Fundamentals of Information Technology and Privacy

 

Fundamentals of information technology include hardware, software, information systems, security, and privacy. Information technology refers to automated systems for storing, processing, and distributing information. When users enter information on computers, it is possible due to the hardware and software that make up the computer systems. Information can then be transferred across networks, which are also made up of modems, routers, servers, and other computers. Network and computer security systems help protect one's computer from getting viruses where their information can be stolen. Even with applications that protect one's data, it is still possible to have it stolen. A user on the internet leaves an electronic footprint similar to how a person walking leaves a physical footprint (Vahid & Lysecky, 2019). Any time a user enters information, there is the possibility of having that information stolen. This is especially true if someone puts information on social media sites where anyone can access that information. After the information is online, anyone can copy the information.

Privacy has changed over the years with history. When computers were first invented, privacy was not as big a concern as now since not everyone could read and understand the computer language. For example, in the 1940s, the Germans transmitted secret messages using a machine called Enigma. The Allies could not decode the messages until Allen Turing created a machine to decipher the messages. In the early days of computers, not everyone had one. In the 1940s and 1950s, only a few existed worldwide, and governments and businesses used them since they were expensive and the size of a room. Today, everyone has a computer such as a cellphone, TV, and thermostats in their homes. Additionally, individuals use their banking cards at registers and ATMs. Individuals with the correct knowledge can access the information on those devices. If the government wants to track someone, they can find their location by what tower their cellphone last pinged off or where their bank card was last used. 

Any device with computer hardware has the potential to store your data. Information is stored on hard drives when using a laptop or desktop computer. Additionally, many CPUs internally have a small fast memory called a cache. The cache acts as a storage of website data you use all the time. Next time you go to the same website, it pulls data from the cache so that the site loads faster. That means if someone were to access your phone or computer's web browser, they could go to history and see any previously visited sites. Additionally, if one made purchases and saved the information, that information could be viewed. Someone logging into your device can see what web pages were viewed and what you looked over your cached data Okta (n.d.). The same is true for applications. For instance, if someone were to open my Sonic app, they would see the last order that I made and the date that it was ordered.

The easiest way to explain computer programming is that it is the method for giving instructions to computers. Everything we see on our computers, such as software, webpages, and documents, was developed from computer programming. Programmers create software and tell them how to work. Displaying an image or section of text, changing font styles, and opening emails all require instructions in the coded manual (McCartney, 2023). When the user types in a search bar and clicks search, the program tells the search button to work. Additionally, the programming language helped design the images the user sees. One's privacy is recorded in databases created from programming languages. It is the programming language that allows the user to see their history and be able to click the clear button. 

Application software plays an important role in user privacy. Applications often track the user's activity. Third-party tracking companies can track users across most websites, allowing advertisers to show users ads targeted based on online activity (FTC, 2023). The tracking allows companies to tailor advertisements toward the user. For instance, the user was browsing the internet and looking at cars. Then, while on Facebook, a car advertisement appears. This is because the web browser was sharing the user's browsing data. Users can clear their browsing history to protect their privacy. For example, if a user clears their viewing history on YouTube, anyone who logs on can no longer see the user's previously viewed videos. Users can also adjust their privacy settings so that some information is not recorded. For example, some applications track the user's location. Removing permissions to track location will ensure the application does not record the user's location.   

A variety of personal data is stored in computer databases. For example, when you go to the doctor, you give the doctor your personal information, and the doctor also adds information from your visit. The database ensures the doctor has quick and easy access to the information for the patient's next visit. These databases can be stored in a physical location like a hard drive or cloud server. Anyone with login information and clearance can access the information on the database. Additionally, when information is stored on a cloud database, anyone worldwide can access private data.

Information travels from a users home network and, depending on the location of the servers of the sites they use, can travel around the world. Setting a strong password for home networks can ensure that the average person can not access the network and get access to personal data. Additionally, turning on the router's firewall will increase security. A good firewall helps to block unwanted traffic from entering or leaving the user's wireless network without their knowledge (Horowitz, 2021). Additionally, computer users should always ensure that their sites are secure and not save personal information on their devices. If the user were to lose their phone and have their personal information like their credit card stored, anyone who finds it would have access.

Comments