Cyber Smarts for Students
By William Tan, Abhishek Allamsetty, Jack Duvall and
()
About this ebook
Related to Cyber Smarts for Students
Related ebooks
Network Attacks and Exploitation: A Framework Rating: 4 out of 5 stars4/5Personal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsSecurity+ Unlocked: Pass the Exam, Master Cybersecurity, and Launch Your IT Security Career Rating: 0 out of 5 stars0 ratingsSpeaking Their Language: The Non-Techie's Guide to Managing IT & Cybersecurity for Your Organization Rating: 0 out of 5 stars0 ratingsThe Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet Rating: 0 out of 5 stars0 ratingsCybersecurity: The Ultimate Beginner’s Roadmap Rating: 0 out of 5 stars0 ratingsWhat Happened to My Computer?: Tips and Short Guide For the Everyday PC User Rating: 0 out of 5 stars0 ratingsHow To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsA To Z of Internet: Everything You Wanted to Know Rating: 0 out of 5 stars0 ratingsA Big Security Fix and Performance Manual: The Essential Guide to Computer Security & Performance Rating: 0 out of 5 stars0 ratingsCyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsPCs For Dummies Rating: 0 out of 5 stars0 ratingsMalware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code Rating: 0 out of 5 stars0 ratingsTop Networking Terms You Should Know Rating: 0 out of 5 stars0 ratingsThe Network Security Test Lab: A Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsHow to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide Rating: 0 out of 5 stars0 ratingsDetained Rating: 0 out of 5 stars0 ratingsPractical Linux Security Cookbook Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Server 2012 Administration Instant Reference Rating: 0 out of 5 stars0 ratingsKali Linux for Beginners: A Step-by-Step Guide to Learn the Basics of Hacking and Security Testing Rating: 0 out of 5 stars0 ratingsRuby on Rails Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Rating: 0 out of 5 stars0 ratingsYour System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsSocial Media Frauds and Online Scams Rating: 0 out of 5 stars0 ratingsNo Degree No Problem! IT Career Guide from a Grad Who Knows You Don’t Need One Rating: 0 out of 5 stars0 ratingsDefending the Digital Perimeter: Network Security Audit Readiness Strategies Rating: 0 out of 5 stars0 ratingsFoundations of Information Security Based on ISO27001 and ISO27002 - 3rd revised edition Rating: 0 out of 5 stars0 ratingsSocial Security For Dummies Rating: 4 out of 5 stars4/5
Addiction For You
Dry: A Memoir Rating: 4 out of 5 stars4/5Alcoholics Anonymous, Fourth Edition: The official "Big Book" from Alcoholic Anonymous Rating: 4 out of 5 stars4/5Recovery: Freedom from Our Addictions Rating: 4 out of 5 stars4/5Beautiful Boy: A Father's Journey Through His Son's Addiction Rating: 4 out of 5 stars4/5The 40 Day Dopamine Fast Rating: 4 out of 5 stars4/5Twelve Steps and Twelve Traditions Rating: 4 out of 5 stars4/5Codependency For Dummies Rating: 5 out of 5 stars5/5Prozac Nation: Young and Depressed in America Rating: 3 out of 5 stars3/5Twelve Steps for Overeaters: An Interpretation of the Twelve Steps of Overeaters Anonymous Rating: 3 out of 5 stars3/5Drop the Rock: Removing Character Defects - Steps Six and Seven Rating: 4 out of 5 stars4/5Repeat After Me: A Workbook for Adult Children Overcoming Dysfunctional Family Systems Rating: 4 out of 5 stars4/5Close Encounters with Addiction Rating: 5 out of 5 stars5/5Out of the Shadows: Understanding Sexual Addiction Rating: 5 out of 5 stars5/5This Naked Mind: Control Alcohol, Find Freedom, Discover Happiness & Change Your Life Rating: 4 out of 5 stars4/5Adult Children of Alcoholics: Expanded Edition Rating: 4 out of 5 stars4/5Allen Carr's Easy Way to Control Alcohol Rating: 4 out of 5 stars4/5Legally Stoned:: 14 Mind-Altering Substances You Can Obtain and Use Without Breaking the Law Rating: 4 out of 5 stars4/5Sex Addiction 101: A Basic Guide to Healing from Sex, Porn, and Love Addiction Rating: 5 out of 5 stars5/5We Are the Luckiest: The Surprising Magic of a Sober Life Rating: 4 out of 5 stars4/5Emotional Sobriety II: The Next Frontier Rating: 5 out of 5 stars5/5Plain Language Big Book: A Tool for Reading Alcoholics Anonymous Rating: 0 out of 5 stars0 ratingsLet Go Now: Embrace Detachment as a Path to Freedom (Codependency, Al-Anon, Meditations) Rating: 4 out of 5 stars4/5Stash: My Life in Hiding Rating: 4 out of 5 stars4/5Addiction, Procrastination, and Laziness: A Proactive Guide to the Psychology of Motivation Rating: 4 out of 5 stars4/5Living Sober: Practical methods alcoholics have used for living without drinking Rating: 4 out of 5 stars4/5Emotional Sobriety: The Next Frontier Rating: 5 out of 5 stars5/5
Reviews for Cyber Smarts for Students
0 ratings0 reviews
Book preview
Cyber Smarts for Students - William Tan
Chapter One:
Privacy is Our Shared Responsibility
- Abhishek Allamsetty
Recent events focused an intense spotlight on online privacy and security. I thought I’d explore why it’s critical we not let this moment pass and just lapse into our normal complacency about these issues once the media thunderstorm passes.
