Difference between revisions of "Hacking security"

From SI410
Jump to: navigation, search
Line 3: Line 3:
 
'''Hacking Security'''
 
'''Hacking Security'''
  
Hacking <ref name = “https://www.techopedia.com/definition/26361/hacking ” >generally refers to the unauthorized intrusion into a computer or a network. Security is defined as the state of being free from danger or threat. Hacking security is an uncomplicated term, one that hasn’t been defined. Based on these terms and definitions combined, hacking security is defined as the invading of one’s privacy on a technological level. This invasion can expose some of the most important information about a person including personal, financial, health and more.  
+
Hacking <ref name = “https://www.techopedia.com/definition/26361/hacking ” > generally refers to the unauthorized intrusion into a computer or a network. Security <ref name =" https://www.google.com/search?q=security+definition&oq=security+def&aqs=chrome.1.69i57j0l5.2981j1j4&sourceid=chrome&ie=UTF-8"> is defined as the state of being free from danger or threat. Hacking security is an uncomplicated term, one that hasn’t been defined. Based on these terms and definitions combined, hacking security is defined as the invading of one’s privacy on a technological level. This invasion can expose some of the most important information about a person including personal, financial, health and more.  
  
 
'''Targets and Attacks'''  
 
'''Targets and Attacks'''  
Line 9: Line 9:
 
''Government Services''  
 
''Government Services''  
  
Recently, sixty million users were affected due to the weak security for USPS website. This led to exposure to its database that consisted of emails to phone numbers, mailing campaign data, social security numbers, possibly credit card numbers, access to request account changes for other users so they make changes to the email addresses and phone numbers of other users, access to street addresses, who lived in each residence, and data of everyone who lived in the same household as those who logged into the site. This data breach took this organization a year to resolve these problems. In other words, these issues were aware of but not fixed right away.  
+
Recently, sixty million users were affected due to the weak security for USPS website. This led to exposure to its database that consisted of emails to phone numbers, mailing campaign data, social security numbers, possibly credit card numbers, access to request account changes for other users so they make changes to the email addresses and phone numbers of other users, access to street addresses, who lived in each residence, and data of everyone who lived in the same household as those who logged into the site. This data breach took this organization a year to resolve these problems. In other words, these issues were aware of but not fixed right away. <ref ="https://www.theverge.com/2018/11/22/18107945/usps-postal-service-data-vulnerability-security-patch-60-million-users" >
 
 
One wouldn’t have expected such high vulnerability considering that USPS is part of the government and one would hope it's more secure than expected. This leads to a concern of ethics and safety. One should be concerned that its possible for the “hackers” to gain access to other branches of the government as this was too vulnerable to access. (252 words)
+
One wouldn’t have expected such high vulnerability considering that USPS is part of the government and one would hope it's more secure than expected. This leads to a concern of ethics and safety. One should be concerned that its possible for the “hackers” to gain access to other branches of the government as this was too vulnerable to access.  
  
 
''Healthcare''  
 
''Healthcare''  
  
Unfortunately, healthcare companies are easy targets in terms of hacking because it's maximized vulnerability. It can easily take weeks or months before one realizes there is a data breach. This allows too much alloted time for hackers to access as much information as they want or need. This type of information contains social security numbers and dates of births as companies only spend 3% of their IT budget on security.  
+
Unfortunately, healthcare companies are easy targets in terms of hacking because it's maximized vulnerability. It can easily take weeks or months before one realizes there is a data breach. This allows too much alloted time for hackers to access as much information as they want or need. This type of information contains social security numbers and dates of births as companies only spend 3% of their IT budget on security. <ref = "https://www.darkreading.com/endpoint/why-hackers-love-healthcare/a/d-id/1331537" >
  
 
One would assume that healthcare companies would contribute more funds towards security as there is so much prevalent information that both medical professionals and clients need. It makes one wonder why these companies are still vulnerable and not respecting idea of anonymity and keeping information discreet. Most people wouldn’t want their medical conditions or health related information exposed the public as they may be embarrassed or are hiding it for professional or personal reasons. Example, one may not want their job to know they are battling cancer in fear of losing their job and not having financial security for the medical treatments.  
 
One would assume that healthcare companies would contribute more funds towards security as there is so much prevalent information that both medical professionals and clients need. It makes one wonder why these companies are still vulnerable and not respecting idea of anonymity and keeping information discreet. Most people wouldn’t want their medical conditions or health related information exposed the public as they may be embarrassed or are hiding it for professional or personal reasons. Example, one may not want their job to know they are battling cancer in fear of losing their job and not having financial security for the medical treatments.  
Line 25: Line 25:
 
It is clear based on data breaches that occurred for the US Postal Services and Healthcare companies reflect how rare anonymity is.  Exposure of social security numbers will potentially lead to many identity thefts which often take a long time to recover from. Due to the exposure from the data breach,, it’s possible that more than one person will have that identity which makes it that much harder to track down the person who actually “stole” one’s identity.  
 
It is clear based on data breaches that occurred for the US Postal Services and Healthcare companies reflect how rare anonymity is.  Exposure of social security numbers will potentially lead to many identity thefts which often take a long time to recover from. Due to the exposure from the data breach,, it’s possible that more than one person will have that identity which makes it that much harder to track down the person who actually “stole” one’s identity.  
  
Alessandro Acquisti shares how there is no such thing as hiding your secrets or being anonymous because of our online era.The truth is; from having an image of a person using facial recognition, finding a name and publicly information about that name and person can form into non-publicly available information even the more sensitive information. Example, using one’s image found on their Facebook account or an app that uses phone’s internal camera taking images of user and the information shared on Facebook led to more help for determining their social security number. With these tools, there is a 27% chance of determining their first five SSN digits within four attempts. This is just one of his many experiments in regards to anonymous and how to gather information to uncover their information.  
+
Alessandro Acquisti shares how there is no such thing as hiding your secrets or being anonymous because of our online era.The truth is; from having an image of a person using facial recognition, finding a name and publicly information about that name and person can form into non-publicly available information even the more sensitive information. Example, using one’s image found on their Facebook account or an app that uses phone’s internal camera taking images of user and the information shared on Facebook led to more help for determining their social security number. With these tools, there is a 27% chance of determining their first five SSN digits within four attempts. This is just one of his many experiments in regards to anonymous and how to gather information to uncover their information. <ref =" https://www.ted.com/talks/alessandro_acquisti_why_privacy_matters/up-next">
  
 
Based on Acquisti’s claims in regards to how it’s becoming easier to discover more personal information about people. However, these data breaches don’t help considering we are already vulnerable to these security concerns. These data breaches along with the online presence of people makes it that much harder for people to remain anonymous or limit their anonymity from the least amount of people as possible.  
 
Based on Acquisti’s claims in regards to how it’s becoming easier to discover more personal information about people. However, these data breaches don’t help considering we are already vulnerable to these security concerns. These data breaches along with the online presence of people makes it that much harder for people to remain anonymous or limit their anonymity from the least amount of people as possible.  

Revision as of 17:08, 14 March 2019

Kayla Williams

Hacking Security

Hacking Cite error: Closing </ref> missing for <ref> tag