Personal Data Search
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
307
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
6
Uploaded by taquierra
1
Personal Data Search
Ta’Quierra Pittman
College of Science, Engineering and Technology, Grand Canyon University
ITT-307 Cybersecurity Foundations
Professor Gaviria
November 30, 2023
2
Personal Data Search
The Findings of Your Personal Data Search
While searching my name up in PeekYou, I found old addresses, phone numbers, email
addresses, social media sites and it even showed people I was related to.
The first step was typing in my
first and last name, I selected all
states because I’ve lived in 2
different states. Then press the
search button.
This is how the results screen will
pop up. It gave me several different
results, I clicked on the first one.
3
Security Threats and How They Affect Your Digital Footprint
With all of the information that can be found online just by searching up my name,
attackers could use this to gain information from my family members using familiarity and
gaining their trust. They could also use this information to impersonate me, by creating a fake
social media account and adding all of my friends from my real page. Another attack that could
be utilized on me is smishing. Smishing is a type of phishing attack, but instead of using emails
the attacker uses text messaging. The type of people that could possibly perform these attacks are
criminal syndicates. These threat actors could impersonate my bank by telling me someone is
trying to hack into my account, and I need to change my password, with a link attached. Once
the link has been clicked it could launch malware on my phone or record the new password, I
created for my bank account. There are many different ways that attackers can use your
information against you, and it has only become easier with the increased use of technology.
Definitions
Using the free version of the website,
a lot of the information is blurred out.
But, it is your information therefore
the little information you can see
shows you how accurate it is.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Cyber Operations
Cyber operations are defined as a range of actions executed within the digital realm to
safeguard, secure, or target computer networks, systems, or information. These operations can be
broadly categorized as defensive cyber operations (DCO) and offensive cyber operations (OCO)
(NordVPN, 2023).
Cybercrime
Cybercrime is any criminal offense that is accomplished using a computer. Such as social
engineering, trojan horses, viruses, malware, ransomware and etc.
Cyber Law
Cyber laws are used to govern how the internet should be used and also explains the
penalties that can occur if these rules are not followed. Just as the real world has laws and
consequences if they’re not followed, the internet does as well.
Cyber Threats
A cyber threat happens when a malicious attack is potentially being launched against
your computer.
Risk Analysis
A risk analysis is defined as the process of identifying and analyzing potential issues that
could negatively impact key business initiatives or projects. This process is done to help
organizations avoid or mitigate those risks (Yasar, 2023).
Cyber-Attack/Breach
A cyber-attack is a malicious attack by a threat actor to disrupt your network system.
Threat Mitigation
5
Threat mitigation is used when an attack has occurred, it is used to lessen the impact and
isolate the problem until it can be solved.
Disaster Recovery
A written plan for processing critical applications in the event of a major hardware or
software failure or destruction of facilities.
Legal Regulations to Combat Cyberstalking
From a Christian worldview regulation to combat cyberstalking should be rooted in the
principles of human dignity, respect and for the protection of others. One way to do this is to
create laws that define cyberstalking as a criminal offense. Ensuring that there isn’t a gray area
where the cyberstalker can find loopholes will hopefully deter it from happening. Another
regulation that can be implemented is support for victims. Unfortunately, this isn’t a perfect
world therefore cyberstalking will happen. It is important for the victims to understand they have
a support system to help them through the process. Lastly, a regulation that holds offenders
accountable. If offenders aren’t held accountable, they will view what they’re doing as okay,
which is why accountability is important.
“Defense Against Attacks" Theory
One way to protect your digital identity is to always use strong password. A lot of people
use weak passwords that consist of their name or birthday, this can easily be guessed by
attackers. Another method to protect yourself is to always use two-factor authentication, I prefer
the method where they send a code to your phone instead of your email. You should also avoid
using public wi-fi when possible, if you have to use it install a good VPN.
6
References
Yasar, K., & Rosencrance, L. (2023, August 21). What is risk analysis?: Definition from
TechTarget. Security.
https://www.techtarget.com/searchsecurity/definition/risk-analysis
Cyber Operations Definition - Glossary. NordVPN. (2023, November 13).
https://nordvpn.com/cybersecurity/glossary/cyber-operations/#:~:text=Cyber
%20operations%20encompass%20a%20range,offensive%20cyber%20operations
%20(OCO).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help