How Secure is Your Internet?{5}

by Irving A
The company that has promoted itself as the private and secure one has not been private or secure lately. Apple has been giving out people’s address books. Due to privacy slips they will continue doing this for weeks to come. But it’s not only Apple who has focused on other things other than security, Google, Amazon, Sony, and Facebook are among the many. “Imagine if a bank paid more attention to the color of the carpet in its lobby than they type of safe it uses to store its customers’ valuables. No one would want to store anything there, that’s for sure”. The author compares the banks to trusted web giants to demonstrate the importance of security. Who is to blame that companies are not securing our personal information? To whom should we point our fingers to? Should we blame the companies for not securing the data or the users for using the companies? Assistant director in the division of privacy and identity protection at the Federal Trade Commission, Christopher N. Olsen, expects Congress to enact laws to promote consumers. Legislations would not be ideal for anyone, technology companies argue to have less legislation control. Companies need to focus more on privacy.

This relates to course materials because it is a subject that are implementing in our project. We are adding small security features to our website. User names, passwords and credit card information have to be kept secure at all times. Even though our website is not as big as Apple or Google we understand that security has to be implemented at all times. We have discussed such security issues in the past.

Web 2.0 facilitates information sharing in the World Wide Web. It allows users to collaborate with each other in a social media dialogues in a virtual community. Social network sites as well as blogs and web applications are examples of web 2.0. The client side of web 2.0 consists but is not limited to Ajax, Javascript, and Jquery.

Disruptions: And the Privacy Gaps Just Keep On Coming – (n.d.). Technology – Bits Blog – Retrieved February 20, 2012, from