Top-Rated Free Essay
Preview

Security Crisis Solved: More Secure Logins, Not Sharing Personal Information, and the Use of Encryption Software.

Better Essays
1719 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Crisis Solved: More Secure Logins, Not Sharing Personal Information, and the Use of Encryption Software.
Security Crisis Solved: More secure logins, not sharing personal information, and the use of encryption software.
The internet is a constantly changing and evolving environment. From its earliest days in the late 60s, when the very first small networks were brought online, to today’s massive and long-reaching web of connection, change is one of the few things that can be reliably predicted. This change is not only fast, but also dangerous to those who don’t understand or fully appreciate its potential to damage them or society. As the internet evolves to do nearly everything but sustain life itself, security becomes paramount. Internet users need to be more aware of today’s increasing rate of cyber-attacks and should stop sharing their personal information, use more secure logins, and utilize encryption software to protect themselves from the cyber-crime.
As are many important issues of today, this is a complex and multi-layered problem. “Cyber security” refers to either that of the individual, that of a website or business, or that of government agencies. The largest issue is the release of personal information, which happens with the security breach of personal accounts on an individual level, business records on a corporate level, or residence, tax, or employment information on a governmental level.
It begins with the individual and the way they treat, view, and use internet services. The clichés that existed in the beginning of chat rooms and online services (“don’t give anyone your last name or any personal information”) seem to have died sometime overnight. My generation has apparently given up all right to internet privacy without a fight or second thought. People use social media as if it is their personal confession box at the expense of any discretion. Whether this is done out of pleas for validation, pity, or empathy is irrelevant; it has become popularized and accepted as standard practice. On the popular social media site Facebook, simply “Liking” a status or post can give a competent observer more information about the user than he or she could possibly imagine. In a recent Guardian article analyzing a Cambridge study that used computer algorithms to predict personal details about Facebook users, the author stated,
The research into 58,000 Facebook users in the US found that sensitive personal characteristics about people can be accurately inferred from information in the public domain…Researchers were able to accurately infer a Facebook user 's race, IQ, sexuality, substance use, personality or political views using only a record of the subjects and items they had "liked" on Facebook – even if users had chosen not to reveal that information. (Halliday)
Users of these services are disclosing more then they think. On the internet, everything has the potential to be permanent; storage capacity is virtually unlimited. Deleting profiles and other things left strewn in servers is much more difficult than one might think. At one time, people confided in one another through disclosure and built trust, and thus created strong interpersonal relationships. This forfeiting of all privacy on the individual’s part puts the user at a very large data security risk. But not only is personal information disclosed with a loose tongue (or fingers), many people are failing to give it some of the only protection that is within their control.
Oftentimes, passwords or phrases are short, containing common (or easily guessable) combinations of letters, numbers, or words. Additionally, the same password is commonly used for years. In 2011, a survey published by Daily Finance revealed that a staggering 59.9% of respondents reportedly never changed their passwords, compared to 13.9% changing them once per year, and 11.8% changing them once per month (Nance-Nash). This is a very poor practice that greatly increases a users’ vulnerability.
It is also very common for an individual to use the same one or two passwords across dozens of separate internet services, which is an enormous security risk. Typically, the security of social media services like Facebook and Twitter is less than that of a large financial institution like the Bank of America, and understandably so. If hackers successfully compromise Twitter accounts, which happens with fairly frequent success, it could possibly give the attackers automatic access to much more detrimental web services like online banking or investing. These cyber-attacks can happen everywhere. In fact, corporations are becoming increasingly vulnerable to cyber warfare for many reasons. The largest is the incredibly large amount of personal data that is held on corporate servers, often unencrypted and vulnerable. This greatly attracts the attention of criminals looking to steal identities and hijack bank and trading accounts. Even if you are not a patron of a business, your information may be held by them because of a practice called data mining. Data mining occurs when companies collect information about you due to things you publicly display, or pay companies already in procession of the data for the usage of it. From a business standpoint, this may be a profitable practice because it allows advertising divisions and marketing teams which demographics to focus on. But personal information is not a business commodity. When entire companies exist solely for the purpose of buying and selling information, security and privacy on the internet have reached a critical state.
Organized cybercrime is also on the rise. The loosely knit hacker groups calling themselves “Anonymous” have, in their brief history, unleashed a slew of attacks against individuals and businesses alike. Deeming themselves “hacktivists”, the group has carried out these attacks apparently in the name of reform. It is easy to glorify their actions, but they have all the traits and characteristics of a terrorist organization and are treated as such by government institutions. On April 7, 2013, Anonymous carried out a massive cyber-attack on an Israeli bank which caused a negative effect across “100,000 websites, 40,000 Facebook pages, 5,000 Twitter accounts and 30,000 bank accounts” (Estes). Thousands of names and bank account information was spilled into the group’s webpage before it too was shut down. This is just one tiny fragment of what an organized group is capable of, and there are likely many more hiding in the shadows.
Fortunately, fighting technology with technology remains an option; in fact, it may be the only one left. Encryption software designed for personal use has become user friendly and intuitive. Biometric features such as finger print readers are already common on recently manufactured laptops. Facial and even retinal recognition hardware and software is currently in development. Security Management in Apple products are starting to release new preventative measures as like continuous facial authentication functionality that checks computer users’ faces every 10 seconds using the front facing camera. If the viewer steps away from the computer, the system will successfully lock. Upon return, the user will see an image of their face on the computer screen. Once it sees the owners face the computer unlocks almost instantly. There is also an option for the computer to snap a picture of the potential hijacker before the operating system is locked down (Wagley). Presently, these features can do no more than protect your hard drives and physical computer; that is, they are used to log on to your computer and will not help you stay safe on the internet. But it is a step in the right direction and shows hope for the future.
Since there is little security on the internet, it should be treated at all times with this fact in mind. I have seen people log into their bank account from unsecured coffee shop networks without a second thought. An unsecure wireless network means it has no security whatsoever and anyone can get onto it without a password or key. Anyone could be sniffing the network, even from a good distance away. They will operate under the radar without anyone knowing, that’s why the internet needs to be treated with more weariness. The best way to keep yourself safe on an unsecure network is to make sure you have anti-virus, anti-spyware, and a firewall installed on your computer. Also under no circumstances use an unsecured network for any finances-related work like checking your online checking, online banking statements, or making credit card purchases. Everyday lives are destroyed because of this ignorance and blind faith in something that is only vaguely understood. Everything is capable of being compromised (with greatly varying degrees of difficulty, effort, and illegality, of course) and this is a fact that is too often forgotten. We see ourselves safe within our computer, willingly trading privacy for features on ever present social media websites, and never giving any of it a second thought how it could be affecting us. Personal information is becoming a commodity on the internet so next time you share yours think about your current security and the possible consequences.
If this is not carefully rethought by an entire generation we are going to pay the price; if not in five years, the break will occur in ten, or twenty. Trust is not to be put into any institution and few individuals, much less ones you have never even met. Businesses are out of control with respect to the amount of information and what they are allowed to do with it. Every single thing that you do on the internet is tracked and logged by several institutions, depending on which websites you are on and what you are doing. The “I have nothing to hide” argument does not hold weight as it is a slippery slope that could lead to stolen assets or identity theft. If you have nothing to hide, why do you have curtains or wear clothes? If you have nothing to hide, you’re not living.

