An issue of concern at is Computer privacy. Computer privacy techniques have been developed to protect single computers
and network-linked computer systems from accidental or intentional harm. The main reason for protecting these computers is to
keep them from physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized
Computers and the information they contain are considered confidential systems as they are used mostly to a limited number of
users. Confidentiality and the possession of information can be violated by unauthorized users who shoulder surf or by
observing another user's computer screen. Also by tricking authorized users into revealing confidential information, wiretapping,
or listening in on or recording electronic communications people who wont to invade our privacy can easily do so. Several
techniques are used to prevent computer crimes such as Encryption, Approved Users, Passwords, Fire Walls, Security
Servers, Integrity and availability.
Using encryption is a very good way of preventing our privacy being violated, with this information can be scrambled and
unscrambled using mathematical equations and a secret code called a key. Two keys are usually used one to encode (make the
calculation) and the other to decode (calculate the equation) the information. The keys that encodes the data are called the
private key and are only kept in the hands of the sender. The key that decodes the data which is called the public key can be
possessed by several receivers. Keys are modified periodically, keeping unauthorized access and making the encrypted
information difficult to decode if it comes in the hands of someone else.
Another technique to prevent computer crime is to limit access of computer data files to approved users. Access-control
software is a good way of keeping privacy as it verifies computer users and limits their privileges to view and...