Sorry, you need to enable JavaScript to visit this website.

An Introduction to Internet Privacy

Summary
Houseworkers
This article sheds light on the importance of protecting personal information and how to do so.

What is internet privacy? 

Internet privacy involves controlling the information an online user reveals about himself and determining who has access to that information. 

Risks to Internet Privacy 

Online hackers depend on the following to extract user information (User-tracking): 

  • Internet Service Providers (ISP) and they are companies that provide their customers with Internet access. 
  • Browser's cookies which are text files that are created automatically and are saved on the user's computer whenever he opens a browser 
  • Data Logging: records the time when users access their computer (recording times when the computer is in use, or which websites are visited) 
  • Spyware programs which are programs that are downloaded automatically on the user's computer with his knowledge, and steals the information found on the computer with the user's knowledge. 
  • Web bugs which are also known as "tracking bugs" and are bugs found on websites and they are unusually invisible but track the user's activity on the website  
  • Social engineering is a method used to manipulate users psychologically to gain their personal information 
  • Phishing:  it means when someone sends scam messages to a user, for example, through the bank, to collect his personal information. 
  • Malicious proxy servers:  while good proxy servers protect your identity when browsing online, malicious proxy servers steal it. 
  • Search engines like Google and they are engines that help the user search for information online.    
  • Online social networks such as Facebook and Twitter and are online platforms used to create online connections and networks by chatting, posting pictures, videos, interests, opinions, etc. 

 

Responsible people are careful when online; they protect their personal identification documents such as birth certificates, academic documents, driver’s license, etc. They don’t leave them unattended or share them with anyone.

This same principle should be applied to the way personal information is shared online in order to restrict others from illegally using the information to impersonate or humiliate you. Identity theft is on the rise and online hackers who engage in stealing another person’s personal information can use this information to create bank accounts, apply for loans and take advantage of other benefits that you are entitled to. 

  

Steps to protect your privacy: 

  • Check yourself two or three times before you post any information about your family or friends online. 
  • Adjust your privacy settings on social networking sites to avoid unwanted attention from others. 
  • Check the website privacy policy prior to providing any information such as your contact information or email address. 
  • Maintain at least two email accounts, one for social purposes and another account for professional and educational purposes. 
  • Create strong passwords for the email accounts you regularly use and keep changing them on a periodic basis to prevent unauthorized access. A strong password has at least eight characters and contains a mix of letters, numbers, and symbols. 
  • Have different passwords for different online accounts and write down your passwords in a safe place so you would never lose them. 
  • Use the two-factor authentication method for your email accounts to protect them, it is a method used to specify the identity of the person accessing the email, it consists first of asking for something physical like an identity card and the second request is something that is not physical like a pin code. 

 

Treat your personal information as you would treat your money - don't leave it lying around for others to take. 

Primary Keywords
Last edited
30-07-2024
Reading time
3 Minutes

Call to Action

Follow Google's security tips for online privacy and educate yourself more on the ways hackers can use to steal your information.

External Resources