TITLE : CYBER SAFETY MEASURES
ABSTRACT :
With the evolving nature of security risks, information security is currently one of the most serious issues worldwide. Over the past few years the wide spread presence of cyber attacks have skyrocketed including some extremely dangerous cyber attacks such as “cyber spying”, “ malware” and “phishing schemes”. Traditional cyber safety measures focus on the biggest threats of networks and systems. But traditional measures leave almost all the subtle dangerous risks unprotected. Recently the biggest cyber attack in the world resulted into a disaster with almost 20000 victims in almost 150 countries worldwide. Unrooting cyber attacks is apparently impossible. But improving cyber safety measures is possible.
…show more content…
The main goal of cyber safety measures is to keep everyone safe from cyber criminals.Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks". [Wikipedia,13 August 2017, https://en.wikipedia.org/wiki/Cybercrime#Awareness] .
There are several types of cyber crimes for which cyber safety measures need to be adopted. Some of them are as follows :
Cyberbullies
Cyber Bullying is actually a kind of cyber crime where the victim is harassed through the electronic media. Computers,phones,tablets and different communication tools such as smart phones, websites social media sites are used for cyber bullying. There are several kinds of cyberbullying.
“
1. Denigration – posting mean comments online through emails, IM, chatrooms, “bashboards,” social networking sites, or websites set up specifically to make fun of someone.
2. Exclusion – intentionally leaving someone out of an online group or community, such as IM buddy lists or friends’ lists on social networking
…show more content…
Cyberstalking – continuous harassment and denigration, including threats of physical harm.”
(Cyber Safety ppt,13 August 2017,https://www2.cpsb.org/cybersafety/CyberSafety_%206_12.ppt)
File-sharing abuses
File sharing abuses occure when we end up downloading inappropriate materials, computer viruses, or spyware by mistake at the time of exchanging music, video, and other files. There are some kinds of file-sharing programs that even let other users access your device any time it’s online.
Exposure to disturbing content
If you click an advertisement or a confusing link on a search page, or if you share files online, you could view information or images that are disturbing or inappropriate, or not in keeping with your family values. This is exposure to disturbing contents.
Online predators
In the virtual world, people may not always be who they show they are. Online predators can use the Internet, social medias and websites to befriend children and young people. They actually want to isolate children and to convince them to meet in person. The only information known about the people we meet online is what they tell us. Child predators use that anonymity to trick childres, by pretending to be someone who is trustworthy.
The US receives approximately “one million threats” from hackers every day (Harrison and Pagliery). And though this includes businesses, organizations, etc., instances such as the embarrassing hack of SONY in 2014 demonstrate the capabilities of other foreign countries. It is of the utmost importance that the US does not arm itself and rely solely on equipment which can so easily be compromised. CNN Money categorized the three main types of threats “tech users” are nervous about into broad categories, comprised of digital exortion, where cyber thieves blackmail victims with personal files stolen, sophisticated attacks, when hackers “hide malware inside software updates”, and social media.
Cyberbullying is bullying that happens online on social media sites. People thinks it's okay to bully other people online but no it's not okay. Cyber bullying is similar to The Crucible by people dont like when people act differently. One person starts it and then others will jump in just like how they did when they started to accuse people of being witches in salem in 1940 and 1950.
Now focusing on cyber security and communication security which are the following parts that make up the national security. Each one of these parts are responsible for a specific function. Cybercrime is attacking the information systems, sometimes identity theft, but in some cases fraud. By providing insight into causes of cybercrime, its participants their motivations, then we identify some of the major issues dealing with these crimes. With cybercrime being nondiscriminatory, also dramatically increase.
According to Screen & Reveal, as many as 500,000 predators pose a threat to younger children who use the internet. 1 in 25 children will be manipulated into physical contact within a year. 82 percent of online predators are male. The critical literacy book Want to Go Private?
Bullying is a major issue facing today’s youth. Over the course of the past few years bullying has become such a concern that many states have adopted laws against it. However, the issue evolves as time goes on and now cyber bullying exists. Cyber bullies can insult others over the internet with no need to be nearby the person they are insulting.
