Difference between revisions of "Hacking security"

From SI410
Jump to: navigation, search
Line 1: Line 1:
 
'''Hacking Security'''
 
'''Hacking Security'''
  
Hacking is defined as the state of being free from danger or threat. Hacking security is an uncomplicated term, one that hasn’t been defined. Based on these terms and definitions combined, hacking security is defined as the invading of one’s privacy on a technological level. This invasion can expose some of the most important information about a person including personal, financial, health and more. Alessandro Acquisti,Professor of Information Technology and Public Policy at Carnegie Mellon University, mentions that there are no longer secrets as people are exposed online with minimal information. Because of this hacking security became easier for some yet its unethical as it exposes information that can be detrimental to one’s personal and professional or academic lifestyles. This has affected people across the globe in so many ways from different perspectives and it happens on a regular basis.  
+
Hacking <ref>https://www.techopedia.com/definition/26361/hacking </ref> generally refers to the unauthorized intrusion into a computer or a network.is defined as the state of being free from danger or threat. Hacking security is an uncomplicated term, one that hasn’t been defined. Based on these terms and definitions combined, hacking security is defined as the invading of one’s privacy on a technological level. This invasion can expose some of the most important information about a person including personal, financial, health and more. Alessandro Acquisti,Professor of Information Technology and Public Policy at Carnegie Mellon University, mentions that there are no longer secrets as people are exposed online with minimal information. Because of this hacking security became easier for some yet its unethical as it exposes information that can be detrimental to one’s personal and professional or academic lifestyles. This has affected people across the globe in so many ways from different perspectives and it happens on a regular basis.  
  
  
  <ref>https://www.techopedia.com/definition/26361/hacking </ref> generally refers to the unauthorized intrusion into a computer or a network. Security <ref>https://www.google.com/search?q=security+definition&oq=security+def&aqs=chrome.1.69i57j0l5.2981j1j4&sourceid=chrome&ie=UTF-8 </ref>  
+
  <ref>https://www.techopedia.com/definition/26361/hacking </ref> generally refers to the unauthorized intrusion into a computer or a network.
 +
Security <ref>https://www.google.com/search?q=security+definition&oq=security+def&aqs=chrome.1.69i57j0l5.2981j1j4&sourceid=chrome&ie=UTF-8 </ref>  
  
 
'''Targets and Attacks'''  
 
'''Targets and Attacks'''  

Revision as of 14:37, 28 March 2019

Hacking Security

Hacking [1] generally refers to the unauthorized intrusion into a computer or a network.is defined as the state of being free from danger or threat. Hacking security is an uncomplicated term, one that hasn’t been defined. Based on these terms and definitions combined, hacking security is defined as the invading of one’s privacy on a technological level. This invasion can expose some of the most important information about a person including personal, financial, health and more. Alessandro Acquisti,Professor of Information Technology and Public Policy at Carnegie Mellon University, mentions that there are no longer secrets as people are exposed online with minimal information. Because of this hacking security became easier for some yet its unethical as it exposes information that can be detrimental to one’s personal and professional or academic lifestyles. This has affected people across the globe in so many ways from different perspectives and it happens on a regular basis.


[2] generally refers to the unauthorized intrusion into a computer or a network.
Security [3] 

Targets and Attacks

Government Services

Recently, sixty million users were affected due to the weak security for USPS website. This led to exposure to its database that consisted of emails to phone numbers, mailing campaign data, social security numbers, possibly credit card numbers, access to request account changes for other users so they make changes to the email addresses and phone numbers of other users, access to street addresses, who lived in each residence, and data of everyone who lived in the same household as those who logged into the site. This data breach took this organization a year to resolve these problems. In other words, these issues were aware of but not fixed right away.

[4]

One wouldn’t have expected such high vulnerability considering that USPS is part of the government and one would hope it's more secure than expected. This leads to a concern of ethics and safety. One should be concerned that its possible for the “hackers” to gain access to other branches of the government as this was too vulnerable to access.

It is possible that other branches of the government can be impacted because of this scenario. However this shouldn’t be a common thing but one can only hope that this doesn’t occur again. Most people wouldn’t have considered this being a potential situation as sending and retrieving mail is such a common day to day task. At most people would minimally worry about important packages or mail sent to the wrong address and one will open that information. However, this rarely occurs and its taken seriously as its a federal offense to open someone’s mail or packages as it’s a matter of privacy. In other words, it was least expected that this situation would occur and the lack of timing and careness for handling this situation.

