Question

In: Computer Science

Briefly describe each of the following as they relate to digital security and privacy: Viruses and...

Briefly describe each of the following as they relate to digital security and privacy:

  • Viruses and malware
  • Privacy
  • Health concerns
  • Environmental issues

Solutions

Expert Solution

1) Viruses and malware: Malware and viruses are used by cybercriminals in order to breach into a system inorder to manipulate your data. At first when a person downloads or clicks into a malicious link then viruses or malwares get downloaded into the system and then creates a breach by multiplying itself. Using this cybercriminals can break into your system and cause security concern. They can even manipulate your credentials or even credit card details cause a lot of harm to you.

2) Privacy: Privacy and digital security are interrelated to each other. As most of the peopl use online sites to store or processes their personal data, their data can be used and manipulated without your concern. In order to protect your privacy many organisations develops safety measures so that while transferring or storing your data there is no third party person who can manipulate your privacy.

3) Health concerns: with the advancement of technology online consultants check and regulate their patients on the go. Although this makes the process very easy but using these technologies with no such security concerns can cause the person a lot of damage. By doing this cybercriminals can gain unauthorised details to you data such as credit card details, address details and private details. Sometimes a cybercriminal can gain access to your data and ask for a huge ransom in order to release your data.

4) Environmental issues: Your data and your privacy may be under threat due to environmental issues. For example a thunderstorm may pull your server down and using this a cyber criminal can gain illegal access to the server while it is down and mitigate threat to the organisation. This threat can be also within an organisation such as an employee from the company who has access and is authorised to view sensitive files can gain access during the outage and cause security issues to the organisation.

In data centers due to man made or environmental issues can cause data center to go down and then using malwares or downtime of the server, cybercriminals can gain unauthorised access to the data and can manipulate privacy of not only of the employees working there but also to the clients and the customers related to the organisation.

If you liked the solution then give a thumbs up ? it will be really appreciated ?


Related Solutions

briefly describe your experience with HIPAA privacy or security regulations. Do you think too many or...
briefly describe your experience with HIPAA privacy or security regulations. Do you think too many or not enough resources are devoted to protecting health information? Why or why not? Explain fully. please 300 words
3) Analyze security, privacy, ethical, and legal issues related to the digital information world and marketing
3) Analyze security, privacy, ethical, and legal issues related to the digital information world and marketing
Briefly describe a derivative security?
Briefly describe a derivative security?
Telemedicine Describe the privacy risk of telemedicine Describe Security safeguard with telemedicine Describe the strategis for...
Telemedicine Describe the privacy risk of telemedicine Describe Security safeguard with telemedicine Describe the strategis for evaluating the Effectiveness of telemedicine
Briefly describe the six-step life cycle of animal viruses.
Briefly describe the six-step life cycle of animal viruses.
List three hypotheses for the evolution of viruses. Briefly describe the discovery and the nature of...
List three hypotheses for the evolution of viruses. Briefly describe the discovery and the nature of “Giant viruses” such as Mimivirus, describing how these viruses differ from most known viruses. How may the tree of life need to be reshaped to accommodate these viruses?
The role of privacy and security officer in the HIM department Describe what it would take...
The role of privacy and security officer in the HIM department Describe what it would take in order to be successful in that goal, including education, experience, and other skills necessary to obtain the position and to be successful in the role.
Digital Privacy Essay Background In your textbook, the authors endorse privacy as a human right but...
Digital Privacy Essay Background In your textbook, the authors endorse privacy as a human right but also challenge its ability to maintain integrity and safety with the constant adoption and advancement of technologies. Instructions On this essay, you should analyse the future outlook of digital privacy, including topics such as personal information and online security, based on academic resources and past real-life events. Whether you choose to write from an individual, organization or government perspective, consider positive and negative impacts...
Q10. Describe the concept of the digital signature? What are the security properties that can be...
Q10. Describe the concept of the digital signature? What are the security properties that can be gained when using digital signature? Q11. Describe the concept of the message authentication code. Why it cannot be used to provide the property non-repudiation. Q12. In RSA algorithm, what is the relationship between the private key d and the value e from the public key? Explain the condition that must be held when finding the value e. Q13. Why authentication based on symmetric keys...
please answer the following question: Debate the concept “The higher the security the less the privacy”...
please answer the following question: Debate the concept “The higher the security the less the privacy” How do you make balance between the two concepts? Advice on how to “Make Deliberate (Informed) Security Decisions”
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT