Cyber Smarts for Students
By William Tan, Abhishek Allamsetty, Jack Duvall and
()
About this ebook
Related to Cyber Smarts for Students
Related ebooks
Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet Rating: 4 out of 5 stars4/5Security in the Digital World Rating: 0 out of 5 stars0 ratingsHow Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Cybersecurity For Beginners: Learn How To Defend Against Online Threats Rating: 0 out of 5 stars0 ratingsLearn All About Cyber Safety Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsCyber Protect Your Business Rating: 0 out of 5 stars0 ratingsIT Security Concepts: 1, #1 Rating: 5 out of 5 stars5/5Digital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Ethical Hacking Rating: 0 out of 5 stars0 ratingsYour System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsRed Team Operations: Black Box Hacking, Social Engineering & Web App Scanning Rating: 0 out of 5 stars0 ratingsCoding Languages: Angular With Typescript, Machine Learning With Python And React Javascript Rating: 0 out of 5 stars0 ratingsEthical Hacking for Beginners Rating: 0 out of 5 stars0 ratingsHow Hackers Steal Wi-Fi Passwords and How to Stop Them: Hacking, #3 Rating: 0 out of 5 stars0 ratingsHacker School Trilogy: cyberhug.me, #1 Rating: 0 out of 5 stars0 ratingsPhishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Rating: 0 out of 5 stars0 ratingsCCNA Security Study Guide: Exam 210-260 Rating: 0 out of 5 stars0 ratingsThe Digital Mind Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsInternet Governance: The NETmundial Roadmap Rating: 0 out of 5 stars0 ratingsHow to Hack: A Beginners Guide to Becoming a Hacker Rating: 2 out of 5 stars2/5The Quick Guide to WordPress and Pinterest: Surviving the Social Media Revolution Rating: 0 out of 5 stars0 ratingsUltimate Penetration Testing with Nmap Rating: 0 out of 5 stars0 ratingsUnlock Your Path to Fame: A Comprehensive Guide on How to Become Famous Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown, law and disorder on the electronic frontier Rating: 0 out of 5 stars0 ratingsNetworking All-in-One For Dummies Rating: 4 out of 5 stars4/5Read People Like a Pro Rating: 0 out of 5 stars0 ratings
Addiction For You
Close Encounters with Addiction Rating: 5 out of 5 stars5/5Alcoholics Anonymous, Fourth Edition: The official "Big Book" from Alcoholic Anonymous Rating: 4 out of 5 stars4/5The Illustrated Easy Way to Stop Drinking: Free At Last! Rating: 4 out of 5 stars4/5Allen Carr's Easy Way To Stop Smoking Rating: 4 out of 5 stars4/5Dry: A Memoir Rating: 4 out of 5 stars4/5The Language of Letting Go: Daily Meditations on Codependency Rating: 5 out of 5 stars5/5Recovery: Freedom from Our Addictions Rating: 4 out of 5 stars4/5Drop the Rock: Removing Character Defects - Steps Six and Seven Rating: 5 out of 5 stars5/5Twelve Steps and Twelve Traditions Rating: 4 out of 5 stars4/5The 40 Day Dopamine Fast Rating: 4 out of 5 stars4/5Addiction, Procrastination, and Laziness: A Proactive Guide to the Psychology of Motivation Rating: 4 out of 5 stars4/5Daily Reflections: A book of reflections by A.A. members for A.A. members Rating: 4 out of 5 stars4/5We Are the Luckiest: The Surprising Magic of a Sober Life Rating: 4 out of 5 stars4/5Legally Stoned:: 14 Mind-Altering Substances You Can Obtain and Use Without Breaking the Law Rating: 4 out of 5 stars4/5Adult Children of Alcoholics: Expanded Edition Rating: 5 out of 5 stars5/5Breathing Under Water: Spirituality and the Twelve Steps Rating: 5 out of 5 stars5/5Summary of Atomic Habits: By James Clear - An Easy & Proven Way to Build Good Habits & Break Bad Ones Rating: 5 out of 5 stars5/5The Porn Myth: Exposing the Reality Behind the Fantasy of Pornography Rating: 4 out of 5 stars4/5Easyway Express: Stop Smoking and Quit E-Cigarettes Rating: 5 out of 5 stars5/5It's Not About Food, Drugs, or Alcohol: It's About Healing Complex PTSD Rating: 5 out of 5 stars5/5Stash: My Life in Hiding Rating: 4 out of 5 stars4/5More Language of Letting Go: 366 New Daily Meditations Rating: 5 out of 5 stars5/5The Porn Trap: The Essential Guide to Overcoming Problems Caused by Pornography Rating: 4 out of 5 stars4/5Euphoric: Ditch Alcohol and Gain a Happier, More Confident You Rating: 0 out of 5 stars0 ratingsUnderstanding the Twelve Steps Rating: 5 out of 5 stars5/5Repeat After Me: A Workbook for Adult Children Overcoming Dysfunctional Family Systems Rating: 5 out of 5 stars5/5Sex Addicts Anonymous: 3rd Edition Conference Approved Rating: 5 out of 5 stars5/5
Reviews for Cyber Smarts for Students
0 ratings0 reviews
Book preview
Cyber Smarts for Students - William Tan
World
Chapter One:
Privacy is Our Shared Responsibility
- Abhishek Allamsetty
Recent events focused an intense spotlight on online privacy and security. I thought I’d explore why it’s critical we not let this moment pass and just lapse into our normal complacency about these issues once the media thunderstorm passes.
