US Toll Free: 888-702-3410
THE FAS SOLUTIONS – Quality Software Development | High Quality Software Solutions
  • Home
  • About
  • Clients
  • Portfolio
  • Services
  • Technology
  • Blog
  • Contact
  • Home
  • About
  • Clients
  • Portfolio
  • Services
  • Technology
  • Blog
  • Contact

Security, Privacy and Computers

Home » Security » Security, Privacy and Computers
  • Fakhar
  • September, 2011
  • Security
  • 3 Comments
  • Share It

Security is the means by which one makes it difficult for another forcibly to obtain information, whereas privacy is the means by which one makes information unavailable. Privacy and anonymity have been taken for granted in daily life since time started. We buy groceries and movie tickets with cash, we browse at store windows without showing any identification, and we look at newspapers without anyone knowing which particular article we are reading. Lovers have always whispered sweet words in each other’s ears in private, and even some formal written and oral communications — such as privileged discussions between lawyer and client – have enjoyed legally sanctioned confidentiality in civilized societies

This is all changing very rapidly simply because technology makes it easy to break confidentiality. The incentive to violate individuals’ privacy exists both in commercial and in government sectors. Commerce has realized the cost-effectiveness of directed advertising to those already known to have an interest in what is being peddled, and has been deploying increasingly sophisticated technical means of identifying who likes what. Repressive governments, which have always feared any dissent, have availed themselves of even more intrusive technologies to create and maintain vast databases about people in order to identify any and all dissent so as to nip it in the bud; sadly, even democratic governments have played up citizens’ insecurities and have done the same under the guise of protecting us from each other. One should not forget Montesquieu’s words: ‘there is no greater tyranny than that which is perpetrated under the shield of law and in the name of justice’. Nor should we forget the words of William

Pitt, British Prime Minister, on 18 November 1783: ‘Necessity is the plea for every infringement of human freedom; it is the argument of tyrants; it is the creed of slaves’. It is perilous to assume the position that ‘I have done nothing wrong, so I am safe’. Holocaust victims had done nothing wrong either but had a lot to fear, and the same is true for numerous executed individuals who have been exonerated post-mortem as a result of DNA testing.

Furthermore, privacy is an essential element of freedom and does not imply any wrongdoing. We shower in private, we try to keep our medical records private, and we use curtains to keep others’ gazes out of our personal and family lives. With the ubiquitous use of personal computers to which we entrust a lot of such private information, there is no reason why we should accept that our privacy ends the moment we touch the keyboard of that personal computer.

Prompted by the much-publicized open availability of strong encryption, many individuals have incorrectly assumed that encryption is the cure-all antidote to the increasing erosion of individual privacy. It is not. Just like a courier of expensive jewels would be ill-advised to stand out by advertising what he or she is carrying, one should not want to stand out by  taunting an oppressive regime with encryption in a sea of unencrypted traffic; discretion and unobtrusiveness – without excluding camouflaged encryption – is often far better and more secure. Also, just like a fancy padlock on one’s front door is counterproductive if the back doors and windows are not secured, encryption can give one a false sense of security that is worse than no security at all if one’s electronic ‘back doors and windows are left unsecured.

  • Computers
  • Online
  • Privacy
  • Security
Previous Next

Related Posts

Important Web Designing Tips

Important Web Designing Tips

Benefits of Encryption

Benefits of Encryption

How to save Time and Money

How to save Time and Money

Why & how to secure your network

Why & how to secure your network

15 Tips for being safe while Online

15 Tips for being safe while Online

Best Quality Assurance Practices

Best Quality Assurance Practices

ERP – Advantages VS Disadvantages

ERP – Advantages VS Disadvantages

Useful Tips To Defend Against Computer Attacks

Useful Tips To Defend Against Computer Attacks

Importance of SDLC

Importance of SDLC

Importance of Website in Every Profession

Importance of Website in Every Profession

Typical Internet Marketing Myths

Typical Internet Marketing Myths

Superb Marketing Strategies

Superb Marketing Strategies

How to create a productive environment

How to create a productive environment

Importance of Privacy

Importance of Privacy

Importance of Visual Consistency

Importance of Visual Consistency

Time to Revamp Your Website

Time to Revamp Your Website

7 Motivations For Workflow Management

7 Motivations For Workflow Management

Key Components of Compelling Website

Key Components of Compelling Website

Cloud Computing is the Future

Cloud Computing is the Future

Taking care of your PC

Taking care of your PC

Why Software Testing Is Important

Why Software Testing Is Important

3 Secrets to have Success in Internet Marketing

3 Secrets to have Success in Internet Marketing

Software Definition Enhancement

Software Definition Enhancement

What Is Cloud Computing and Why Use It

What Is Cloud Computing and Why Use It

3 Comments

  1. 1

    Ching Wa

    December 2, 2011 at 7:17 am

    Good tips for IT age. Thank you!

  2. 2

    Budge

    December 4, 2011 at 2:42 am

    Really Valuable, thank you.

  3. 3

    Geraldine

    February 23, 2012 at 9:15 am

    Like the blog

Comments are closed.

Open-Source Technologies
  • LAMP (Linux/Apache/MySQL/PHP)
  • Joomla Solution Development
  • Drupal Web Development
  • WordPress Integration and Customization
  • Magento E-Commerce Solutions
  • DotNetNuke Solution Development
  • Ruby on Rails Solution Development
  • Zend Framework
  • Rich Internet Applications Development
Proprietary Techonlogies
  • Microsoft.Net
  • ASP.Net Application Development
  • AJAX Development
  • Microsoft Silverlight Development
  • Microsoft Sharepoint
  • Microsoft Dynamics
  • Java Development
Software Development Services
  • Retail Software Development
  • Desktop Application Development
  • Content and Document Management
  • Secure Intranets / Extranets
  • Customer Relationship Management
  • Supply Chain Management
  • Workflow Management
  • Interactive Learning
Web Development Services
  • Web Application Development
  • Web and Enterprise Portal Development
  • Website Design and Development
  • E-Commerce Solutions
  • Web-based Database Programming
  • Social Engine Development
  • Open Source Solutions
Search Engine Optimization
  • Search Engine Optimization (SEO)
  • SEO Copywriting
  • Pay Per Click (PPC)
  • Search Engine Marketing (SEM)
  • Social Media Marketing (SMM)
  • Google Analytics Service
Quality Assurance
  • Quality Assurance
  • Automated Software Testing Services
  • Information Security and Code Review

Terms  | Privacy Statement  | Disclaimer  | Careers 

 


Copyright © THE FAS SOLUTIONS 2018 All Rights Reserved.