Of Cyber Security And Individual Privacy

Cyber Security, A Challenge to Individual's Privacy?
This post was published on the now-closed HuffPost Contributor platform. Contributors control their own work and posted freely to our site. If you need to flag this entry as abusive, send us an email.
Photo Credit:- thefintechtimes

Life is turning out to be dependent on internet. By embracing the day to day physical entities things are dramatically changing and becoming interdependent on virtual connections. The watches on hands and the clocks on walls are now serving as sensor devices. The weather gadget clearly gives us brief information about tomorrow’s weather conditions. Life is now turning out to be competitive with the arrival of such inventions.

The global positioning system is providing us close, possible views of our destinations. Now what else do we need. The inventions of science are providing us comfort with a motive that a person must be self-dependent. We can imagine in virtual world fearlessly by adapting ourselves into the technological digital world. The gradual advancements in science and technology have served this world with such happenings that were impossible to imagine some centuries ago. Nowadays the withdrawal of cash, home based banking (Net Banking); Shopping on an internet enabled smart phone (e-shopping) and the speed in it makes our life easy and comfortable but dependent on internet. The comfort provided by the modern technology is becoming prime concern in our life.

Today we do not need newspaper to read the regular news headlines. Modern technology has given us such comfort that we can read it now from our smart phone or any device which would have an internet connection. This is possible due to science and the work which researchers did, making life more comfortable within a short span of time. The latest tools which have sensor detection system installed have started controlling our thinking and influencing our lives. All praise goes to the new inventions and advancements. Such advancement has opened opportunities for both the economy and the individuals.

The modern inventions in the 21st century technological world is based on a belief that there would be massive change in microelectronics, communications, information technology and steady change in the size of tools which we use nowadays. We have seen how our mobile phones started working like computers and how these small gadgets have steadily changed over the years. Today we have a watch which can be used as a mobile phone and a clock which could have a camera inbuilt installed or a sensor device which can detect any criminal activity easily by controlling it virtually. The digital up-gradation of conventional objects has enhanced their physical work by making them fast and by connecting them virtually which stands remotely connected to the internet. All this is possible due to Nano-technology. Such developments in conventional tools, like our sewing machines are now electronic; washing machines can now speak, new photo machines, mobile technology, sensor based blood testing, some medical scanners are some of the examples which show that conventional tools has been digitally upgraded and are being computerized to perform quick tasks in less span of time and some are equipped with networks to make them remotely available. The digital connectivity standard between the devices makes them interconnected and the steady change in the tools enhanced their properties. Today we are able to perform surgery in ambulances (this is applicable in developed nations; developing nations are working on this concept). Every development is thanks to improvement and enhancement in digital and modern technology.

The improvements and the gradual advancements in technology and the steady change in tools promises to improve individual’s standard of living and quality of life. That’s why we are witnessing the enhancements and improvements in transportation, logistics, education, health care and many other things. The blessing of science and technology has promised us everything. The digital revolution has begun.

With the systematic enhancements in latest technology, life has become dependent on new inventions. This became prime concern and the questions regarding the privacy of an individual started becoming main issue to all the developments made since many years. The complexities became main obstacle and now a matter of concern. Thus the concept of cyber security takes birth here. Thus the concept of cyber security (Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security) takes birth here.

Credit:- Cybersearch.com

Cyber security or information technology security or virtual security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. It is the body of technologies, processes and practices intended to improve the security of those things which are dependent on virtual connections. With the steady change in technology, our life witnessed a revolution in which we preferred to remain virtually dependent. The replacement in conventional methods and implementation of new technological ways has made sense that the technological world would have cyber risk and in present time that became a prime concern to maintain individual’s privacy. The on-going life which is under surveillance and is being monitored with sensor based technology and use of GPS is being used to get possible information. What would happen if a malicious or un-authorised person takes control over networks which have virtual connections, traffic signals and many other things likely our computers, mobile devices which we use to secure our precious information? There would be mess around the world and the “privacy” word would get declined. Likely there would be rise of world war three. Here the idea of “Cyber security” takes place to give world some sort of “peace” virtually.

With the failure of conventional security techniques and growing cyber-attacks all over the world many nations including US, Iran, Pakistan, India started working on the tactics which were meant to improve the security layers and to prevent unauthorised attackers to intrude any network or any website.

The growing cyber-attacks made sense that there is a dire need of improving security protocols to things which are remotely connected and give a security to individual’s privacy. Thus the concept of “Ethical hacking” takes birth here. While those unauthorised attackers who have a name “Black hat hackers (Black hat Hackers are a scary bunch—whether working as part of a criminal syndicate or an idealist with a political agenda, they’ve got the knowledge and the power to access your most precious data)” follow the path of destruction likely they hack either for political agenda or have some other motives behind any attack. The term “Hack” is not only a concept but a vision which would become prime concern in future when things would be remotely connected and would be handled from any part of the world with one click job. This term would be a biggest challenge to “internet of things”. The term “internet of things” is not only a concept of advancing technological tools but a concept of controlling any device at any place around the world remotely. It represents a vision in which the internet extends into the real world embracing everyday objects we use.

Have you ever imagined it before or still you are unaware. The smart phone which we use today has a facility designed to make the world interconnected with each other, that’s what “smart” technology teaches us. This phone could get hacked. The growing exploitation of these devices makes sense the regular security protocols needs to be followed. This will help us in making ourselves secure from cyber-attacks.

If hackers want to target a particular company, for example, they can find vast amounts of information on that company just by searching the web. They can then use that info to exploit weaknesses in the company’s security, which in turn puts the data you’ve entrusted to that company in jeopardy.

Think of your home computer as a company. What can you do to protect it against hackers? Instead of sitting back and waiting to get infected, why not arm your-self and fight back?

