Ways in which the internet can be used to protect personal information.

 

 

 

Project title: Ways in which the internet can be used to protect personal information.
Since its inception, the internet has surely been a weird place. A one stop shop for literally any information one may need regardless of the field. All sorts of activities can be and are usually run over the internet including socialization and online businesses among others. The internet has also been known to be put to malicious use by corrupt individuals and entities, like cyber bullying, hacking, spying, terrorism, illegal trade and other numerous activities. The internet, more like fire, depending on its proper use or misuse, can yield prosperity or wreak havoc. This study is focused on breaking down how the internet can be used to protect valuable private data.
Brief description of the overall aims of the research.
This research generally aims at finding out how the internet can be instrumental in the protection of people’s important personal data. Other aims of the research are:
1. Providing readers with information that enables them to have total control over their own privacy.
2. Providing a research proposal that is part of the requirements for fulfilling the qualifications of my study program.
Objectives used to carry out the aims of this research.
To achieve the aims of the study, the following objectives are to be carried out in the right order. The ambitions are:
1. Gather data geared towards understanding insecurity posed by the internet.
2. Collection of data describing internet security and ways of implementing internet security.
3. Analysis of the data collected.
4. Concluding and summarizing the study in a proposal document.

 

Methodology.
The methods of data collection to be used for this research are:
1. Desktop studies of online literature sources.
2. Consultations with a cyber-security firm, whether physically or virtually.
3. Use of questionnaires to gather information on people’s understanding of cyber-security within the general public.
4. Use of questionnaires to gather information on common cyber-crimes that most people within the public fall victim to.
5. Use of questionnaires will also be crucial in gathering data about the most commonly targeted kind of data by malicious parties, software, etcetera.

Gantt chart for the research work flow.
Activity Progress
(%) Start End
Phase 1
1. Gather data geared towards understanding insecurity posed by the internet.
30% done. 27th March 2021 30th March 2021
2. Collection of data describing internet security and ways of implementing internet security.
0% 31st March 2021 2nd April 2021
Phase 2
3. Analysis of the data collected
0% 3rd April 2021 6th April 2021
4. Concluding and summarizing the study in a proposal document. 0% 7th April 2021 10th April 2021

References:
The source of data for this research is primarily online literature like:
1. 10 Goals for Good Privacy Protection Law. (2019, May 15). Internet Society. https://www.internetsociety.org/resources/2019/10-goals-for-good-privacy-protection-law/
2. 5 Ways to Help Protect Your Personal Information Online. (2017, November 1). 5 Ways to Help Protect Your Personal Information Online. https://www.lifelock.com/learn-internet-security-ways-to-help-protect-your-personal-information-online.html

Sample Solution

A Virtual Private Network is an online privacy network that gives you privacy of your data and anonymity by creating a private network from a public internet connection. VPNs mask your Internet Protocol (IP) address so your online actions are virtually untraceable.Using a VPN is especially important when you’re on public Wi-Fi at a library, coffee shop, or other public location. A VPN will make it more difficult for cybercriminals to breach your online privacy and access your personal information.You can find many free VPN solutions, but it could make more sense to pay for a service from a trusted security provider if you want the maximum amount of privacy protection while online.

Tones of Poems The shade of verse is anything but difficult to pass judgment on somebody’s sentiments through the voice during discussion. On the off chance that individuals are cheerful, or simply fun, they for the most part make their faces giggle, however on the off chance that they are furious, their voice gets stricter and greater. Creators can utilize different procedures to communicate feelings in short stories and books, for example, outcry focuses and italics. These strategies make it simpler for perusers to comprehend what the character feels. In verse, it is hard to comprehend your condition. These sonnets have various contrasts. The circumstance of verse and adversaries is unique. In Sukhrin’s sonnet, the condition is exceptionally miserable. In affection verse, the tone isn’t just dismal yet in addition exceptionally bold. The two sections are dismal so the two tones are in acceptable concurrence with the refrain. The other party is a lady in John Suckling’s verse, and Richard Lovelace’s sonnet is a restriction war. As indicated by the clarification, Suckling’s “the reason it is so pale, glad, darling” is an impersonation of the custom of affection in the court, demonstrating the writer’s uncertainty about the convention in the embarrassment and his knight’s joy. Sacling’s verse incorporates incongruity of the subjects. It blames youngsters utilizing coat love code as he considers his lady’s aloofness. An artist ‘s beau can not make a move outside of customs with the goal that he doesn’t direct his concentration toward ludicrousness and false reverence of his conduct. Without genuine love and sex understanding, ironicly the artist calls the sweetheart “youthful delinquent”, as they will be limited by crushed convictions. There is no uncertainty that verse and its three refrains have gained comparative ground. Be that as it may, the tone of verse is very contrastive. Wonder’s verse has indisputable dissatisfaction and want for affection. This is in sharp difference to Dawn’s verse where wickedness tone is self-evident. Marvell’s poeties express a great deal of feelings; both “carpe diem” (“get on the day”) and “tempus edax” (“time devourer”) are clear in this stanza. This is in sharp difference to the next two sections that don’t have clear feelings. Think about John Donne’s “The Flea” with Andrew Marvell’s “To His Coy Mistress” and conclude which is the most appealing thing. Understanding the tone of verse is significant for the artist to comprehend what he needs to state. This is likewise significant in choosing the topic of this sonnet. How would you choose the tone? In the wake of perusing just because, you may feel the tone of this sonnet. Be that as it may, how would you realize what is directly for you? You need proof from verse that underpins your case. You took a gander at the jargon and found the proof. The word reference is the decision that the writer picked when composing verse. If it’s not too much trouble consider the decisions you made when composing. You can pick what you can say anything. How would you pick the correct words? In the event that you need to get genuine, you can pick a few words to pass on a genuine tone. Initial segment of the guidelines: Please read the accompanying sentences. As a matter of first importance I will compose the sentences. Accentuate the (word) that you think will add to making the tone for each sentence. Single sentence: frozen yogurt dissolving PPreaccttiiccaall PPooeettrryy AA GGuididdee ttoo TTomeachchinngg CChmmmmoon CCoorree TTextxtt EExextmemplaarrss ffoor PPoetetryry iinn

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.