IT Security: Unauthorized Access To Society's Personal Information

Great Essays
What is ‘IT SECUIRTY’?
IT security is the implementation of defending illegal, unauthorized access to society’s personal information, and to design systems to securely safeguard documents, held on ICT equipment and applications.
We need to have this type of security due to; General society, businesses, organizations and the government, all using ICT based applications and technology to store valuable data, such as; Names, addresses, contact information, phone calls, credit history, medical records, employment history, convictions and or secretive files.

IT SECURITY WITHIN HOMES/SCHOOLS –
There is IT security within homes and schools, due these places containing ICT technology which possess important files and personal information. Also living
…show more content…
The following are the important uses and benefits of a computer network -
• File/Hardware sharing - Networking of ICT technology helping the network users to share such things. Without using computer networks, this sharing is not possible.
• Application sharing - Allows to implement client/server applications.
• User communication - Networks allowing users to communicate to each other, for example; Using e-mail, newsgroups, and video conferencing.
• Voice over IP - Voice over is a modern change in telephone calls, which allow people to send telephone calls using standardized Internet Protocol rather than using PSTN (anagram for - Public Switched Telephone Network).

COPYRIGHT LAW –
The Copyright Law gives the inventors media rights to control how their creations are distributed and used. Books, music, video and software can all be protected by the Copyright Law (prevention of piracy). With the Copyright Law in place imitations are imposed by copyright
• Making a copy of the original to give to a friend, or to sell it on for profit.
• Using the software on a computer network, (unless the creator and or licence allows

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Schools, colleges and office buildings would all use a LAN to interconnect their computer systems. They typically range from 1 – 10km. They are able to transmit data much faster than what can be transmitted over a phone line usually around 100kbps – 100mbps, they are cheap to set up compared to the other networks needing a switch and a hub. MAN – (Metropolitan Area Network) A MAN is similar to a LAN but able to cover an entire city.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Most wide area networks are made from several Local area networks connected together. A Local area network covers a small area. However, the Internet is a wide area network. This means the devices can be shared and this is effective for the reason that employees can see the possessions and it is faster and it ensures the company knows what is occurring. Network users can communicate by email and instant messenger.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In the profession of IT a key component in your job will be looking after networks keeping them operational (for the users whom use the network), safe (clean out any corrupt files, check security measures, look for a virus. Etc…) and secure (making sure only authorise users are accessing the network). But first what is a network in a general meaning? A network consists of two or more computers that are connected in order to share resources (such as printers), exchange files, or electronically communicate. The computers on a network can be linked through various ways such as cables, telephone lines, radio waves, satellites, or infrared light beams.…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Technical Paper – Honeypot IT-548-Q1088 Information Security Submitted by Anudeep Gali Professor: Dr. Derek Holbert Southern New Hampshire University Abstract: Internet is one of the useful resources to the mankind but on the other hand possess so many threats and provides a means of attack for the Intruders. In this project we will be building a secure shell Honeypot and deploy on a public server to research the cyber attacks. Once we deploy the system, we will concentrate on recording all the attempts made by the intruder to enter the information system. We will be able to analyze the most commonly used usernames and passwords and analyze the shell commands used by the intruders to develop remedies of attacks on the original…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Unit 1 Q1 Copyright Law

    • 69 Words
    • 1 Pages

    Q1: Copyright Laws Copyright is a legal right 70 years Is any copy done of copyrighted material Taking someone else’s work and using them as one’s self Things that can be copyrighted are Cds and also video games. What can not be copied is Art nobody can draw or paint the exact same thing as another person. It is a state of being public or being available to the public.…

    • 69 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Show the students the Brainpop video: Information Privacy (https://www.brainpop.com/technology/digitalcitizenship/informationprivacy/)- explain to the students that while they are using the Internet, they should be aware of people that may try to use their personal information in a hurtful way (rumor spreading, cyberbullying, finding out where they live), and also how to protect themselves and their personal information from anyone who may want to harm them. Discuss what the word privacy means? (Allow time for students to come up with some good definitions. Start an anchor chart to write up responses) Then tell the students to turn to an elbow partner and discuss the following questions: Is privacy something that you desire?…

    • 182 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    In my own words, I would explain to someone that copyright laws are giving permission from the creator of the original work to another person so they can use it. There are limitations and exclusive rights, including fair use of the original copy. It provides the creator work control over many activities such as, the right to reproduce, distribute, and display the work.…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Importance Of MIS

    • 969 Words
    • 4 Pages

    Every new system requires new tasks, costs, procedures, or hardwares. You will need to manage and utilise the new system with the employees applying considerable work effort. On the other hand, information technology (IT) refers to the technology itself behind the systems. This includes hardware, software and data components of the five component model. A person can acquire information technology by purchasing hardware, downloading software, or obtaining procedures.…

    • 969 Words
    • 4 Pages
    Improved Essays