Free Essay

Internet Saftey

In:

Submitted By bsmither
Words 1537
Pages 7
The internet is a system of networks to provide information and resources across the world. The internet gives endless options of resources and information that could be used in various ways. Even though the internet is convenient and necessary, there is little security on the web. The internet is dangerous and provides little security for the people who go on it. There are so many ways that someone could be harmed from using the internet. Some of these dangers can be prevented while others are unstoppable. There are pedophiles, as well as hackers that use the World Wide Web to get what they want, since there is little security to stop them. Novice level hackers can be stopped by spyware installed on a computer to prevent low level viruses. However, someone faking their identity on the internet is unstoppable because there is no way of seeing if they are telling the truth. Social media is one dangerous component of the internet that has little security. Sites such as Facebook, Twitter, and Instagram are all public. This means that all the information that is posted on this website can be seen by anyone who is able to go online. Once a profile is created on one these websites, they are automatically created as public accounts. The person creating these websites would need to manually make their accounts private. Most users would not know to do this and anything they put on their accounts can be viewed by anyone. Additionally, anything that is put on the internet is permanently up there. There is no way to take something off the internet once it is uploaded to the World Wide Web. Even when a person deactivates their social network, it is not really deleted. You could very easily just log back on and all the same information will be there. This can be dangerous for many reasons. There are pedophiles or other people with negative intentions that can see what a person is doing or where they are located by looking at their posts on the website. They could also get information about the person from their profiles. Malcolm Gladwell describes an instance where a person’s location is found using the internet in his essay Small Change. A man, Evan, left his phone on the seat of a taxi cab. A girl named Sasha later picked up the phone and started to use it to go on her social media sites. The phone was located by the phone company. Once Evan found out the girl had taken it, he realized she had social media sites he could look on. Later on, “Someone found her address online” and went to the police to get her arrested (Gladwell 238). It was said that “Evan could never have tracked down Sasha” if it was not for the information available on the internet (Gladwell 238). Additionally, if someone is applying for a job and their accounts are public, the companies can look through anything they may have posted on there. If something is posted that is considered negative, the company has a reason not to hire the person based on that post. This could easily be prevented if the accounts were all private, or if the information was not viewable. The internet is dangerous because you never know who you can be talking to. This is especially applicable to social media and dating sites. Since anyone can create a profile on a site, they can make up a person or change their name to trick people they are talking to. There are people in the world with negative intentions in their mind. They can try to meet someone online posing as someone else. There are numerous scenarios that can stem from this, and none of them would be good, such as abduction. There have been known occurrences where this has happened. It is known as Catfishing by modern terms. There is one specific occurrence that took place over the last year where a famous football player Manti Te’o got catfished. Te’o believed he was in a relationship with Lennay Kekua for a few months. Before the BCS Championship Game it was said that that this girl that Te’o was in a relationship with, had died. Shortly after this was said, it was found out that the person Manti Te’o believed to be Lennay Kekua, was actually a fictitious person. “Te’o later admitted her nonexistence, claiming in several interviews that he had been conned into believing she was real” (Liebler/Moritz 1). She was made up by someone online and was playing Te’o over social media for several months. There were pictures of a random girl posted on the girls profile and had been in contact with Te’o. Manti Te’o had never met her in person but believed he was in a real relationship at the time. He was made a fool as this altered NFL scouts opinion of him. He was drafted later in the draft than he was originally projected due to this incident. This is a prime example of how dangerous it can be as it caused a young superstar to have his reputation altered. There are people on the internet that can pass the little security a person has and take information from them. This way of stealing information is called hacking. Any website, especially social media is susceptible to being hacked. With the creation of the internet and all it could do, hackers emerged to exploit this technology. They use it to take any information they please for their own pleasure. It is known to be “so easy that cybercriminals are even offering DIY kits for novice criminals” (Gold 1). A virus will allow a hacker to gain information from a person’s computer once the virus goes into effect. This is formally known as malicious software. Malicious software can be dangerous because they have “Developed evasion methods that [makes] them even more challenging to detect” (Bowles 4). A hacker could also gain enough information on the person to guess their passwords. This would be horrible, since they would have access to credit card numbers, or even social security numbers if they are present on the computer. These dangerous cybercriminals sell whatever information they get for their profit. This could to lead to someone using a credit card that does not belong to them, this is bad because “Identity thieves will use stolen credit card data from hackers to create fake credit cards and launder money” (Bowles 6). A Hacker stealing someone’s social security information could lead to identity fraud also. They could use someone’s identity as their own and ruin their life. There are some precautions on the internet to prevent hacking, however there is nothing to protect against someone hiding their identity on the internet. There is no way to check someone’s true identity when they join a social media site. They can make any fake name as they please. There is software created to protect against malicious software on a person’s personal computer. This software is meant to prevent these viruses from launching, so cybercriminals cannot access their computers and ultimately take information from them. There are also programs on the computer meant to make them safe too. However, there are ways experienced hackers can get around these by searching for weak websites to hack. Hackers are still able to get past virus protection software if they have enough knowledge and experience. Even though these safety precautions may help against small viruses, they cannot protect someone in the event of an experienced hacker trying to steal their information. To conclude, the internet is dangerous in various ways. People’s identities are hidden from each other on social media sites. This can create problems if someone is not who they say they are. There are abductions as well as other crimes that stem from this negative behavior. There are situations like Manti Te’o’s where he was embarrassed on a social media site. He was played by someone who was not even real. A stranger on the internet is not to be trusted with all the ways they can be dangerous. Additionally, someone’s location can be found just from viewing their post on a social media site. A person’s location is usually turned on with an iPhone, so it is viewable once a post is sent. Is that not scary that anyone could see where you are if they want to? Finally, one of the more common ways to get hurt on the internet is by being hacked. There are viruses every day that are waiting to get access to information on the computer they infect. The hackers steal this information to take money from credit cards, or steal someone’s identity.