Works Cited
Estes, Adam. "Anonymous Hits Israel with a Massive Cyber Attack, Israel Attacks Back." The Atlantic Wire. The Atlantic Wire, 7 Apr. 2013. Web. 08 Apr. 2013.
Halliday, Josh. "Facebook Users Unwittingly Revealing Intimate Secrets, Study Finds." The Guardian. Guardian News and Media, 03 Nov. 2013. Web. 08 Apr. 2013.
Nance-Nash, Sheryl. "Internet Insecurity: The 25 Worst Passwords of 2011." DailyFinance.com. Daily Finance, 15 Nov. 2011. Web. 08 Apr. 2013.
Wagley, John. "Apple Files Biometrics Patent for IPhone and Mac Computers." Homepage. Security Management, 19 Jan. 2012. Web. 08 Apr. 2013.

Cited: Estes, Adam. "Anonymous Hits Israel with a Massive Cyber Attack, Israel Attacks Back." The Atlantic Wire. The Atlantic Wire, 7 Apr. 2013. Web. 08 Apr. 2013. Halliday, Josh. "Facebook Users Unwittingly Revealing Intimate Secrets, Study Finds." The Guardian. Guardian News and Media, 03 Nov. 2013. Web. 08 Apr. 2013. Nance-Nash, Sheryl. "Internet Insecurity: The 25 Worst Passwords of 2011." DailyFinance.com. Daily Finance, 15 Nov. 2011. Web. 08 Apr. 2013. Wagley, John. "Apple Files Biometrics Patent for IPhone and Mac Computers." Homepage. Security Management, 19 Jan. 2012. Web. 08 Apr. 2013.

You May Also Find These Documents Helpful

  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    In her blog “ The Fakebook Generation,” later to be published in the New York Times on October 6, 2007, Alice Mathias enters the topic of the most used social networking service worldwide, Facebook. Mathias debates on Facebook’s claim of being a forum for “genuine personal and professional connections” (438) and tries to influence her readers to ask themselves if the website really promotes human relationships. Alice Mathias, a 2007 graduate of Dartmouth College in Hanover, New Hampshire has wrote several more columns before, in which one of them was even awarded the Waterhouse Research Award.…

    • 1553 Words
    • 7 Pages
    Better Essays
  • Good Essays

    For it to be a truly effective communication vehicle, all parties bear a responsibility to be genuine, accurate, and not allow it to replace human contact” (Tardanico).This quote shows that social media has the potential to do good, but because individuals are constantly urged to market themselves to a world full of strangers via the Internet and its numerous social networking sites, they instinctively create a personal image that is seen as consistent and memorable. “Awash in technology, anyone can hide behind the text, the e-mail, the Facebook post or the tweet, projecting any image they want and creating an illusion of their choosing”(Tardanico). More and more people in today’s society have no problem disclosing intimate details to strangers. Some even create false images of themselves to appeal to others as trustworthy and intelligent. Rosen brings up the idea of “personal branding,” in which individuals present the best version of themselves in order to establish and maintain emotional connections with strangers.…

    • 1169 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    By using these preventative measures businesses can save the U.S $44 billion dollars, productivity and time associated with recovering data from a breach. Also stated in this article was how 70% of security breaches occur because of an end user error. This is why it is necessary to insure ourselves with better technology such as backup data loss prevention and encryption to defend data from human error, as stated above. We have to remember that hackers invent new methods every day to get their hand on important information, and that is why you can never be too careful when it…

    • 485 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Password Security

    • 262 Words
    • 3 Pages

    Use at least one of these special characters: ! @ # $ % * ( ) - + = , < >…

    • 262 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Social Networking Audit

    • 3143 Words
    • 13 Pages

    “Broadcast yourself!” YouTube’s slogan alone could summarize the spirit of the social revolution caused by the tidal wave of social networks. These have emerged as one of the main channels of communication on the web: links of all kinds are being forged, developed and broken almost instantly. According to a study1 published in France by the French Institute of Public Opinion (IFOP) on social networks, carried out using a sample of 1,002 people aged 18 years and over, 77 percent of Internet users say they are a member of at least one of the online social networks included in the study. These social networks’ notoriety is not simply the result of a mere fad. They allow their members to connect in a useful and enjoyable way by offering a variety of applications and benefits tailored to their target audience. LinkedIn has a huge employment market; for example, Jeff Epstein, chief financial officer of Oracle, was allegedly recruited thanks to his profile on this network.2 However, it would be unrealistic to think that the exponential growth of social networks has only positive effects. Indeed, publication and sharing of personal information exposes Internet users to all types of abuse and violation of their privacy. In 2009, a worker was fired for using Facebook during her sick leave from work due to migraines when using computers. Her boss said that if she could use Facebook, she was capable of working on a computer. This incident launched the issue of spying using Facebook.3 The aim of this article is twofold: to identify,…

    • 3143 Words
    • 13 Pages
    Best Essays