Keep in mind, that a hacker can attack any person. He can do anything depends on his intentions. He could get your Facebook details, publically expose your private pictures or could post anything unwanted or unlawful. He can take your bank details, can change password of your any online account, and can put backdoors behind in your system. Below mentioned are some safety security precautions which would be helpful in securing yourself from any cyber-attack.

1:-Never click on a link you did not expect to receive: - An old and an easy way of hacking any one’s bank account or any social networking id. This attack is known as a “phishing attack”. Through this attack an attacker sends a malicious link to any victim and pushes him to enter his precious details. He uses tricky measures while performing this attack. That’s why if a person checks his spam box he would see hundred such mails filled with malicious links.

Never click on any link which you are not expecting to receive. Even if you are opening any such link never ever put your precious data into it like Facebook username and password or your e-banking details. Try to Practice smart surfing and emailing.

2:- Use different passwords on different sites: -with data breaches occurring almost daily, if you’re using the same username and passwords on most of your online accounts, it’s a walk in the park for someone to start using your Facebook account.

3:- Use Alpha-numeric passwords on online accounts: - this is one the main security measure. Through this an attacker would never be able to brute force anyone’s account.

4: - Never open email attachments or click on links from strangers: - Viruses are often spread via attachments on emails, so if you don't know what an attachment is, do not open it. Never open .EXE attachments. The same is true of links. Even if it looks like a safe link, it may be forwarding to somewhere you weren't expecting.

5: - If you're doing online banking, use all the banks security recommendations: -Many banks will recommend adding a piece of software which guards against hackers. Do it. That will give your account maximum protection. For example, HSBC uses a programme called Rapport. Only complete online transactions where the URL starts with 'https' and not just 'http'. The “S” stands for secure. Don't do internet banking on computers that may be infected. Again, remember your bank will never ask for your login details via email, text or phone.

6:- Don't assume banks will pay you back: - it’s holy truth that no bank would like to pay you hundred dollars without knowing your identity. More commonly people receive calls which in cyber language we call it as “vishing calls”. Through these calls an attacker asks about bank details or any social networking id.

7:- Be wary of public Wi-Fi: -Most Wi-Fi hotspots do not encrypt information and once a piece of data leaves your device headed for a web destination, it is "in the clear" as it transfers through the air on the wireless network, says Symantec's Sian John. "That means any 'packet sniffer' [a program which can intercept data] or malicious individual who is sitting in a public destination with a piece of software that searches for data being transferred on a Wi-Fi network can intercept your unencrypted data. If you choose to bank online on public Wi-Fi, that's very sensitive data you are transferring. Preferable you should either try encryption [software], or only use public Wi-Fi for data which you're happy to be public – and that shouldn't include social network passwords."

5:- Don't store your card details on websites Mass data security breaches (where credit card details are stolen en masse) aren't common, but why take the risk? The extra 90 seconds it takes to key in your details each time is a small price to pay. A data breach to any company would lead expose of your precious data which would include your bank account details.

6:- Lock down your Facebook account: -

Facebook regularly updates its timeline and privacy settings, so it is wise to monitor your profile, particularly if the design of Facebook has changed. Firstly, in the privacy settings menu, under "who can see my stuff?" change this to "friends" (be warned: setting this to "friends of friends"). Also in privacy, setting "limit old posts" applies friends-only sharing to past as well as future posts. Thirdly, disable the ability of other search engines to link to your timeline.

You should also review the activity log, which shows your entire history of posts and allows you to check who can see them. Similarly, you should look at your photo albums and check you're happy with the sharing settings for each album. In the future you may want to consider building "lists" – subsets of friends, such as close friends and family, who you might want to share toddler photographs with, rather than every Tom, Dick and Harriet.

Also, remove your home address, phone number, date of birth and any other information or use the option visible to “Only Me”. That info if publically visible would be used to fake your identity. Similarly you might want to delete or edit your "likes" and "groups" – the more hackers know about you, the more convincing a phishing email they can spam you with. Facebook apps often share your data, so delete any you don't use or don't remember installing. Finally, use the "view as" tool to check what the public or even a particular individual can see on your profile, continue to "edit" and adjust to taste. If this all sounds rather tedious, you just might prefer to permanently delete your account.

7: -Don’t link accounts: - If you want to comment on an article and you’re prompted to sign in with Twitter or Facebook, do not go behind the door. “Linking accounts allows services to acquire a staggering amount of personal information”. Try to use secure login.

8: - Use a firewall, anti-virus programme and anti-spyware programme you can use Windows' own firewall, or a third-party, such as Norton or McAfee. But make sure you don't use both as they can interfere with each other. - A firewall will stop unauthorised people hacking on to your computer. - Anti-virus programmes will guard your computer from viruses which could destroy your computer. - Anti-spyware will look out for programmes such as key loggers and Trojans which spy on your computer use in an attempt to learn passwords or account details.

9: - Remember you're human after all: - while much of the above are technical solutions to prevent you being hacked and scammed, hacking done well is really the skill of tricking human beings, not computers, by preying on their gullibility, taking advantage of our trust, greed or altruistic impulses. Human error is still the most likely reason why you'll get hacked.

10:- Use WPA, WPA2 security with alpha numeric password: -By disabling the “WPS” (which saves a router from that Wps-Wpa cracker app) option in your router, use WPA2 as a security measure to protect your Wi-Fi from attacks. Use of an alpha-numeric password would be preferably a good way to secure your Wi-Fi router from brute-force attacks.

Yasir Altaf Zargar is a Srinagar based web security analyst. He has been acknowledged and rewarded for contributing to the web security of Google, Yahoo, Hackerone, Microsoft, Nokia, and Oracle. He tweets as @zargaryasir and can be reached at zargaryasir@gmail.com

Popular in the Community

Close

What's Hot