Works Cited
• Bowles, Matt. "The Business Of Hacking And Birth Of An Industry." Bell Labs Technical Journal 17.3 (2012): 5-16. Business Source Complete. Web. 5 Dec. 2014.
• Gladwell,Malcolm. “Small Change”. New Yorker
• Gold, Steve. "Identity Crisis?." Engineering & Technology. Web. 5 Dec. 2014
• Liebler, Carol M., and Brian P. Moritz. "Cleaning Up After Te'o: Writers, Routines, And Repair." International Journal Of Sport Communication 6.4 (2013): 434-445. SPORTDiscus with Full Text. Web. 5 Dec. 2014.

Similar Documents

Premium Essay

Internet Saftey

...police, the FBI, even sex offenders. Meeting someone contacted online carries considerable risk and is not advised. Be careful about pictures you post online that can make it easy for people to recognize you. Resources for Parents General Internet Safety: www.NetSafeKids.org www. pollyklaas.org www.cyberangels.org www. willcountysao.com/prevention-protecting kids_online.htm Internet Filtering Software: http://kids.GetNetWise.org 2. Parent Guide 3. 4 Tips on Cell Phone Use 1. Be careful about the pictures you take and send with your phone. Pictures taken with a cell phone can be posted on the web. Be aware text messaging reveals your phone number to whomever you send a message. Internet Safety Training: www.NetSmartz.org www.staysafe.org www.safeteens.org www.safeteens.com www.safekids.com www.netparents.org 2. 3. 4. Know that predators can also send messages and call to arrange meetings. If you receive a bullying or threatening text message, report it immediately to a parent or trusted adult. Your phone has caller ID. Do not answer a call from a number that you are not familiar with or not expecting. Parents should review their service plan to learn which features can be blocked to protect children. Internet Safety for Children & Teens 5. 6. Diocese of Joliet 425 Summit Street Joliet, IL 60435 www.dioceseofjoliet.org The Web continues to change daily, to be increasingly multimedia, social and mobile. Opportunities for social networking...

