Online Information Safety On University Student Assignment (Essay Sample)
Here is comments(original essay that is not correct): 1.your paper needs a more specific focus in order to allow you to present a more coherent position with support. I recommend focusing one specific issue and context (i.e., group of people/place/situation) rather than presenting many general facts about a variety of areas that lie under the umbrella of your issue. For example, you might think about why people are not as concerned as they should be or how users might change their behavior in order to take fewer risks. I also think focusing on a specific group, like university students would help.While doing this, it is important that you also present details that are not common knowledge. This will require you to do some more reading in order to become more familiar with your topic.
PLEASE READ 161-165 AND IMITATE THE WRITING STYLE OF SAMPLE ESSAY( LOOK THE ESSAY STRUCTURE)
commentaries are used to discuss issues and events that are currently in the news, they give you the chance to offer a new perspective about what is happening in the world around you.
1.FOCUS ON ONE EVENTS AND GIVE WHAT YOUR IDEAS AND POSITION ABOUT THE EVENTS(THREE MAIN IDEAS)
2. DISCUSS SMALL AND SPECIFIC THING, DONT DISCUSS BIG AND VAGUE THINGS
1.explain issue and angle quickly, don't turn your whole paper into summary
2.explain and support your point of view
3.teach your audience something new
4.make grammar and words simple(not complicated)
6. find reliable online source to support(nytimes, theconversation,BBC, the atlantic, etc(famous website is best)
7.have very clear and specific angle!!( don't discuss a big or tricky topic)
8.topic is online information safety and trying to narrow it down to a specific situation that have been covered in recent news as a current event!!!!
9.PLEASE READ 162 THE ESSAY STRUCTURE.
10. get creative tittle.
Online Safety on University Students
Date of submission
Online Safety on University Students
So you think your information is safe from physical attack by using cloud computing as a student? Perhaps, but, have a second thought. Your information is no longer kept private as you might think. In fact, you are a potential victim of hackers, bullies, and impersonation. Many online users especially students who use social media, conduct online shopping and hostel booking as well as engaging in online banking are falling victims of identity crime. These students are neither signing up to the numerous scams nor being careless by not logging out their accounts. In most cases, they only participate in sending emails, online shopping and conduct internet banking. Therefore, it is not surprising when they receive a bank account statement indicating a unique financial transaction or threats as well as their information being held at ransom. However, students who are internet users can still have their information kept safe on a cloud when they understand the procedures used by hackers to access their information, understanding the degree of damage caused by hackers and impersonators and knowing the relevant actions when dealing with such incidences.
At any moment a student uses the internet, he is vulnerable to hacking, bullying, and impersonation by hackers. Most hackers use phishing malware, spam email, bogus websites and instant messages to access a computer hence comprise the confidential information hence putting the victim at risk of exposure (De Looper, 2016). Besides, users who are not protected by firewalls easily fall victims to hackers who access their private information directly. Furthermore, the hackers can monitor all the details in chat rooms, social sites and even engage in conversation with the victim as well as use the victim's web page (De Looper, 2016). Thus, the students' identification information, health, and financial records are not safe.
In most cases, the hackers typically use fake identities and lure students especially those in social media groups or students who are from well backgrounds. The hackers attract such students to reveal their sensitive information especially, financial records, health records, email addresses, and passwords. On the same note, hackers with sophisticated skills write programs that access information to find the keys required to log into the students' accounts (De Looper, 2016). Checker scripts typically find good use by such hackers especially those designed to test batches of the usernames and password combinations on websites most visited by students to identify a valid account. Thus, they are searching for information that is repeatedly used in different accounts owned by one student. For example, answers to questions regarding pet names, or any other statement regarding security detail are usually repeated by such students in different accounts. Such information can be manipulated to access all the accounts. Another example of how hackers access students' data is the use of keylogger which is a malware that tracks all the information that is typed and sends the information to the hacker who has the malware code (De Looper, 2016). Therefore, the safety of confidential information kept by students online is no longer guaranteed.
Any activity that is carried out either on the internet or physically has a purpose hence impersonators and hackers do not spend most of their time for fun. Upon connecting a computer to the internet, the already existing malware is activated and silently transmits all personal information regarding students' financial records, emails and health information without their consent (Sabahi, 2011). Therefore, hackers may hijack the passwords and usernames, mess up all the credit in the credit card, steal the money, ...
- Three ways that cigarette ads hook kidsDescription: Three ways that cigarette ads hook kids Social Science Essay Undergraduate level...2 pages/≈550 words | 4 Sources | APA | Social Sciences | Essay |
- War, traficking, aboriginal views and peace (Gender relation and Conflict studies)Description: Social Essay: Sciences War, traficking, aboriginal views and peace (Gender relation and Conflict studies)...1 page/≈275 words | 3 Sources | APA | Social Sciences | Essay |
- Make Research and Discussion Response: Same Sex MarriageDescription: Research shows that the United States reports higher divorce rates among married couples due to failure of getting children and being incompatible...1 page/≈275 words | No Sources | APA | Social Sciences | Essay |