Saturday, August 24, 2019
Password and hacking under the privcy issues Research Paper
Password and hacking under the privcy issues - Research Paper Example Hackers view the peopleââ¬â¢s privacy as an unknown intriguing matter, which has to be conquered. The hacking methods have kept up with the development of the various technologies meant to protect the privacy of the users and they have managed to violate them and gain access to oneââ¬â¢s personal information. A proof of their rapid development is that, according to the FBIââ¬â¢s National Computer Crimes Squad, 85 to 97 percent of computer intrusions are not detected. Moreover, only 19 % of the attacks are reported.1 Installing password for online accounts is one of these methods; in fact, it is the most popular one. No matter the nature of the accounts, whether it is an account in a social network, or an email account, installing passwords to it is the best that one can do in order to protect his/her account from uninvited curious ââ¬Å"guestsâ⬠. The objective of this paper is to analyze how violating oneââ¬â¢s account by cracking its password is regarded from the privacy ethical point of view. The paper shall present the legislative acts that tend to legally protect personal information from hackers and their practical application in the real life. The paper is divided into two chapters. The first chapter is dedicated to the history of hacking and its development. It will also describe the most common methods of password violation and the hackersââ¬â¢ point of view on this matter, under the privacy issues. The next chapter will describe the acts that are meant to protect personal information and guarantee oneââ¬â¢s privacy and their efficiency in application. Some popular law cases connected to password hacking will be described and analyzed. Most of us associate the activity of ââ¬Å"hackingâ⬠with illegal conduct, infringements and law violations. Of course, a hacker for us represents a law disobedient person, some kind of a rebel that instead of living his life normally chooses to spend days and nights in front of a computer and break into
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.