Words: 973 - Pages: 4

Free Essay

Strategic Plan I

...I will analyze how the vision, mission, and values that guide my business’s strategic direction. I will evaluate how the business addresses customers’ needs and critique how they achieve competitive advantage. Mission and Vision Statement Mr. D’s Cyber Café, unlike similar café’s, will provide a unique atmosphere for communication and entertainment though the use of high speed Internet. Mr. D’s Cyber Café is the answer to the public’s demand for easy access for communication and large volume of information found on the Internet, affordable cost for entertainment and in such a way that will not leave them socially, economically, or politically isolated. Mr. D’s Cyber Café is to provide the community with a safe, social, educational, and entertaining atmosphere for people of all ages through the use of worldwide communication. The vision statement for Mr. D’s Cyber Café is as follows. To become the leading Internet Cyber Café in the Lincoln County region with a commitment to meet or even exceeds the customers’ needs and satisfaction. Mr. D’s Cyber Café aims to be the safest and most trusted Internet Cyber Café in Lincoln County. Guiding...

Words: 1293 - Pages: 6

Premium Essay

Social Media

...Statement of the Problem This study was conducted to find out what are the impacts of social media to the social skills of the selected high school students of HSL-Braille College. Particularly, this study aims to answer the following questions: 1. What are the profiles of the respondents in terms of? 1. Age? 2. Gender? 3. Socio-economic status 4. Educational Background 2. What are the reasons why the selected high school students of HSL-Braille College wants social media? 3. How does a social medium affect the social skills of the respondents? Hypotheses Ho: Social media has no significant impact to the social skills of the selected high school students of HSL-Braille College school year 2013-2014. Hi social media has significant impact to the social skills of the selected high school students of HSL-Braille College school year 2013-2014. Scope and Limitation of the study This study was conducted to determine the impact of social media to the social Skills of the selected high school students. The respondents of this study are the Selected high school students of HSL-Braille College school year 2013-2014. HSL-Braille College 26c Durian extension pag-asa st. zone 1, signal village taguig city Telefax no. 541-7137 e-mail:hslbraillecollege04@yahoo.com Social Media: its impact to the physical and mental health of the selected high school students of...

Words: 1352 - Pages: 6

Free Essay

Bitcoinyaa

...June 2012 Many large decentralized systems rely on information propagation to ensure their proper function. We examine a common scenario in which only participants that are aware of the information can compete for some reward, and thus informed participants have an incentive {\em not} to propagate information to others. One recent example in which such tension arises is the 2009 DARPA Network Challenge (finding red balloons). We focus on another prominent example: Bitcoin, a decentralized electronic currency system. Bitcoin represents a radical new approach to monetary systems. It has been getting a large amount of public attention over the last year, both in policy discussions and in the popular press \cite{NY11,technology-review}. Its cryptographic fundamentals have largely held up even as its usage has become increasingly widespread. We find, however, that it exhibits a fundamental problem of a different nature, based on how its incentives are structured. We propose a modification to the protocol that can eliminate this problem. Bitcoin relies on a peer-to-peer network to track transactions that are performed with the currency. For this purpose, every transaction a node learns about should be transmitted to its neighbors in the network. As the protocol is currently defined and implemented, it does not provide an incentive for nodes to broadcast transactions they are aware of. In fact, it provides an incentive not to do so. Our solution is to augment the protocol with...

Words: 323 - Pages: 2

Premium Essay

E-Commerce

...E-Commerce Commerce over the Internet is Relatable Safe Insert Name Insert Grade Course Insert Tutor’s Name 23 November 2010 Outline Introduction This section defines the term internet commerce and gives a brief overview of its history. Requirements for E-commerce It gives some of the major requirements involved in starting up an E-business. This includes; 1. Online store- for processing or transactions, and making purchases 2. Website- for marketing products 3. Secure interface- for preventing unauthorized people from accessing critical information Benefits of E-commerce This section gives some of the benefits and opportunities accrued to a business involved in E-commerce. They are; 1. Large number of potential customers- A large number of people rely on the internet thus they are likely to access information pertaining a particular product 2. Timeliness- transactions are facilitated quickly and customers get their products on time 3. Reduced marketing cost- requires very minimal marketing costs as compared to direct marketing 4. Reduced communication cost- communication is done online which is a bit cheaper than use of mobile phones or mails Limitation and challenges This part of the research paper gives some of the disadvantages associated with E-commerce 1. Limitation on the type of product- not all products can be sold over the internet because some require huge shipping...

