With the development of communication and communication equipment (including cyberspace), many comments have been made to manage their personal data and support their cybercriminals. In fact, the data and information dispersed in information networks, and in particular cyber, are very numerous, accurate, distinct and varied. This data can include medical or psychological information of individuals, technical data about buildings and infrastructure, and so on. Various communication equipment and methods gradually cover all human activities; in such a situation, given their achievements and benefits, the need for cyber security is placed in the second priority. Finally, the issue is whether the cyber security issue is considered in the development of future networks or whether it will be postponed. In fact, in order to ensure the maximum impact of software – the interaction between the functions of the software, the facilitation of the use and ergonomics, the speed and the mental performance of the implementation – must meet the existing technical challenges, but, on the other hand, the removal of these challenges can hinder The inclusion of security equipment (equipment that supports individual user data). In addition to the challenge of cybercrime management, the challenge was to add “non-tracking policy” and secured online data. It seems far removed from the mind that it would be possible to systematically eliminate existing data on the Internet after a certain period of time, to impose foreign governments that have not legislated in this field, and to disguise the information with considering the possibility of its publication on other sites and blogs, especially because of specific cyberspace methods.
Conversely, it allows individuals and corporations to request a refund of their information or request information modification (if they are incorrectly or incorrectly reported). In addition to the destruction of pages and information, such an action involves the retrieval of indexed search engine data that is technically and politically very complex. In this case, the legislature is obscure about the length of data storage. For example, access providers provide the right to store personal information for one year. The data protection and immunization requirements are a particular challenge, especially in the context of labor law and criminal law. In this context, it needs to clarify the existing judicial framework to create the necessary conditions for the development of the cyber economy “company to company” or “company to person”.
In the area of cyber identity and personal data, the main problem is that there are two contradictory requirements in this regard.
First of all, the generalization of the Internet has a significant bearing on the naming of users who are heavily seeking access to the Internet (either as a data streamer or as a data provider) and maintains their freedom as much as possible. The challenges of “non-tracking rights” and “deactivation of radioactive chips” as well as the challenges of the ability to disconnect individuals, and in some cases, legal entities, to some extent, express this necessity. Similarly, the use of nicknames or the use of avatars indicates a tendency to hide the true identity of individuals.
But on the other hand, the need for security is a backbone for cyber-exchanges among individuals, for example, economic interactions. Governments have a role to play in supporting the role of trust and ensuring the integrity of individuals, and thereby gaining new / advanced capabilities that they are required to carry out investigations to identify cybercriminals, at least in National level opens up.
Problems in gathering information and analyzing data at a widespread level guarantee the neglect of users (at a very low level). On the other hand, using special functions can hide a user’s stance and communication with a contact or a site. The American Marine Laboratory has designed a system called Tour. This system is the most well-known solution for implementation, and today it is developed as free software and is available to everyone. Of course, it is difficult to predict whether this software or its derivatives will be guaranteed in the future for naming on the Internet, but at present, this software is highly effective; for example, Wiki Leaks to support databases and the identity of its informants is based on techniques derived from the “Tour” system.
The US government has developed a counter-censorship kit for some opposition groups in Washington, adopting a different approach. The kit provides the server with equipment and solutions that can be used to securely store the information gathered locally using parallel networks (Internet, Mobile), antennas and using software Publish cryptography; it also allows users to access the Internet without the need for regulatory service providers.