Healthcare

Unfortunately, healthcare companies are easy targets in terms of hacking because it's maximized vulnerability. It can easily take weeks or months before one realizes there is a data breach. This allows too much alloted time for hackers to access as much information as they want or need. This type of information contains social security numbers and dates of births as companies only spend 3% of their IT budget on security.

[5]

One would assume that healthcare companies would contribute more funds towards security as there is so much prevalent information that both medical professionals and clients need. It makes one wonder why these companies are still vulnerable and not respecting idea of anonymity and keeping information discreet. Most people wouldn’t want their medical conditions or health related information exposed the public as they may be embarrassed or are hiding it for professional or personal reasons. Example, one may not want their job to know they are battling cancer in fear of losing their job and not having financial security for the medical treatments.

It’s best for people to be aware and concerned that healthcare companies are easy targets. So many people rely on healthcare regardless if services are obtained at a clinic or hospitals or local medical centers, these attract a large population especially in United States. People are vulnerable and not only will their medical information be exposed it is also their unpaid or extensive healthcare bills may be shown as well. This can look bad on the person financially in terms of current or potential employment.

Ethnics and Anonymity

Anonymity defined as unable to coordinate some known trait(s) with other traits such that the person can’t be identified. This is something that many people in the US don’t have the flexibility of. Many of the attacks and examples reflect that people are no longer anonymous or have the least amount of people with access to certain personal information. Because of the lack of, or limited security across many organizations and companies, this has led to the vulnerability and exposure of personal information.

It is clear based on data breaches that occurred for the US Postal Services and Healthcare companies reflect how rare anonymity is.Exposure of social security numbers will potentially lead to many identity thefts which often take a long time to recover from. Due to the exposure from the data breach, it’s possible that more than one person will have that identity which makes it that much harder to track down the person who actually “stole” one’s identity.

Alessandro Acquisti shares how there is no such thing as hiding your secrets or being anonymous because of our online era.The truth is; from having an image of a person using facial recognition, finding a name and publicly information about that name and person can form into non-publicly available information even the more sensitive information. Example, using one’s image found on their Facebook account or an app that uses phone’s internal camera taking images of user and the information shared on Facebook led to more help for determining their social security number. With these tools, there is a 27% chance of determining their first five SSN digits within four attempts. This is just one of his many experiments in regards to anonymous and how to gather information to uncover their information.

Evidently, this tool is clever and innovative yet alarming. This is something that should concern many people as it allows people to use simplified information to their advantage. This is beyond unethical and one would think that people would spend more time and effort into improving online security. One may wonder should people not post anything at all whereas others wonder what is even allowed to post online. Some may wonder if social security numbering policy may need to change so there is barely any “margin” to guess its number after multiple tries. It may need to get more complicated by having a combination of numbers, letters, and characters to limit these unethical issues.

[6]

Based on Acquisti’s claims in regards to how it’s becoming easier to discover more personal information about people. However, these data breaches don’t help considering we are already vulnerable to these security concerns. These data breaches along with the online presence of people makes it that much harder for people to remain anonymous or limit their anonymity from the least amount of people as possible. One can only hope that online security will improve so that people remain anonymous if any at all.

Conclusion

Overall, one can suggest that its prevalent for companies to become more serious in terms of online security as one will have personal information that can potentially not be retrieved once its been exposed. It’s necessary that companies maximize their budget and efforts to ensure the safety of their online users to avoid or limit the number of data breaches if this is possible. This would be useful as people are already sharing minimal information online with the lack of awareness that no one is truly anonymous and there is a small chance of one finding more personal information about them.
  1. https://www.techopedia.com/definition/26361/hacking
  2. https://www.techopedia.com/definition/26361/hacking
  3. https://www.google.com/search?q=security+definition&oq=security+def&aqs=chrome.1.69i57j0l5.2981j1j4&sourceid=chrome&ie=UTF-8
  4. "https://www.theverge.com/2018/11/22/18107945/usps-postal-service-data-vulnerability-security-patch-60-million-users
  5. https://www.darkreading.com/endpoint/why-hackers-love-healthcare/a/d-id/1331537
  6. " https://www.ted.com/talks/alessandro_acquisti_why_privacy_matters/up-next"