Words: 3226 - Pages: 13

Premium Essay

Monitoring Employees on Networks: Unethical or Good Business

...email and have their employees use email is that it’s a most convenient way to get in touch with someone, instead of sending a bunch of letters you can select multiple groups of people at once, and you can send attachments such as pictures, documents, and other files. Depending on the type of organization they may want to limit the use of email for the employees since email can also be used for personal needs. When an employee uses email for personal use then productivity within the organization will also drop. This also can lead to employees sending out confidential information, potentially embarrassing company e-mails and trade secrets. The path of an email is meant to go directly from the sender to the receiver but can be sent over the internet to other sources and be obtained by hackers and unintended individuals either intentionally or by unintentional means so using private networks are a widely used method to avoid this from happening as much as...

Words: 258 - Pages: 2

Free Essay

Social Media and Political Change

...states as well as Spain and Uganda. The role of social media in these uprisising has been dubbed the “Twitter revoulitons.” Does social media, really deserve all those accolades? Revoultions have been overthrowing oppressive governments long before web 2.0. Iranians in overthrew the Shah in 1979, Filipinos overthrew President Marcos in 1986, and the Communist bloc in Eastern Europe crumbled one after another in 1989. This paper will explore the phenomenon of social media nad its role in promoting and prompting progressive political change, particularly in countries with oppressive leaders. Social media has been defined as “a group of internet based applications that build on the ideological and technological foundations of Web 2.0, which allows the creation and exchange of user-generated content”. (Kaplan) “Web 2.0” is the name for internet platforms which allow for interactive participation by users thereof. It may be contrasted with Web 1.0 platforms, which simply provide content to users, without giving them the opportunity to interact with or modify that information online. This content is all considered user generated content. The OECd has specified there criteria for content to be classified as “user generated”: it should be available on a publicly accessible wegsite or aon a social networking site that is available to a select group; it entails a mininmal amount of creative effort, and it is “created outside of professional routines and practices”. This definition...

Words: 1429 - Pages: 6

Premium Essay

Internet Research

...Project 3 – Internet Research Name Institution Search Engines | Directories | Meta-search Engines | Databases | Bing URL:www.bing.com | Snap.com | KAYAK | Altis | Duck duck go URL: www.duckduck go.com | MSN.com | BLINGO | eevl | AskURL:www.ask.com | Lycos | HOTBOT | Gesource | YippyURL:www.yippy.com | Yahoo! | INFO.COM | Humbul | WebopediaURL:www.webopedia.com | AOL Search | EXCITE | SOSIG | The following reports are related to cyber ethics: Sudi, V. (2011, March 25). Safer internet: Cyber Ethics. Retrieved Nov 11, 2013, from http://cyberethics.info/cyethics1/ Marshall University. (2011, Feb 11). Information Security: Cyber Ethics. Retrieved from Nov 11, 2013, from http://www.marshall.edu/infosec/resources/cyber-security-tips-newsletter/cyber-ethics/ Marshall University. (2011, Feb 11). Information Security: Cyber Ethics. Retrieved from Nov 11, 2013, from http://www.marshall.edu/infosec/resources/cyber-security-tips-newsletter/cyber-ethics/ The Web page above displays information about what entails cyber ethics. The information relayed in the site is relevant to the reader in the sense that it cautions them to use the internet safely and responsibly while conducting themselves online. It intended to inform the general public or the internet users to learn the need of navigating safely on the internet. In the broader sense the user is being informed on the basics that they should be aware of in the event they access the internet. The reader is...

