What Is Software Privacy Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Privacy software is software computer programs made to protect the privacy and security of its users. The software normally works together with Internet which prevent private information user which has to control or limit the information available to third-parties.

Types of protection

Protecting user's privacy on website

Hiding or deleting users online traces on PC

Reason we have software privacy

Privacy software built in strength to fight or to prevent more direct unauthorized computer user. Let look on username and password we used to access on internet which regarded as software privacy, which may not stop malware or Internet attacks on a computer, This will help in prevent unauthorized users from using a computer and accessing data that have been stored on it.

Why Do I Need Privacy Software?

Having software privacy does not mean doing anything wrong on PC. It means fighting up for someone right privacy over internet. Many computer users are facing a lot of having their privacy over internet and some rarely do aware of the problem that software are available to have a secure privacy over on internet.

Privacy software protect in two ways

It upholds internet privacy and which alsoprevents by using anonymous on the worldwide web. Privacy software hides Internet Protocol address and which encrypts your connections, this help is such a way that nobody can have access or take advantage over internet.

Privacy software hides or removesall traces save on computer during and after internet sessions, this will protect from folks to have access of what have been done over the internet session.

Software privacy recommendation

Privacy guardian

Cyber scrub privacy suite

History clean

Evidence blaster

Protecting privacy in information systems

As various information systems with different privacy regulationswhich they areinterrelated and data is shared, impose and monitor with an increase amount of privacy policy rules.

Basically are two classes of technology in privacy protection in IT systems:

Communication and Enforcement

Policy Communication

This is a standard for interactive privacy practices and comparing them to the favorites of individuals. We have P3P as an example and which is Platform for Privacy Preferences.

Policy Enforcement

XACML -Which refers to Extensible Access Control Markup Language comes together with Privacy Profile which is standard for expressing privacy policies in a machine-readable language which the system software can use to apply the policy in IT systems.

EPAL -Which refers to Enterprise Privacy Authorization Language is also similar to XACML, but it has not been a standard.

Web Service Privacy will be a specification for communicating privacy policy in web services. For example, it may specify how privacy policy information can be embedded in the web service message.

Protecting Privacy on the Internet

On internet we give a lot of information about yourself, unencrypted email can be read by the email server, when the connection are not encrypted and also which the internet provider are also can sniffing and know the content of the email. This apply to all traffic generated over internet such as instant messaging, web browsing. In order to keep personal information on internet such as email can be encrypted and other activities online will be anonymous. This will help in protecting yourself and have privacy on internet which other parties won't have access to your information doing on the internet.

Privacy-enhancing technologies

Privacy enhancing technologies is a set of computer tools, applications and deviceswhich can be included in online services or applications, whichallow online users to protect the privacy of their personally detectableinformation providingand it has to bedone by the applications.

It protect information by eliminating personal data which that has to be secure the data without any loss of the functionality of the system.

Examples of existing privacy enhancing technologies

Communication anonymizers: This is used for hiding the original online identity such as (email address, IP address, etc.) and which can be replaced with untraceable identity (Random IP address of hosts will be choosing in an anonymous network.). This can be applied to email messaging, Web browsing, Internet call, InstantChat messaging, etc.

Shared bogus online accounts:Single user or person can creates an account for MSN, providing bogus data for Name, address, phone number, preferences, life situation etc. Then user ID and password would then been published online.This would give everyone access to use the account comfortably at any time. The user of the account get assured that the account does not carry of his/her personal profile data on the account profile.

Access to personal data: This is service infrastructures whereby users have fully access to rectify, change, and deleteto his/her personal data that have been stored to the service provider on the internet. Permissions are allowed for any changes at any time and where by it will be updated after the changes have been made on the personal information's.

Examples of privacy enhancing technologies that are being researched or developed

Wallets of multiple virtual identities: These wallets allow the efficient and easy creation usage of virtual identities.

Anonymous credentials: This credential don't reveal the real identity of the holder and which does only reveal an information as the holder of such credential is willing to disclose an information. The contentioncan be issued by the user or by the provider of the online service.

Data transaction log: Users can recordtheir personal data they sent to any service provider, to check and what under conditions their records. These logs will help in storing and allow users to determine what data they have sent or transfer to the service provider and also they can establish all type of data that is in controlby a specific service provider. This leads to more transparency, which is a pre-requisite of being in control.