Unwanted, aggressive behavior, among any age group classifies as bullying. Cyberbullying is another form of bullying that involves social media and electronic devices. In my opinion, cyber bullying is more severe because, at the end of the day, the victim can not get away from the issue. They go home to social media, what is now the center of our time, and it is impossible to escape the terror of being bullied.
What is cyber bullying? Cyber bullying “repeated harm inflicted through the use of computers, cell phones and other electronic devices”, according to the Ophelia Project. Individuals should be prosecuted for cyber bullying. Nearly one in three teens admit to being cyber bullied. People can go on any social media page and make fake accounts.
New technology is constantly emerging and this new technology gives members of the public more and more opportunities to break the laws which are put in place to protect them. Law reform is a slow process, it takes a long time for an act to be amended. The Australian Law Reform Commission will complete 1 to 2 inquiries a year which shows just how long the process can be. During this time new technology will emerge which will more than likely render the amendments when they are passed inadequate to suit the new technology. Making laws to suit something that has never been see before is a task that the Law making bodies are faced with and although difficult, it needs to be done quickly in order to avoid crimes that will more than likely be committed.
Predators are good at looking for their prey; they will find a person who feels emotionally separated from others or who has low self-esteem, like young middle school students who are going through puberty and trying to figure out themselves or children who are having issues at home. The predator will act like he or she cares about the child’s problems by listening, asking questions, and consoling them. These cause children to fall for these false concernments and be dependent on the predators when they feel conflicted by an issue. After the child has created a bond or friendship with the predator, the predator will try to convince the child to meet or get involved in a sexual relationship, or the child will be curious to meet the person he or she has been talking to for weeks online. Coby Persin, a YouTube star, tried a social experiment where he socialized with a thirteen-year-old girl, having permission from her father to see if she was foolish enough to try to meet this stranger.
In the article, “On Social Media, Teens Take Risks First Seek Help Later”, Traci Pederson discusses the risks behind the internet and steps that can be done in order to prevent these possibilities from happening to juveniles. Multiple steps can be completed to educate minors on privacy issues as they use social media. First off, teenagers should be frequently warned about the dangers of the Internet. Informing teenagers about local incidents caused by the misuse of social media teaches them the significance of confidentiality settings. After notifying adolescents on these terrible consequences that occurred from the Internet, they should begin to realize the importance of safety precautions and privacy settings.
Cybersecurity has become a growing cause for concern in the United States and indeed countries around the world. On February 9, 2016 President Barack Obama announced his Cybersecurity National Action plan (CNAP) to further the nations efforts to protect government agencies, citizens, and businesses from cyber threats domestic and abroad. However, cybersecurity is not a new issue in fact it is as old as the internet itself. With that said, I keep thinking back to that warm September day stained with the image of an enormous fireball engulfing our small TV set. This horrific day changed the course of history forever along with my future career path.
Many people think that they do not exist because they are usually in disguise but they exist. Predators are usually what people know as “catfish.” Catfish means someone uses another person’s information and pictures in order to talk to people younger or older than them. The effect on people based on online predators is becoming a horrible and terrifying thing. It seems that usually younger teens are the ones trusting someone whom they have never seen in person only online and in pictures.
Decades ago, people felt that cyber war was not a serious threat. However, in recent years, there have been numerous instances of cyber warfare that viewed as significant threats to security. In December 2010, a group calling itself the Pakistan Cyber Army
According to Indah Setyawati,Cyberbullying is an act intended to humiliate,intimidate,spread hatred and resentment in cybermedia. Currently cyberbullying occurs especialy among the teenagers. It obviously
CYBER CRIME Cybercrime is one of the fastest growing type of crime in our society today and have also been a serious problem since it causes a lot of damages and also affect us in different ways. But before I go further let me start by telling you the meaning of cybercrime, Cybercrime is different and more heinous than normal crime that we know. This crime is committed in an electronic medium and here means read is not a requirement and is done in secret Feldman(2013). Cyber war takes place largely in secret, unknown to the general public of crimes include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war, illegal monitoring. Secondly let me talk about the effect of cybercrime in our society today.