Security and Surveillance Paper

User Generated

wblsnenu95

Writing

Description

Papers should be 3 pages, double-spaced, 12 point font with 1 inch margins. Your paper should use a standard essay format (introduction, body, conclusion) and have a clear thesis statement.

SIMPLE WORDS NO HARD TERMINOLOGY

This assignment allows you to think through how data gathering and surveillance functions in your own life. This will allow you to make more conscious and deliberate decisions about how much you want to be tracked and to what extent you want to protect your data. We will use the Electronic Frontier Foundation’s Surveillance Self-Defense Guide to do this. You can find the full resource here: https://ssd.eff.org/en (Much of the information is targeted towards high-risk individuals like journalists and activists.)

First, research what your vulnerabilities might be and/or what tracking and privacy practices you might be opting into without know. Read through these guides from the EFF:

Protecting Yourself on Social Networks: https://ssd.eff.org/en/module/protecting-yourself-social-networks

Communicating with Others: https://ssd.eff.org/en/playlist/want-security-starter-pack#communicating-others

How Do I Protect Myself Against Malware: https://ssd.eff.org/en/module/how-do-i-protect-myself-against-malware

The Problem with Mobile Phones: https://ssd.eff.org/en/module/problem-mobile-phones

(You might also want to run this diagnostic on your browser to determine how protected you are from tracking: https://panopticlick.eff.org/ )

If these resources are too basic for you needs, you might want to use some of the EFF’s other materials. You are also free find your own resources beyond what is required above.

Based on your reading and research, identify three changes that you could make to give you better control over your data and privacy. What they are will depend on what you are doing already. It could range from basic privacy setting to fully encrypted anonymous communication.

Your paper should:

Detail the three changes you could make. Explain what you are doing now and what the potential problem is with that practice/setting/etc. Explain what you could change to mitigate this risk/vulnerability/privacy risk/etc. Indicate whether you intend to make this change and why or why not. Cite the above EFF or other equivalent resources in your discussion of each possible change.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey buddy!Attached is the complete assignment.Please have a look at it and feel free to seek any further clarification. If
there's no further work to be done. I'd really appreciate if you could
leave a 5 star⭐ ⭐ ⭐ ⭐ ⭐ feedback for me on Studypool. This would be so helpful in
me securing further work and continue to tutor.Thanks. 😉

Running head: STRATEGIES FOR ENHANCING PRIVACY

Strategies for Enhancing Privacy
Name
Course Title
Instructor
Date

STRATEGIES FOR ENHANCING PRIVACY

1

Strategies for Enhancing Privacy
Despite the fact that computers and other digital devices are playing a crucial role in
facilitating business and commerce, they are an easy target for attack. For an individual or
company to use these devices without any doubts, they must be assured that the devices are not
subject to any compromise and that their information will be secure. The devices and websites
should be in such a way that they can facilitate information security triads such as
confidentiality, integrity, and availability. Over the past years, I have been facing problems from
malicious software which adversely affected the operations of my computer. For instance, it was
disrupting the way my laptop operated, gathered sensitive information without my approval, as
well as gained access to mt privacy systems. As such, the purpose of this paper is to highlight the
risks that computer users face when storing and transmitting infor...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags