.

Friday, May 10, 2019

Privacy about Emailing, AIM or MSN Messenger Essay

Privacy astir(predicate) Emailing, AIM or MSN Messenger - Essay ExampleIt can be a privacy tax return because it can identify the location of the user to the receiver because their I.P address is indicated during the process. This is dangerous especially when the user logs into hazardous chat rooms to talk to individuals who argon strangers. The internet messaging services share a similar implication to emailing, and can easily be applied to forward spam messaging that generate inert progress towards completion of delegated duties. The other provision that the IM and emailing service provide is witnessed in the transfer of viruses that could be transferred from sensation machine across a network. There is privacy breached in accessing information about the user level off when in that respect is no logging process because the information is accorded the emcee. These systems have proved vulnerable to breach with the troupe containing system hackers who are capable of obtainin g information through tracing vital information on the server system. Recommended technological Solutions The prototypal realization that users should note is that the IM system is not the some restrain government agency to electrical relay information or store vital individual components. There should be application of alternative means if the nature of the information being passed is important in achieving progress (Willner 5). There are limited measures to wipe out the IP address but an option is given to seize using the automatic logging process. The sites should be accessed only on necessary areas with a careful observation to subject the online time. AOL has been developed to limit the tot up of messages that a server is capable of transmitting. It further applies measures to gain control over the recipient of the messages. This may be implemented through blocking the person that is to receive the message and only allow access when there is the need. In controlling the rate of virus transfer between machines, there should be identification of the secure files. This measure is applied in attributing the source of the received files. The valuable contribution that can be attached to this problem is via applying updated antivirus software in the machine. There is a measure that is applied to block or reduce the IM service through shutting down ports. Moreover, there needs to be an implementation of security policies that ascertain their operations. These rules are expected to regulate on the utilization f the type of software in the policies, and the legislative measure that would be implemented when the set regulations are breached. Before engaging in any confabulation exercise, the message logging can be disabled. ICQ is provides a system for automatic logging on first users, but the option can be disabled to reduce security risks. This is then vital because the users are not identified during the log in process. Developed Solutions The solution s to reduce the privacy risks are witnessed in applying the measures to get over the identity of user information by disabling the automated logging system. This is applied by most individuals who access the IM systems on pubic environs like in the cyber cafes. These areas provide minimal security for own(prenominal) information, and the individual may be exposed to demeaning acts that may threaten to invade their private purport setting. The measure that can be applied to ensure that the security is maintained would be through clear the

No comments:

Post a Comment