ITT 307 Personal Data Search
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
307
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by PeanutButterEater102
Personal Data Search
1
ITT 307 Cybersecurity Foundations
Personal Data Search
Personal Data Search
2
I attempted to use the PeekYou website located in our weekly resources, but there was a monthly fee for the report. I went with a free site called truepeoplesearch.com instead. I looked up my own information first and was surprised by how much data came up in the search. It listed my current address (which was right), my old phone number, a list of every single address I had lived at including months and year, my email address and possible relatives and associates. All of this information was free for the public to view, and I could even download a detailed background check for a small monthly fee. What was even more alarming was that some of the information listed is often used as security questions on certain websites and applications. I have included some screenshots below to show how easy it is to use.
Personal Data Search
3
The webpage was very easy to use, I just needed to put the first and last name of the person and
the city, state or zip code they live in or have lived in and hit the search icon. It gives you the ages of the person or people found and the current city and state they live in. When an individual goes online there is certain data left behind called a digital footprint. Some of this data left behind can include social media posts, emails, search history, interests and dislikes, ip address, and relationship status (Johnson, 2021). Even when we try to protect our digital footprint, information is still leaked for anybody to view. There are several attacks and threats that can expand a person’s digital footprint, the most common being botnets, phishing, Trojan Horses, malware, spyware and cyberstalking. Botnets are a group of several computers on the same network that, if hacked, could spread malware or viruses rapidly. Phishing is when a hacker uses a fake email or website that looks legitimate to steal personal information. Trojan Horses are the most dangerous on this list and difficult to detect. They can disguise themselves as authentic software undetected by antivirus software and records keystrokes while having the ability to delete files and spy through webcams. Malware is harmful software used by cyber criminals that is put on a device and can modify/delete files, send attack emails from your address, and reformat hard drives causing all data to be wiped (The Cybersmile Foundation, n.d.).
Cyber operations is a group of hired cyberspace personnel that perform certain functions like using geolocation to find people engaged in criminal activity, terrorist or insider threats, or to support intelligence agencies (NICCS, n.d.). A cyber threat is any act that attempts to damage or steal data and causes a disruption in digital life of an enterprise (Roy, 2021). Cyber law is the laws that apply to the internet and internet-related technologies and seeks justice for people committing cybercrimes against people, property, and the government (Upcounsel, 2022). Risk analysis involves identifying and fixing any issues that can result in a negative outcome to operations or projects. Threat mitigation is similar to risk analysis, but describes the tools and strategies companies use to identify and reduce the severity of a potential data breach or cyber-attack (Acrisure LLC, 2022). The last term, disaster recovery involves an organization’s method of recovery and response after a natural disaster or cyber-attack (Sullivan, 2021).
One of the most common and dangerous issues to internet users is cyber-stalking. Some examples include sending unwanted or frightening emails, texts or instant messages, tracking a computer or internet use, and using GPS or a locator to know the victims exact location (Fitzpatrick House, n.d.). In the state of Arizona people that are caught cyberstalking can face jailtime and a fine up to $2500, but varies from state to state. Cyber-stalking and bullying can create major issues to the victim
such as depression, anxiety, suicidal thoughts and fear to go online. From a Christian worldview the Bible teaches us to love one another, and the Lord wants us to treat each other equally and with respect. This means everyone should feel welcome to use the internet.
In conclusion, it is very important to protect personal data so it is not leaked or used in a cyber-
attack. Some ways an individual or organization can protect themselves from a cyber-attack include installing the most current updates and software, creating two step verification when possible, using a malware/antivirus protection software, enforcing firewall rules and creating strong passwords while changing them regularly.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Personal Data Search
4
References
Acrisure, LLC. (2022, September 2). What is Threat Mitigation in Cyber Security? https://www.acrisure.com/news-and-insights/what-is-threat-mitigation-in-cyber-security
The Cybersmile Foundation. (n.d.). Online security. Cybersmile – Cyberbullying. https://www.cybersmile.org/what-we-do/advice-help/online-security
Fitzpatrick House. (n.d.). Protecting Americans from cyberstalking. Congressman Brian Fitzpatrick. https://fitzpatrick.house.gov/protecting-americans-from-cyberstalking
Ja, A. (2021, July 18). Digital footprints and privacy concerns. Infosec Resources. https://resources.infosecinstitute.com/topic/digital-footprints-privacy-concerns/
Johnson, D. (2021, March 15). What is a digital footprint? How to protect yourself online, and keep your data from being used against you. Business Insider. https://www.businessinsider.com/guides/tech/what-is-a-digital-footprint
NICCS. (n.d.). Cyber operations. National Initiative for Cybersecurity Careers and Studies. https://niccs.cisa.gov/workforce-development/nice-framework/specialty-areas/cyber-operations
Roy, R. (2021, August 23). What is a cyber threat? Definition, types, hunting, best practices, and examples. Business and Industry News, Analysis and Expert Insights | Spiceworks. https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-cyber-threat/
Sullivan, E. (2021, May 26). What is disaster recovery (DR)? SearchDisasterRecovery. Retrieved January 27, 2023, from https://www.techtarget.com/searchdisasterrecovery/definition/disaster-recovery
Upcounsel. (2022, August 30). Cyber law: Everything you need to know. https://www.upcounsel.com/cyber-law