The internet is a constantly changing and evolving environment. From its earliest days in the late 60s, when the very first small networks were brought online, to today’s massive and long-reaching web of connection, change is one of the few things that can be reliably predicted. This change is not only fast, but also dangerous to those who don’t understand or fully appreciate its potential to damage them or society. As the internet evolves to do nearly everything but sustain life itself, security becomes paramount. Internet users need to be more aware of today’s increasing rate of cyber-attacks and should stop sharing their personal information, use more secure logins, and utilize encryption software to protect themselves from the cyber-crime.
As are many important issues of today, this is a complex and multi-layered problem. “Cyber security” refers to either that of the individual, that of a website or business, or that of government agencies. The largest issue is the release of personal information, which happens with the security breach of personal accounts on an individual level, business records on a corporate level, or residence, tax, or employment information on a governmental level.
It begins with the individual and the way they treat, view, and use internet services. The clichés that existed in the beginning of chat rooms and online services (“don’t give anyone your last name or any personal information”) seem to have died sometime overnight. My generation has apparently given up all right to internet privacy without a fight or second thought. People use social media as if it is their personal confession box at the expense of any discretion. Whether this is done out of pleas for validation, pity, or empathy is irrelevant; it has become popularized and accepted as standard practice. On the popular social media site Facebook, simply “Liking” a status or post can give a competent observer more information about the user than he or she could possibly imagine. In a recent Guardian article analyzing a Cambridge study that used computer algorithms to predict personal details about Facebook users, the author stated,
The research into 58,000 Facebook users in the US found that sensitive personal characteristics about people can be accurately inferred from information in the public domain…Researchers were able to accurately infer a Facebook user 's race, IQ, sexuality, substance use, personality or political views using only a record of the subjects and items they had "liked" on Facebook – even if users had chosen not to reveal that information. (Halliday)
Users of these services are disclosing more then they think. On the internet, everything has the potential to be permanent; storage capacity is virtually unlimited. Deleting profiles and other things left strewn in servers is much more difficult than one might think. At one time, people confided in one another through disclosure and built trust, and thus created strong interpersonal relationships. This forfeiting of all privacy on the individual’s part puts the user at a very large data security risk. But not only is personal information disclosed with a loose tongue (or fingers), many people are failing to give it some of the only protection that is within their control.
Oftentimes, passwords or phrases are short, containing common (or easily guessable) combinations of letters, numbers, or words. Additionally, the same password is commonly used for years. In 2011, a survey published by Daily Finance revealed that a staggering 59.9% of respondents reportedly never changed their passwords, compared to 13.9% changing them once per year, and 11.8% changing them once per month (Nance-Nash). This is a very poor practice that greatly increases a users’ vulnerability.
It is also very common for an individual to use the same one or two passwords across dozens of separate internet services, which is an enormous security risk. Typically, the security of social media services like Facebook and Twitter is less than that of a large financial institution like the Bank of America, and understandably so. If hackers successfully compromise Twitter accounts, which happens with fairly frequent success, it could possibly give the attackers automatic access to much more detrimental web services like online banking or investing. These cyber-attacks can happen everywhere. In fact, corporations are becoming increasingly vulnerable to cyber warfare for many reasons. The largest is the incredibly large amount of personal data that is held on corporate servers, often unencrypted and vulnerable. This greatly attracts the attention of criminals looking to steal identities and hijack bank and trading accounts. Even if you are not a patron of a business, your information may be held by them because of a practice called data mining. Data mining occurs when companies collect information about you due to things you publicly display, or pay companies already in procession of the data for the usage of it. From a business standpoint, this may be a profitable practice because it allows advertising divisions and marketing teams which demographics to focus on. But personal information is not a business commodity. When entire companies exist solely for the purpose of buying and selling information, security and privacy on the internet have reached a critical state.
