Expectations of privacy when using: The Internet, Mobile applications, Desktop software, Business software, Corporate network

6.3 Summarize behavioral security concepts.

📘CompTIA ITF+ (FC0-U61)


1. Internet Use

When using the Internet, your privacy is not always guaranteed. Companies, websites, and service providers may track, monitor, or store your activity. Let’s look at different Internet activities:

a. Social Networking Sites (e.g., Facebook, LinkedIn)

  • Expect limited privacy:
    • Posts, messages, and profile information may be visible to others, even beyond your friends or contacts.
    • Sites may track your behavior to show personalized ads.
  • Security tip: Adjust privacy settings and think before posting sensitive information.

b. Email

  • Email is not always private:
    • Employers can monitor work emails.
    • Internet service providers may scan emails for spam or security threats.
  • Security tip: Avoid sending confidential passwords or sensitive data via unencrypted email.

c. File Sharing (e.g., Dropbox, Google Drive)

  • Files you upload may be accessible if permissions are set incorrectly.
  • Shared links can be forwarded to others, compromising privacy.
  • Security tip: Use access controls and encryption when sharing sensitive files.

d. Instant Messaging (e.g., Teams, Slack)

  • Conversations may be stored on servers and could be accessed by system administrators or under legal requests.
  • Security tip: Use secure messaging apps and be aware that deleting a message does not always remove it from servers.

2. Mobile Applications

  • Mobile apps often request access to your data (contacts, location, photos).
  • Privacy expectations:
    • Your data may be collected for analytics or advertising.
    • Some apps may share your data with third parties.
  • Security tip: Check app permissions and download apps only from trusted sources, like official app stores.

3. Desktop Software

  • Programs installed on your computer can access your data and track activity.
  • Privacy expectations:
    • Some software collects usage statistics to improve performance.
    • Malicious software can steal data without your knowledge.
  • Security tip: Use reputable software and update it regularly to fix security issues.

4. Business Software

  • Enterprise applications (like ERP or CRM systems) are used to manage company data.
  • Privacy expectations:
    • Employees generally have limited privacy on company systems.
    • Activities may be monitored for security, compliance, or productivity.
  • Security tip: Follow company policies, avoid storing personal data on business systems.

5. Corporate Network

  • When connected to a corporate network:
    • All traffic can be monitored by IT departments.
    • Using network resources for personal activity may be logged or restricted.
  • Privacy expectations:
    • Limited privacy; IT admins can see which websites you visit and which files you access.
  • Security tip: Assume corporate networks are not private and avoid sensitive personal activity on them.

Key Takeaways for the Exam

  1. No system is 100% private. Your activity can often be monitored.
  2. Internet and cloud services often collect and store data for functionality or analytics.
  3. Mobile and desktop apps may request data access; only grant necessary permissions.
  4. Business and corporate systems are typically monitored; personal privacy is limited.
  5. Always follow security best practices and organizational policies to protect data.

Tip for remembering for the exam:
Think of it as “expect limited privacy, especially on work systems”.

  • Personal devices = some privacy
  • Company devices or networks = low privacy
Buy Me a Coffee