Sei sulla pagina 1di 2

Radya Farrel P (195150400111051)

Cyber Threat

S toring data online is becoming a habit that commonly used in nowadays society. Basically, it is
storing file in the cloud(internet). There are some significant benefits with using cloud data
storage, such as remote access from anywhere (as long there is an internet connection) and it
practicality to share your files, media, etc with others. The simplest type of cloud storage is uploading
something to a server and having ability to retrieve it again anytime you want to. The majority of cloud
storing services is protected with a two-factor-authentication protection so that your files will be safe
from anyone who wants to access your file without your permission. But the real question is, “Is our
private data well-protected?”.

Peter (2018, p.36) states that there are some dangerous security threats to cyber activity such as Data
phising, Trojans, Ransomware, Malware, DDoS, Data breaches, and many more. Take the “Data
Breaches” for example. In case you don’t know, there is a popular data breaches method that is
commonly used in hacker group because of its vulnerability. It is carding. Carding is a method that
breach an e-commerce website that stored their consumer’s credit card data in a certain file. When
the hackers found the file, they could do many things with that credit card such as buying things from
Amazon, send money to their Paypal, and much more without the actual credit card owner knowing.
This means that the threat to online data is real, and can attack us without us even knowing that we’ve
been attacked. Keith Moore (2018) in an article about cyber security states that “Any individual needs
a way to protect themselves against the ramifications of identity fraud to protect their personal
information being compromised. Savvy consumers agree that relying solely on business to protect
one’s personal information is naive, and no longer enough. Given the realities of our increasingly
complex, digital world, it behooves consumers to work to protect their privacy on their own”. This
means that trusting our data to some company is not enough because our data is vulnerable and risky
to be breached by the hackers.

On the other side, the threat to online private data is not only come from the hackers, it’s also came
from the company itself. As we already know, the big-blue-f-company, Facebook has been sued by it’s
costumer because they found a proof that Facebook is selling their costumers data to maximize the
advertisement engagement business in their app. This is proven by me personally. When I was just
saying to myself that I want to eat McDonalds tomorrow, suddenly an ad pops up in my phone, offering
the McDonalds Big Mac menu. This indicates that the app is listening to my voice and offering the ads
that suit my needs. Andrew Urbaczewsk (2018) when being asked about his opinion about the
Facebook scandal states that “As a university professor, I have to go to the Institutional Review Board
where we explain how we’re going to collect data and how we’re going to gather informed consent.
The consent has to be communicated in clear writing that the population will understand. They’re not
doing that in this case (Facebook scandal)”. It is clear that company that wants to collect private data
from it’s costumer should be asking for permission and the costumer should answer it thoroughly with
a consent.

In conclusion, we should aware about the possible upcoming threats that would dire our rights to
secure our private information. Gregory Morawietz (2018) suggests that in 2019, one of the most
significant threats will be organized groups. More attacks from state-backed hackers will take place.
Large-scale social attacks, trying to influence political or modern events. When it comes to his advice
on how businesses should prepare, Morawietz suggests: Buy a firewall, have a security policy, keep
strong passwords and read company’s privacy policy before agreeing.
Radya Farrel P (195150400111051)

Reference

 University of Denver 2018, accessed 21 October 2019,


<http://daniels.du.edu >
 Cyber Security Threat Journal, accessed 21 October 2019
<http://phoenixnap.com>
 Singer, P 2014, Cybersecurity and Cyberwar : What Everyone Needs to Know, 1st edn, Oxford
University Press, Britain.

Potrebbero piacerti anche