-
Essay / Security Violations When Browsing the Internet - 602
Every day, millions of people search the web to find information. They ask questions as simple as who won the Oscars, or as complex as what makes up our universe. Googling questions like these seems harmless enough, but what about when your personal information is part of the search results? It doesn't seem so harmless anymore. People all over the world are looking for ways to protect their information from being spread across the Internet. For this reason, website and browser security is quickly becoming the most requested service for individuals and businesses. If you accessed the Internet, you used a web browser. Unfortunately, the most common browsers today, such as Google Chrome and Firefox, do not provide satisfactory web security to their users (Grossman 68). While you can't expect a browser to be perfect, you should expect a certain level of safety and security. A major problem encountered in these browsers is the ease with which hackers can access and modify the code of a web page. Even the success or failure of an image to load can tell a hacker whether or not you are connected to certain websites. The question could be asked: why does it matter that a random character knows if I'm connected to my mother's blog or not? The problem isn't that it's your mother's blog, but the realization that this detection technique could be applied to your bank account, your email, or any other account you might have. Most, if not all, contain sensitive information that can be exploited if it falls into the wrong hands (Grossman 70). Security flaws like this are just some of the many reasons why people want an alternative browser to protect their information while browsing the Internet. While some organizations, such as those that process and store information, have no ethical goals. If that were the case, all the secrecy surrounding the NSA and its practices would no longer be necessary. In conclusion, people are increasingly aware that they are not safe online. They are looking for a new, more secure way to continue using the Internet. The ability to create and secure websites and user data is quickly becoming one of the most sought-after web design attributes. Works Cited Grossman, Jeremiah. “The web will not be safe or secure until we break it.” Communications of the ACM 56.1 (2013): 68-72. Commercial source completed. Internet. March 16, 2014. Hypponen, Mikko. “How the NSA betrayed the world's trust: It's time to act” TED, October 2013. Web. March 16, 2014Moglen, Eben. “The tangled web we have woven.” Communications of the ACM 56.2 (2013): 20-22. Commercial source completed. Internet. March 16. 2014.