Organized cybercrime is also on the rise. The loosely knit hacker groups calling themselves “Anonymous” have, in their brief history, unleashed a slew of attacks against individuals and businesses alike. Deeming themselves “hacktivists”, the group has carried out these attacks apparently in the name of reform. It is easy to glorify their actions, but they have all the traits and characteristics of a terrorist organization and are treated as such by government institutions. On April 7, 2013, Anonymous carried out a massive cyber-attack on an Israeli bank which caused a negative effect across “100,000 websites, 40,000 Facebook pages, 5,000 Twitter accounts and 30,000 bank accounts” (Estes). Thousands of names and bank account information was spilled into the group’s webpage before it too was shut down. This is just one tiny fragment of what an organized group is capable of, and there are likely many more hiding in the shadows.
Fortunately, fighting technology with technology remains an option; in fact, it may be the only one left. Encryption software designed for personal use has become user friendly and intuitive. Biometric features such as finger print readers are already common on recently manufactured laptops. Facial and even retinal recognition hardware and software is currently in development. Security Management in Apple products are starting to release new preventative measures as like continuous facial authentication functionality that checks computer users’ faces every 10 seconds using the front facing camera. If the viewer steps away from the computer, the system will successfully lock. Upon return, the user will see an image of their face on the computer screen. Once it sees the owners face the computer unlocks almost instantly. There is also an option for the computer to snap a picture of the potential hijacker before the operating system is locked down (Wagley). Presently, these features can do no more than protect your hard drives and physical computer; that is, they are used to log on to your computer and will not help you stay safe on the internet. But it is a step in the right direction and shows hope for the future.
Since there is little security on the internet, it should be treated at all times with this fact in mind. I have seen people log into their bank account from unsecured coffee shop networks without a second thought. An unsecure wireless network means it has no security whatsoever and anyone can get onto it without a password or key. Anyone could be sniffing the network, even from a good distance away. They will operate under the radar without anyone knowing, that’s why the internet needs to be treated with more weariness. The best way to keep yourself safe on an unsecure network is to make sure you have anti-virus, anti-spyware, and a firewall installed on your computer. Also under no circumstances use an unsecured network for any finances-related work like checking your online checking, online banking statements, or making credit card purchases. Everyday lives are destroyed because of this ignorance and blind faith in something that is only vaguely understood. Everything is capable of being compromised (with greatly varying degrees of difficulty, effort, and illegality, of course) and this is a fact that is too often forgotten. We see ourselves safe within our computer, willingly trading privacy for features on ever present social media websites, and never giving any of it a second thought how it could be affecting us. Personal information is becoming a commodity on the internet so next time you share yours think about your current security and the possible consequences.
If this is not carefully rethought by an entire generation we are going to pay the price; if not in five years, the break will occur in ten, or twenty. Trust is not to be put into any institution and few individuals, much less ones you have never even met. Businesses are out of control with respect to the amount of information and what they are allowed to do with it. Every single thing that you do on the internet is tracked and logged by several institutions, depending on which websites you are on and what you are doing. The “I have nothing to hide” argument does not hold weight as it is a slippery slope that could lead to stolen assets or identity theft. If you have nothing to hide, why do you have curtains or wear clothes? If you have nothing to hide, you’re not living.
Works Cited
Estes, Adam. "Anonymous Hits Israel with a Massive Cyber Attack, Israel Attacks Back." The Atlantic Wire. The Atlantic Wire, 7 Apr. 2013. Web. 08 Apr. 2013.
Halliday, Josh. "Facebook Users Unwittingly Revealing Intimate Secrets, Study Finds." The Guardian. Guardian News and Media, 03 Nov. 2013. Web. 08 Apr. 2013.
Nance-Nash, Sheryl. "Internet Insecurity: The 25 Worst Passwords of 2011." DailyFinance.com. Daily Finance, 15 Nov. 2011. Web. 08 Apr. 2013.
Wagley, John. "Apple Files Biometrics Patent for IPhone and Mac Computers." Homepage. Security Management, 19 Jan. 2012. Web. 08 Apr. 2013.
