An issue of concern at is Computer privacy. Computer privacy techniques have been developed to protect single computers
            
 and network-linked computer systems from accidental or intentional harm. The main reason for protecting these computers is to
            
 keep them from physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized
            
 Computers and the information they contain are considered confidential systems as they are used mostly to a limited number of
            
 users. Confidentiality and the possession of information can be violated by unauthorized users who shoulder surf or by
            
 observing another user's computer screen. Also by tricking authorized users into revealing confidential information, wiretapping,
            
 or listening in on or recording electronic communications people who wont to invade our privacy can easily do so. Several
            
 techniques are used to prevent computer crimes such as Encryption, Approved Users, Passwords, Fire Walls, Security
            
 Servers, Integrity and availability. 
            
 Using encryption is a very good way of preventing our privacy being violated, with this information can be scrambled and
            
 unscrambled using mathematical equations and a secret code called a key. Two keys are usually used one to encode (make the
            
 calculation) and the other to decode (calculate the equation) the information. The keys that encodes the data are called the
            
 private key and are only kept in the hands of the sender. The key that decodes the data which is called the public key can be
            
 possessed by several receivers. Keys are modified periodically, keeping unauthorized access and making the encrypted
            
 information difficult to decode if it comes in the hands of someone else. 
            
 Another technique to prevent computer crime is to limit access of computer data files to approved users. Access-control
            
 software is a good way of keeping privacy as it verifies computer users and limits their privileges to view and...