computer privacy

             An issue of concern at is Computer privacy. Computer privacy techniques have been developed to protect single computers
             and network-linked computer systems from accidental or intentional harm. The main reason for protecting these computers is to
             keep them from physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized
             Computers and the information they contain are considered confidential systems as they are used mostly to a limited number of
             users. Confidentiality and the possession of information can be violated by unauthorized users who shoulder surf or by
             observing another user's computer screen. Also by tricking authorized users into revealing confidential information, wiretapping,
             or listening in on or recording electronic communications people who wont to invade our privacy can easily do so. Several
             techniques are used to prevent computer crimes such as Encryption, Approved Users, Passwords, Fire Walls, Security
             Servers, Integrity and availability.
             Using encryption is a very good way of preventing our privacy being violated, with this information can be scrambled and
             unscrambled using mathematical equations and a secret code called a key. Two keys are usually used one to encode (make the
             calculation) and the other to decode (calculate the equation) the information. The keys that encodes the data are called the
             private key and are only kept in the hands of the sender. The key that decodes the data which is called the public key can be
             possessed by several receivers. Keys are modified periodically, keeping unauthorized access and making the encrypted
             information difficult to decode if it comes in the hands of someone else.
             Another technique to prevent computer crime is to limit access of computer data files to approved users. Access-control
             software is a good way of keeping privacy as it verifies computer users and limits their privileges to view and...

More Essays:

APA     MLA     Chicago
computer privacy . (1969, December 31). In MegaEssays.com. Retrieved 09:39, April 23, 2024, from https://www.megaessays.com/viewpaper/65856.html