Cited: Estes, Adam. "Anonymous Hits Israel with a Massive Cyber Attack, Israel Attacks Back." The Atlantic Wire. The Atlantic Wire, 7 Apr. 2013. Web. 08 Apr. 2013. Halliday, Josh. "Facebook Users Unwittingly Revealing Intimate Secrets, Study Finds." The Guardian. Guardian News and Media, 03 Nov. 2013. Web. 08 Apr. 2013. Nance-Nash, Sheryl. "Internet Insecurity: The 25 Worst Passwords of 2011." DailyFinance.com. Daily Finance, 15 Nov. 2011. Web. 08 Apr. 2013. Wagley, John. "Apple Files Biometrics Patent for IPhone and Mac Computers." Homepage. Security Management, 19 Jan. 2012. Web. 08 Apr. 2013.
You May Also Find These Documents Helpful
-
Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…
- 688 Words
- 3 Pages
Good Essays -
Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…
- 299 Words
- 2 Pages
Good Essays -
Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…
- 1097 Words
- 5 Pages
Better Essays -
Once the Civil War had ended, many rejoiced and thought that African Americans would be free to live out normal lives, but then came the increase of lynching. After the war, the Southern economy was in ruins, and lynching had allowed white southerners to express their hatred and discontent towards the situation and African Americans were the vulnerable targets for their pent-up anger (Notes). In Southern Horrors, Feimster introduces Rebecca Felton, who was a wealthy slave owner, and Ida B. Wells, a slave born women, and how each woman viewed this idea of lynching drastically diverse from each other due to their upbringings.…
- 1090 Words
- 5 Pages
Good Essays -
The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…
- 1100 Words
- 3 Pages
Better Essays -
Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…
- 1278 Words
- 5 Pages
Better Essays -
Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…
- 1586 Words
- 7 Pages
Powerful Essays -
Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…
- 1725 Words
- 5 Pages
Better Essays -
The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…
- 445 Words
- 2 Pages
Good Essays -
Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…
- 3699 Words
- 15 Pages
Best Essays -
1. Describe Goffman’s “moral career of the mental patient” through its three phases. How is the patient’s self-identity thus gradually redefined in the context of the hospital as a total institution.…
- 327 Words
- 2 Pages
Satisfactory Essays -
There is so many things of what it means to be a American. It involves Americans having there freedoms and their rights. I believe being a American is something that is a privlage to have then just something that everyone who lives in the United States have. Being American is even something that can be counted as a blessing,…
- 408 Words
- 2 Pages
Satisfactory Essays -
By using these preventative measures businesses can save the U.S $44 billion dollars, productivity and time associated with recovering data from a breach. Also stated in this article was how 70% of security breaches occur because of an end user error. This is why it is necessary to insure ourselves with better technology such as backup data loss prevention and encryption to defend data from human error, as stated above. We have to remember that hackers invent new methods every day to get their hand on important information, and that is why you can never be too careful when it…
- 485 Words
- 2 Pages
Satisfactory Essays -
Use at least one of these special characters: ! @ # $ % * ( ) - + = , < >…
- 262 Words
- 3 Pages
Satisfactory Essays -
“Broadcast yourself!” YouTube’s slogan alone could summarize the spirit of the social revolution caused by the tidal wave of social networks. These have emerged as one of the main channels of communication on the web: links of all kinds are being forged, developed and broken almost instantly. According to a study1 published in France by the French Institute of Public Opinion (IFOP) on social networks, carried out using a sample of 1,002 people aged 18 years and over, 77 percent of Internet users say they are a member of at least one of the online social networks included in the study. These social networks’ notoriety is not simply the result of a mere fad. They allow their members to connect in a useful and enjoyable way by offering a variety of applications and benefits tailored to their target audience. LinkedIn has a huge employment market; for example, Jeff Epstein, chief financial officer of Oracle, was allegedly recruited thanks to his profile on this network.2 However, it would be unrealistic to think that the exponential growth of social networks has only positive effects. Indeed, publication and sharing of personal information exposes Internet users to all types of abuse and violation of their privacy. In 2009, a worker was fired for using Facebook during her sick leave from work due to migraines when using computers. Her boss said that if she could use Facebook, she was capable of working on a computer. This incident launched the issue of spying using Facebook.3 The aim of this article is twofold: to identify,…
- 3143 Words
- 13 Pages
Best Essays