Now more than ever, as our digital footprints grow exponentially, we need to take personal action to preserve our online freedoms. Why? The Internet benefits and belongs to all of us — thus it is our joint responsibility to protect it.
The benefits of the Web have, of course, come at some cost, one of which is a loss of privacy. We are also more vulnerable to data breaches and identity fraud. But there are many things we can do to minimize the risks of both.
The threat from hackers and cybercriminals has expanded in relation to our dependence on the Internet. As our reliance grows, opportunities for them to prey on us increase. Online data breaches are not new. They have been around since the creation of the first networks, but there is a risk that they could reach epidemic proportions — cyber fraud is currently the fastest growing category of crime in the U.S. — and eventually erode our freedom to use the Internet as we desire.
As with past epidemics what is required is a combination of collective and individual action. It is not that much different from how we have managed medical plagues in the past. When enough people stayed indoors, washed their hands or received vaccinations, certain diseases were wiped from the planet. It took some time to convince people to change their ways, but eventually as a society we worked together to inoculate ourselves from many epidemics.
Taking it back to the Web, we should think of our digital identities as susceptible to digital epidemics. Fifteen years ago, led by company IT teams, we started inoculating desktop computers with antivirus software. Now the battle has shifted to the cloud, and we have to start walling off our digital communications, much of which are now mobile. The more people that inoculate themselves from malware, spear phishing attacks or hacker intrusions, the safer we all are.
Think about it, once you establish barriers to unwanted intrusions you wall off the digital ailments that can spread so easily. Your online communications will be one less component in a botnet assault. Your email account or Facebook profile can’t be hacked to send a spear phishing request to a friend, colleague or business partner that could lead to a larger data breach.
Although I view the act of taking personal responsibility for online privacy and security as the single most important ingredient in stemming the tide of cybercrime, there is also a role for government and law enforcement. We’re in the midst of an interesting time as there aren’t comprehensive and functional data collection laws in the U.S. and only some countries have variations of privacy acts, laws, and initiatives.
In the past 50 years, there have been several Supreme Court decisions to guarantee our privacy rights — rights implied but not explicitly guaranteed in our Constitution. But much of the ongoing furor today is in response to certain agencies not abiding by such principles.
The ongoing NSA debate, tech giants advocating for transparency, medical identity theft, and even Google’s Street View wire-tapping snafu, however complicated they may be, illustrate one thing — online privacy and security are finally making headlines. So let’s leverage the conversation for constructive benefit.
The great struggles — racial equality, gender equality, equal opportunity, and today, universal health care, marriage equality and immigration reform — have all involved crucial dialogue between our government and its citizens. And ultimately a legislative agenda emerges to move society forward.
Of equal or even greater importance is whether or not we, the people, take action. We as individuals need to demonstrate that privacy and security in the digital realm is a top priority — that we are willing to take collective responsibility to protect ourselves from growing threats to our online privacy and freedom.
A Pew Research Institute study from this summer revealed that 86 percent of Americans have taken action to maintain anonymity online — deleting cookies, encrypting email
