1,677
18
Essay, 3 pages (600 words)

Cybersecurity

Cybersecurity Question Determine the extent that anonymity has helped better society, industry, and individuals. Does the malicious use of anonymity outweigh the positive benefits it provides?
Anonymity on the internet has emerged as an important issue within the contexts of modern society, industry as well as individuals. It is in this context that anonymity on internet can have diverse consequences for the users owing to its diverse features to render uncomplicated access to every media with minimum or no charges. Many of the users or rather web hackers today, implement software applications such as Tor which allocates active communication facilities around a network as a result of which the sender or the information cannot be tracked. Owing to the increasing significance of technology in the daily lives of mankind, many people share their personal information on the internet which can at times prove dangerous due to web hackers who can misuse the data due to immoral practices.
Anonymity helps to maintain the secrecy of individual’s identity. This also helps to protect specific actions performed by the individuals. For instance, anonymity helps protecting funds and monetary transfers made by individual over internet. It has often been observed that people feel uncomfortable to share banking or personal information on the internet as it might hamper their personal interests. Anonymity is often regarded as the option which can be useful in such situations as it creates a sense of security and helps to protect privacy by a large extent. There are many negative effects of anonymity on individuals as well. To be illustrated anonymity also helps people who have malicious intentions to hamper the interests of other users and escape without being identified. It also creates misrepresentation about the user’s profile on internet. In the recent phenomenon, the most apparent negative effect of anonymity can be identified as cyber crime. Hence, as it can be observed from the above discussion, to a certain extent, the negative impacts of anonymity tend to be stronger and more effectual than its benefits, which in turn outweigh its advantages.
Question: 2 Are non-literate internet users at a higher risk for experiencing identity theft? Explain specifically how end-user tracking and recording technologies may either increase or reduce cyber security risks for non-literate users when using the internet, or when shopping at a brick and mortar establishment
The non-literate internet users have a high risk because of the increasing cyber crime, as they tend to share personal information without having proper knowledge of the website. At times, the information of those non-literate users is hacked by the cyber criminals. Similarly, literate users are also badly affected by the frequent occurrences of cyber crimes. For instance, the sharing of information such as funds and bank account details by the user can also prove harmful being affected by the cyber security risks.
However, there is a higher propensity for vulnerability when the users do not recognize the use of current technologies. For instance, people, especially non-literate internet users often think that online purchasing from personal smart phones is a safe option to secure data than through the public computers. As the actual trouble might be with the security policies of the website, the information can be embattled by a third party. Conversely, as many literate users know the essence of networking information through websites, they can obtain greater control to prevent cyber crimes. In recent times, many users are observed to be engaged in social sites as they tend to be adequately aware and technically proficient to protect their profiles so that it cannot be browsed by third party users. Hence, non-literate users must be aware about the technicalities of a website prior to sharing their personal information.
Bibliography
Kabay, M. E., Salveggio, E. & Guess, R. (2009). Computer security handbook. New York: John Wiley & Sons.

Thank's for Your Vote!
Cybersecurity. Page 1
Cybersecurity. Page 2
Cybersecurity. Page 3
Cybersecurity. Page 4

This work, titled "Cybersecurity" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Cybersecurity'. 15 September.

Reference

AssignBuster. (2022, September 15). Cybersecurity. Retrieved from https://assignbuster.com/cybersecurity-essay-samples-4/

References

AssignBuster. 2022. "Cybersecurity." September 15, 2022. https://assignbuster.com/cybersecurity-essay-samples-4/.

1. AssignBuster. "Cybersecurity." September 15, 2022. https://assignbuster.com/cybersecurity-essay-samples-4/.


Bibliography


AssignBuster. "Cybersecurity." September 15, 2022. https://assignbuster.com/cybersecurity-essay-samples-4/.

Work Cited

"Cybersecurity." AssignBuster, 15 Sept. 2022, assignbuster.com/cybersecurity-essay-samples-4/.

Get in Touch

Please, let us know if you have any ideas on improving Cybersecurity, or our service. We will be happy to hear what you think: [email protected]