Words: 803 - Pages: 4

Free Essay

Google

...changed on how we use the internet. Google is well known for being one of the best internet search engines to grace our world today. Along with that Google has been a part of the mobile technology world since the introduction of Android phones and has been the best friend for many for wanting to know something in a hurry. Naturally as the mobile demand grows Google will want to be a part of that market share. Google’s attempt to buy into the wireless spectrum was part of Google’s idea of bringing the internet to everyone everywhere. Google knew that the large key players such as AT&T and Verizon, although doing their best to provide internet access to rural areas Google could do it better because it has so much more money to invest in the research and development to succeed. The interview by Marguerite Reardon with Chris Saca, head of special initiatives for Google he explains why Google is so interested in the 700 MHz spectrum: Q: Why is Google so interested in the upcoming 700MHz auction? Sacca: The 700MHz spectrum auction represents the last big chance that the United States has to create an opportunity for meaningful change in access to the Internet for the broadest set of people possible. But why is Google, in particular, interested in this spectrum? Sacca: I think it's consistent with our company mission statement and consistent with our history of interaction with users. We have fought hard on a number of fronts to make the Internet as available as possible...

Words: 794 - Pages: 4

Free Essay

Internet Use

...Internet and Society Shaneil Drummond Indian River State College PSY 2012 Professor Greene March 21, 2010 1,020 Words Abstract This essay will explain the usage of the internet and how society deals with it. The world known idea of suicide and cyber bullying have taken over the internet. The articles used to complete this essay are very informative about the person you may be on the internet versus the person you really are. Internet addiction is a well know idea but not a fully developed research. This essay also includes how the internet can create social vampires in society. Not knowing how to interact in real life but a internet sensation otherwise. The internet has become a worldwide phenomenon where everyone has access to almost everything on the web. The books and articles available online about the internet and the different views and ways to use it has help many people realize that the internet is not all that it is cracked up to be. An article illustrates the addiction people have had with the internet over the past decade and how it has impact adolescents and young adults. “Internet users can be considered addicted if he or she scores high on six criteria” (Brown, & Blinka, .2012, p382). The six criteria they mention were...

Words: 1038 - Pages: 5

Premium Essay

Google's Orkut in Brazil

...about themselves on the internet. Users are able to create their individual profile and to communicate with friends or new people. It's popular because it helps people meet others with similar interests and similar tastes. It creates virtual communities among people who want to connect with each other, but might never meet without the mediation of the networking site. 2. Why was Orkut so successful in Brazil? What caused problems later? Google was already well known and had very good reputation in Brazil. Besides, it served a Brazilian market gap with its social networking site, which attracted the extremely community-oriented Brazilians. Orkut was also popular because it was brilliantly marketed. Managers used known cultural attractions like the name of a popular yoghurt drink, the colors of the Brazilian Football World Cup team, and such to make the site attractive. Orkut had problems with their internet security. The site was abused by some users who turned it into a meeting place for illegal activities, such as child pornography and drug dealing. The company did not control such users and did not even react when other users complained. Google even resisted requests from Brazilian legal authorities to share information, when the courts were investigating users committing serious crimes. Orkut was not able to negotiate with the Brazilian law in an appropriate way. The company failed to understand that Brazilian law does not protect internet privacy as strictly as...

Words: 713 - Pages: 3

Premium Essay

The Shallow's Essay

...What the Heck has Internet Done to Our Brains? Section I: Introduction and Context Imagine going back in time and staying there permanently. Out of all the things that will be missed, there is no doubt that the one thing would be technology. The Shallows: What Internet is Doing to Our Brains is nonfiction book written by Nicholas Carr who asserts and cautions the effects that internet has on everyone to this day and even more so in the future. People nowadays can communicate with people all around the world using many different types of communications such as social networking sites, cell phones, emails, etc. Carr brings in many different scientific research as well as a couple of personal experiences to show the great change in technology and the internet. The author chose to write The Shallows from an epiphany he had realized, “It (his brain) was hungry. It was demanding to be fed by the net feed...I wanted to check email, click links, do some googling. I wanted to be connected” (Carr 16). The way that technology has changed and developed the internet has made Carr want to stress the fact that although technology is very useful, it can be very harmful to peoples’ brain in a way that it affects a person’s deeper level of thinking. Section II:The Author’s Background Nicholas Carr is a columnist, member of the Encyclopedia Britannica's editorial board of advisors, as well as an executive editor. Carr writes about technology, culture, and economics which have made his books...