Now more than ever, as our digital footprints grow exponentially, we need to take personal action to preserve our online freedoms. Why? The Internet benefits and belongs to all of us — thus it is our joint responsibility to protect it.
The benefits of the Web have, of course, come at some cost, one of which is a loss of privacy. We are also more vulnerable to data breaches and identity fraud. But there are many things we can do to minimize the risks of both.
The threat from hackers and cybercriminals has expanded in relation to our dependence on the Internet. As our reliance grows, opportunities for them to prey on us increase. Online data breaches are not new. They have been around since the creation of the first networks, but there is a risk that they could reach epidemic proportions — cyber fraud is currently the fastest growing category of crime in the U.S. — and eventually erode our freedom to use the Internet as we desire.
As with past epidemics what is required is a combination of collective and individual action. It is not that much different from how we have managed medical plagues in the past. When enough people stayed indoors, washed their hands or received vaccinations, certain diseases were wiped from the planet. It took some time to convince people to change their ways, but eventually as a society we worked together to inoculate ourselves from many epidemics.
Taking it back to the Web, we should think of our digital identities as susceptible to digital epidemics. Fifteen years ago, led by company IT teams, we started inoculating desktop computers with antivirus software. Now the battle has shifted to the cloud, and we have to start walling off our digital communications, much of which are now mobile. The more people that inoculate themselves from malware, spear phishing attacks or hacker intrusions, the safer we all are.
Think about it, once you establish barriers to unwanted intrusions you wall off the digital ailments that can spread so easily. Your online communications will be one less component in a botnet assault. Your email account or Facebook profile can’t be hacked to send a spear phishing request to a friend, colleague or business partner that could lead to a larger data breach.
Although I view the act of taking personal responsibility for online privacy and security as the single most important ingredient in stemming the tide of cybercrime, there is also a role for government and law enforcement. We’re in the midst of an interesting time as there aren’t comprehensive and functional data collection laws in the U.S. and only some countries have variations of privacy acts, laws, and initiatives.
In the past 50 years, there have been several Supreme Court decisions to guarantee our privacy rights — rights implied but not explicitly guaranteed in our Constitution. But much of the ongoing furor today is in response to certain agencies not abiding by such principles.
The ongoing NSA debate, tech giants advocating for transparency, medical identity theft, and even Google’s Street View wire-tapping snafu, however complicated they may be, illustrate one thing — online privacy and security are finally making headlines. So let’s leverage the conversation for constructive benefit.
The great struggles — racial equality, gender equality, equal opportunity, and today, universal health care, marriage equality and immigration reform — have all involved crucial dialogue between our government and its citizens. And ultimately a legislative agenda emerges to move society forward.
Of equal or even greater importance is whether or not we, the people, take action. We as individuals need to demonstrate that privacy and security in the digital realm is a top priority — that we are willing to take collective responsibility to protect ourselves from growing threats to our online privacy and freedom.
A Pew Research Institute study from this summer revealed that 86 percent of Americans have taken action to maintain anonymity online — deleting cookies, encrypting