high risk because of the increasing cyber crime, as they tend to share personal information without having proper knowledge of the website. At times, the information of those non-li terate users is hacked by the cyber
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.