Words: 2517 - Pages: 11

Free Essay

Digital Divide

..."A term used to describe the discrepancy between people who have access to and the resources to use new information and communication tools, such as the Internet, and people who do not have the resources and access to the technology. The term also describes the discrepancy between those who have the skills, knowledge and abilities to use the technologies and those who do not. The digital divide can exist between those living in rural areas and those living in urban areas, between the educated and uneducated, between economic classes, and on a global scale between more and less industrially developed nations (webopedia.com) ." I guess from my opinion I am still stuck on the digital divide process also. In the area that I live it is very low income and at least 90 percent of the parents are using the government to pay their child care. This speaks volume for the need of computers in this town. I talk with many parents on where to go on the internet to find a job and almost all of them tell me that they don’t have a computer. Then I suggest they go to the library and now I learned that the library only have four computers. When I look around this town I see why most people have not progress to better living. Since you and I know that it takes a computer most of the time to find a job, because no one want to use paper application anymore. The web is the maximum advancement of knowledge in my lifetime the of destroyer applications for the computer. Believe it or not there...

Words: 850 - Pages: 4

Premium Essay

The Impact of Information Communication Technology

...the Internet, the E-Mail. I will also explain current development in C/T and discuss the role of legislation on the industry. Mobile Technology: Mobile Technology is the technology used for cellular communication. They come into use in 1990’s. When first introduced, it way a luxury item, today it is viewed as an essential to our existence. Old mobile technology consisted of a large handset, battery and signal difficulties and was very expensive. Since the start of this millennium a standard mobile device has gone. Today mobile are slim line, cheaper and can perform of many functions: Personal Mobile use: * To call * To Text * Camera functions * Games * Alarm * Email * Internet * Calendar * App Store Business use: * To communications with staff, customers/business partners Advantages of Mobile Technology: * 24/7/365 contact * Accessible at all time * Variety of services available via any mobile * Mobile Marketing reaches new and existing customers * Sending out special offers and tracking responses. * GPS in phone can help to locate hard-to-find places and be on time for appointments. Disadvantages: * No escape from its demands * Health risks * Bullying * Hacking problems * Costs * Lack of information control * Privacy issues * Safety issues This completes my overview of mobile Technology. For the purposes of this essay: Internet The Internet is a...

Words: 867 - Pages: 4

Free Essay

Bis 320 Week 2

...Week Three Student Guide This week’s topics cover collaboration tools and Internet technologies and their use in meeting business goals. Reviewing some of the chapter one readings will help you with the other chapters. You will become familiar with Internet terminology, such as B2B, B2C, B2G, Web 2.0, and Social CRM. Knowledge of collaboration tools can make you very marketable as a business manager, because many companies use these tools in their team work. This week covers using these collaboration tools to improve communication as well as document sharing. Internet and Collaboration Tools OBJECTIVE: Determine how and when to use Internet technologies in business. Resources: Ch. 1 & 8 of MIS Essentials Content • Ch. 1: The Importance of MIS o Q1: Why is Introduction to MIS the Most Important Class in the Business School? o Q2: What is an Information System? o Q3: What is MIS? o Q4: Why is the Difference Between Information Technology and Information Systems Important to You? o Q5: What is Your Role in IS Security? • Ch. 8: E-Commerce, Web 2.0, and Social Networking o Q1: What Types of Interorganizational Systems Exist? o Q2: How do Companies use E-Commerce? o Q3: Why is Web 2.0 Important to Business? o Q4: How Does Social Capital Benefit You and Organizations? o Q5: How Does Social CRM Empower Customers? OBJECTIVE: Determine collaboration tool needs based on business function. Resources: Chapter Extension 2 of MIS Essentials, Article...

Words: 404 - Pages: 2