Week 14 – Safety and Security on the Internet

It is easy to be secure on the internet with the large amounts of anti- virus software available to internet users. However there is a big difference between security and safety, which many people do not think about. When being secure on the internet products, such as Norton 360 and turning on the computers firewall, can ensure that your computer and the information on it is safe from hackers and virus’. However no product can ensure safety as this is purely human behaviour.

Image

Safety is usually how criminals get their information for example, sending a vulnerable user spam or an email posing as the bank. This tricks users into believing the bank has contacted them, due to an issue with their account. As a result the user types in all their PIN numbers and passwords which are being watched by hackers. Consequently this information is in completely the wrong hands and whole bank accounts are emptied of their money.

Moreover although new technologies, are allowing for bigger risks new advanced protections are being invented, like the AVISPA tool which checks for attacks on the input protocols. Similarly the internet can pose other risks such as addition. Currently internet addition is not a recognised illness however those with impulsive traits like gambling, do tend to experience addiction to the internet. Studies have been carried out and as the internet is growing, so are the users and in particular the gamers. For example China in 2009 increased by 28.9 percent with regards to users of the internet. (Study on Causes and Strategies of Online Game Addition among College Students, 2010) Therefore the internet may not be as safe as users think, especially as it is linked to part of the reason for the rise in obesity.

Upon reflection I really enjoyed writing this post, I understood the content really well and added some of my own content. However to improve I could be writing a little more concisely to reduce the size of the blog. In addition becoming more active in the blogging community would benefit me because it would allow me to gain feedback upon my work. This would also enable me to check my understanding and ensure all relevant points have been expressed properly.

Cites for this blog:

Adeyinka, O. 2008. Sch. of Comput. & Technol., Univ. of East London, London. pp. 77-82. Available from: doi: 10.1109/AMS.2008.68.

Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P., Heám, P., Kouchnarenko, O., Mantovani, J., Mödersheim, S., Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L. and Vigneron, L. 2005. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. pp. 281-285. Available from: doi: 10.1007/11513988_27.

Sciencedirect.com. 2014. Problematic Internet use or Internet addiction?. [online] Available at: http://www.sciencedirect.com/science/article/pii/S0747563205000439 [Accessed: 2 Feb 2014].

Uk.images.search.yahoo.com. 2014. Principales Antivirus. [online] Available at: http://uk.images.search.yahoo.com/images/view;_ylt=A2KLj9HydO5S5CgAQRVNBQx.;_ylu=X3oDMTIzMWhmbnZ0BHNlYwNzcgRzbGsDaW1nBG9pZAMwZGE2ZDFkODA0MDZiZWUwZGZhZmEyMGUyYmY1YTM2NARncG9zAzEzBGl0A2Jpbmc-?back=http%3A%2F%2Fuk.images.search.yahoo.com%2Fyhs%2Fsearch%3Fp%3Dantivirus%26type%3Dirmsd1202%26fr2%3Dpiv-web%26hsimp%3Dyhs-fullyhosted_003%26hspart%3Dironsource%26tab%3Dorganic%26ri%3D13&w=650&h=451&imgurl=1.bp.blogspot.com%2F-Yju-yU2OIDI%2FUKl1g3ePxcI%2FAAAAAAAAAIY%2FO9KpuwqKlBU%2Fs1600%2Fantivirus-windows7.png&rurl=http%3A%2F%2Fsenavirusyantivirusinformaticos2012.blogspot.com%2F&size=178.6KB&name=Principales+%3Cb%3EAntivirus%3C%2Fb%3E&p=antivirus&oid=0da6d1d80406bee0dfafa20e2bf5a364&fr2=piv-web&fr=&tt=Principales+%3Cb%3EAntivirus%3C%2Fb%3E&b=0&ni=96&no=13&ts=&tab=organic&sigr=11o1q46u9&sigb=14hdd2q6u&sigi=12va0b257&.crumb=mwnIVsGMQ.m&type=irmsd1202&hsimp=yhs-fullyhosted_003&hspart=ironsource [Accessed: 2 Feb 2014].

Xuemei, Q. and Hua, N. 2010. Dept. of Sociology, Guangxi Univ. of Technol., Liuzhou, China. pp. 1-4. Available from: doi: 10.1109/ICMULT.2010.5630987.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s