Personal Data Search

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

307

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

6

Uploaded by taquierra

Report
1 Personal Data Search Ta’Quierra Pittman College of Science, Engineering and Technology, Grand Canyon University ITT-307 Cybersecurity Foundations Professor Gaviria November 30, 2023
2 Personal Data Search The Findings of Your Personal Data Search While searching my name up in PeekYou, I found old addresses, phone numbers, email addresses, social media sites and it even showed people I was related to. The first step was typing in my first and last name, I selected all states because I’ve lived in 2 different states. Then press the search button. This is how the results screen will pop up. It gave me several different results, I clicked on the first one.
3 Security Threats and How They Affect Your Digital Footprint With all of the information that can be found online just by searching up my name, attackers could use this to gain information from my family members using familiarity and gaining their trust. They could also use this information to impersonate me, by creating a fake social media account and adding all of my friends from my real page. Another attack that could be utilized on me is smishing. Smishing is a type of phishing attack, but instead of using emails the attacker uses text messaging. The type of people that could possibly perform these attacks are criminal syndicates. These threat actors could impersonate my bank by telling me someone is trying to hack into my account, and I need to change my password, with a link attached. Once the link has been clicked it could launch malware on my phone or record the new password, I created for my bank account. There are many different ways that attackers can use your information against you, and it has only become easier with the increased use of technology. Definitions Using the free version of the website, a lot of the information is blurred out. But, it is your information therefore the little information you can see shows you how accurate it is.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Cyber Operations Cyber operations are defined as a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information. These operations can be broadly categorized as defensive cyber operations (DCO) and offensive cyber operations (OCO) (NordVPN, 2023). Cybercrime Cybercrime is any criminal offense that is accomplished using a computer. Such as social engineering, trojan horses, viruses, malware, ransomware and etc. Cyber Law Cyber laws are used to govern how the internet should be used and also explains the penalties that can occur if these rules are not followed. Just as the real world has laws and consequences if they’re not followed, the internet does as well. Cyber Threats A cyber threat happens when a malicious attack is potentially being launched against your computer. Risk Analysis A risk analysis is defined as the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done to help organizations avoid or mitigate those risks (Yasar, 2023). Cyber-Attack/Breach A cyber-attack is a malicious attack by a threat actor to disrupt your network system. Threat Mitigation
5 Threat mitigation is used when an attack has occurred, it is used to lessen the impact and isolate the problem until it can be solved. Disaster Recovery A written plan for processing critical applications in the event of a major hardware or software failure or destruction of facilities. Legal Regulations to Combat Cyberstalking From a Christian worldview regulation to combat cyberstalking should be rooted in the principles of human dignity, respect and for the protection of others. One way to do this is to create laws that define cyberstalking as a criminal offense. Ensuring that there isn’t a gray area where the cyberstalker can find loopholes will hopefully deter it from happening. Another regulation that can be implemented is support for victims. Unfortunately, this isn’t a perfect world therefore cyberstalking will happen. It is important for the victims to understand they have a support system to help them through the process. Lastly, a regulation that holds offenders accountable. If offenders aren’t held accountable, they will view what they’re doing as okay, which is why accountability is important. “Defense Against Attacks" Theory One way to protect your digital identity is to always use strong password. A lot of people use weak passwords that consist of their name or birthday, this can easily be guessed by attackers. Another method to protect yourself is to always use two-factor authentication, I prefer the method where they send a code to your phone instead of your email. You should also avoid using public wi-fi when possible, if you have to use it install a good VPN.
6 References Yasar, K., & Rosencrance, L. (2023, August 21). What is risk analysis?: Definition from TechTarget. Security. https://www.techtarget.com/searchsecurity/definition/risk-analysis Cyber Operations Definition - Glossary. NordVPN. (2023, November 13). https://nordvpn.com/cybersecurity/glossary/cyber-operations/#:~:text=Cyber %20operations%20encompass%20a%20range,offensive%20cyber%20operations %20(OCO).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help