The Importance Of Staying Safe In Cyberspace

Improved Essays
“Staying Safe In Cyberspace.”

The World Wide Web may seem fun and controlled, but in reality, it’s full of dangers that many people wouldn’t even want to imagine. These dangers include real people known as internet predators, viruses and scams, the various layers of the Internet known as the Dark Web and Deep Web, and the fact that nothing is ever gone, not even after you delete it. These reasons are why individuals should stay safe in the real world, and even safer in cyberspace.
The Internet is full of people and things that are both dangerous and in some cases, untraceable. Unless the person is someone that’s known in real life, no one can ever be sure who they’re talking to, or if they’re a friend, or someone dangerous. Internet predators tend to fall between the ages of 18 and 55, although some may be older or younger than that. Their targets tend to range from ages 11 to 15. It is observed that teens are completely willing to meet with strangers, as in one hundred percent of the cases, teens that are the victims of sexual predators go willingly to meet with them. As of 2015, there are a total of 799,041 registered sex offenders in the United States alone.
…show more content…
Some ways to do that are reading articles about scams and viruses, being aware of predators, shopping safely on websites that have “https”, have passwords that aren’t easy to figure out, and install a firewall. All of these can be done relatively easily and is a small price to pay for protecting your privacy online. (Robert Siciliano, 2014). However, just because you do something like deleting a picture or a post, doesn’t mean that it’s gone forever. Nothing ever disappears on the Internet. Once it’s posted, it lives forever in little pixels of data that virtually anyone can have access to. This is why many people need to think before they post, and decide whether or not being known for or by something you put online is worth

Related Documents

  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The chapter opened by discussing how digital information that people may think is hidden, or even destroyed, is often still accessible to the public. The authors described how the bits that store a given piece of information are never destroyed, but simply overwritten by other data when files are replaced or “deleted.” The descriptions of the people who sold their devices to people, only to have the people who bought their devices to discover personal identification information, “deleted” documents, and even credit card account…

    • 871 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    This paper outlines various issues regarding privacy in social media such and the precautions that have to be taken to ensure that information…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    With the growing age of technology, it is becoming easier and easier for minors to fall victim to criminals attempting to exploit their vulnerability. The use of the internet has become a go to resource for child predators across the nation. In United States Federal Courts, the argument has been presented that the sentences in relation to §2G2.2 of the Federal Sentencing Guidelines Manual which outlines the trafficking in material involving the sexual exploitation of a minor (Federal Sentencing Guidelines Manual , 2011). The argument being is this section of the sentencing guidelines are congressionally directed rather than empirically being empirically based. When federal cases are tried, the length of imprisonment is determined by the United States Sentencing Commission sentencing table (Cite2).…

    • 1414 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Computer technology progressed rapidly since the 1900’s. Computers are no longer scarcely around, many people have them and use them on a daily basis. They have also become an important source of evidence in criminal activities. Computers are very helpful for homicide investigators, because they can discover whether methods on how to murder were researched on the internet, if anything suspicious can be found in emails, or if threats were made towards the victim prior to the murder. Since children can easily get on the computer to use the internet, it gives sexual predators an opportunity to seek out child victims online.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Teen sexting has been a controversy for years, due to its legal connection to child porn. The two terms have separate definitions, but can overlap depending on the age of the person sending or keeping the message. The definition of child pornography states that any sexually-explicit picture or message of a minor, consensually given or otherwise, will always be child porn and is subject to a criminal charge. This leaves consensually sexting adolescents in a bit of a bad place. They are at risk of being sent to prison or sex-offender registration for willingly participating in an activity with no intent to cause harm.…

    • 1495 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Modern slavery Human and sex trafficking is the second largest crime in the world behind the selling of illegal drugs; with anywhere from 14,500 to 17,500 people being trafficked in the United States, and 600,000 to 800,000 all over the world (11 facts). Many of the victims being kids ranging in ages from 12 to 14. One of the ways that people are tricked into becoming a trafficking victim are through “friends” that they meet online and want to meet up. Seeing how popular social media sites are in today 's society shutting them down is not an option. A solution to help better protect people while online is to teach society what the do’s and dont’s while on any social media as well as what could be a threat.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Regulation A preponderance of states have laws that include comprehensive electronic forms of conveyance within stalking or harassment laws. Most law enforcement agencies have cyber-crime units and Internet stalking is frequently treated with more severity than reports of physical stalking. Guidance and resources can be found by state or area. Schools The safety of schools is exponentially becoming a focal point of state legislative measures.…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Great Essays

    The average citizen is unaware of what happens to the information they post to the internet. We share pictures and make comments without hesitation, not realizing that our words are forever ingrained into the fabric of the internet, being forever viewable to the world. Our online activity is constantly on display and is being tracked at every moment. The United States has been granted the ability to secretly examine, store, and distribute the metadata of potentially billions of people with the greatest surveillance capabilities ever seen in human history; with all the power concentrated almost exclusively within the Executive Branch of the government; specifically surveillance agencies such as the NSA, and the FISC courts that approve of their…

    • 1163 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    High Risk Sex Offenders

    • 372 Words
    • 2 Pages

    Today, there are many sex offenders residing in the United States. Many of the offenders get out of jail or complete their punishment and move to neighborhoods that other citizens live in. Therefore, people like to know who the sex offenders are that live by them. This is because people want to ensure that their kids are safe and they are safe. Many states have adopted website that enable people to track the sex offenders who live near their residences.…

    • 372 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Searching, frantically looking for days, fearing the worst, and praying for the best. Imagine sitting in your house while your child is missing. Police questioning you asking for all of your child’s details, height, weight, hair and eye color, clothing they were wearing. That is what Nicole Cable’s mother experienced in May of 2013. Nicole, who was 15 at the time, left her house to meet a 20 year old man she had met on a popular social networking website, Facebook, and never made it home.…

    • 1067 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Sexting Research Papers

    • 1062 Words
    • 5 Pages

    In a world filled with online connections and virtual realities, it seems like the populace would enjoy the privilege of getting to present oneself in their own way, to craft their identities and shape people’s perception of them. As appealing as that proposition sounds, research is beginning to show another reality, one much darker and more pervasive is realized. Social media has been raised on a pedestal of glory, being flaunted as a way to connect with the world, to interact with more people faster and with more control than ever before. However, contrary to expectations, social media has turned into a virtual monster. It influences all aspects of its users lives, driving them to be more: more connected, yet independent, more beautiful,…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Predators at the least can look for vulnerable children to create online sexual relations with. Other predators try to meet face-to-face with children they find online. The worst cyber-predator is one that lurks for children to become a victim of human trafficking. However, the internet isn’t all…

    • 1574 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    A lot of people will tell you that you won’t get caught if you do something bad on the internet but don’t listen to them follow the rules of netiquette and be safe. People usually don’t follow the rules of netiquette but everyone who uses the internet…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Predators online are very manipulating. Sometimes adults end up falling for the same trap that children do. A show called Catfish shows many adults getting scammed by people who are pretending to be someone else over the internet. If adults are…

    • 836 Words
    • 4 Pages
    Improved Essays

Related Topics