Professional Documents
Culture Documents
Abstract
The invention of the internet gave the world a new reality of easily accessible data all around the globe.
As a result data is becoming more and more valuable as an asset to individuals, companies, and governments alike.
In this context However, we will be exploring the data tracking of everyday individuals whom surf the internet for
any and every reason and why we should take a closer look at where this data goes and from an ethical standpoint
in how it is used. This is not some unturned stone that I’m revealing for the first time in history, in fact there’s been
a lot of political battles around this as well, which makes the topic all the more interesting to explore. One thing I
found interesting is the surplus of open source spyware technology that anyone can get their hands into. I suppose
this is the expected outcome as the nature of spyware is hosted on the internet where anyone can hide behind a
screen … until you can’t. What we will be looking into next are the different ways of data tracking from
Government to individual use, then explore the pros and cons and also the ethics behind it.
Introduction
As society progressed more and more throughout the years, data and information has become more and
more accessible as well. From user profiles to search history and everything in between, virtually our entire lives,
habits, and networks are all free games to exploit, usually to the highest bidder, but sometimes even to anyone with
internet access willing to take a peak. With this comes a great deal of security risk to everyday people who are
unaware of their information and in whose hands it could potentially reach. All of this must be a pressing issue to
those of us who study and practice cyber security, so that we may find solutions to these issues and protect
Methods
Show the results that you achieved in your work and offer an interpretation
of those results. Acknowledge any limitations of your work and avoid
exaggerating the importance of the results.
Conclusion
References
2022 Cyber Security Statistics: The Ultimate List Of Stats, Data ...
https://purplesec.us › resources › cyber security