Type a new keyword(s) and press Enter to search

Erosion of Privacy

 

(Cosgrave) .
             Finally, the third is the storage of information. The ubiquity of information technology allows more and more redundant information about us to be kept for longer periods. (Cosgrave).
             New technology has also become a major problem in the fight for privacy. In 1999, an email based privacy hole was found in the Microsoft and Netscape software that was available to the public. The email messages that were being sent from the program were interacting with the web servers, making it very easy for someone to go through you email. (Oakes).
             The privacy loophole enables unsolicited emails to retrieve personal information on the receiver's computer using Web cookies. When the cookies are produced by email rather than a web site, hackers can much more easily match cookies with personal information on the user's visits to their websites. (Oakes).
             Although the loophole was uncovered and fixed, the possibility of interaction between websites and the messages in user's email once again demonstrates that an increasingly networked world brings an increasingly dense thicket of problems. (Oakes).
             With the world becoming more and more networked together, the use of the virus is becoming more common and becoming more of a threat. The Trojan Virus, the popular virus used to retrieve information on personal computers, has become a major problem with people's privacy. This virus allows the sender to tap into people's personal computers and take over their hard drive and all the files on it. With this, the sender of the virus can get into people's credit reports, access credit card numbers, and retrieve personal information that can be used against them.
             In some cases, the sender of the virus takes the information that they get and completely steals the person's identity. Photo ID's are made with their name and information on it and their life is lived by another person, which includes having all of their money spent by another person.


Essays Related to Erosion of Privacy