Impacts Of Hacktivisms

Good Essays
With the onslaught of hacking and breaches in privacy by groups ranging from hacker cults to the NSA, individuals and corporations must take steps to protect themselves and their data to prevent any further damage.
The impacts of coordinated hacking attacks are widespread and can affect any online services: ranging from PayPal to Sony’s PlayStation Network. A team of hackers, especially one with global support such as Anonymous advocate a policy called “hacktivism”. The concept of hacktivism usually involves using illegal means to target single issues while gaining collective support by a team to proceed with such hacks (Kelly, 2012).
The attack conducted on PayPal took place in December of 2010; a Distributed Denial of Service (DDoS) attack
…show more content…
The editor-in-chief of the website Julian Assange claims that the most “cost-effective” method to challenge widespread “governance by fear” is through a “worldwide movement of mass leaking (Curran, 2013).” These leaked documents are a necessity to those who are willing to pore over them to understand how government surveillance programs work. By understanding how these programs work, it becomes easier for citizens and corporations to protect themselves against needless invasions of privacy and spying. Having to scan through hundreds of leaked government documents is theoretically the first step in counteracting government surveillance; however, this cannot simply be done by every individual concerned with protecting his privacy. A simpler solution to this could be to use tools that can defend a user’s personal information and …show more content…
VPNs are used by people all over the world to protect their data over the internet. Similar to a proxy, A VPN works by allowing a paying user to connect to a server on the VPN provider’s end which then will connect to the websites and services that the user would like to use. This creates a layer of protection before user uses the internet, like a proxy, proving to be secure even on websites that do not use a HTTPS connection (Mason, 2002). Unlike a proxy, however, this connection to the VPN server is secured before the user even opens any other programs, thus being the reason why it is the most secure option in protecting data. This traffic can even be encrypted with up to the same level of security as an HTTPS connection. This VPN server can be located anywhere in the world, which can allow connections to websites that a user may not be able to access in his country. This also makes VPNs useful to network administrators who want to test the quality of incoming connections to their servers. VPNs can also be configured to allow for employees in a company to securely connect to the internal network of a company from anywhere in the world. This protects a company’s data, while allowing for employees to work from

Related Documents

  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher). These attacks can come in any shape or form over the internet and with the little regulation over cyber threats internationally it needs to be a constant cause for alarm for agents. Verizon showed its 2013 data breach investigation report that 95 percent of the advance attacks came through emails that were containing malicious attachments which gave the attackers a a stepping stone into the host networks computers and network devises which then exposed the valuable and/or private…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Encryption Of Cell Phones

    • 1692 Words
    • 7 Pages

    Users like having the ability to access and use applications at a moment’s notice. This means there will be more passwords and personal identifiable information stored on the phones. Encryption of website and / or an application is helpful for increasing safety. A user should use a secure close network when surfing the internet if possible. When a cell phone user is reaching out via Wi-Fi network it can be unsafe, ex.…

    • 1692 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Hacktivism Analysis

    • 1372 Words
    • 6 Pages

    Emile Durkheim 's theory which implies that crime serves a function in society. Crime is a very potent way to bring in acts of social change. Which is why hacktivism is such a big part of the computer hacking realm. Most computer hacking attacks are the cause of the governmental secrecy and human rights violation involving people from all over the world inside and outside of the interwebs. When a collective of society challenges the social norms by committing crime,such as these hacktivism groups.…

    • 1372 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    They may also perform tests and exposure assessments. • Cracker – Black hat A cracker gains unauthorized access to computer systems for personal gains with unethical intentions, such as stealing corporate data, violate privacy rights, stealing funds, etc. In the recent past, the official website of the government of Maharashtra was hacked on September 20, 2007. The state government took the help of the Cyber Crime Branch to investigate the case. The website contained detailed information about government departments, circulars, reports, and similar other important data.…

    • 1304 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Password Security Threats

    • 2482 Words
    • 10 Pages

    The purpose of a VPN is to secure the internet connection. It will make sure that all of the data that is sent o received while connected is encrypted and secure. Employees would have the option of connecting to the VPN from any places that offers access to the internet. Since the VPN is connected to a remote data center, users will have access to data even if they are not physically on the same local area network (LAN). Password…

    • 2482 Words
    • 10 Pages
    Decent Essays
  • Decent Essays

    Some countries have regulations in place that requires companies to have cybersecurity measures in place to protect the information of its customers. According to an article written by John Patrick Pullen in 2013 titled “How to Protect Your Small Business Against a Cyber Attack”, the following steps are some of the most important steps and are a must for every company to keep their assets protected. The first step in Pullen’s list is to encrypt the data, all the data that could mean potential harm to the company if an unauthorized person had access to it such as employee social security numbers, banks accounts from customers and employees. The second step in Pullen’s list is to implement security on the hardware. In other words, only the people that should have access to a company’s devices, such as the server room, should have access to them.…

    • 2526 Words
    • 11 Pages
    Decent Essays
  • Decent Essays

    When a person logs into a website, and the website states “Welcome back [insert username here]“ this is done with cookies. When a user logs into a website without the need to enter their credentials to allow access is also done with cookies. Cookies play an important role in our day-to-day activities online. The major issue with all of this convenience is that cookies are also used to track browsing habits of users. Which is a concern of many Internet users, because cookies can track Internet history, and companies’ hosting web sites can use these cookies to track exactly when the user visits and how often they visit their site.…

    • 1113 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Port Scanners are very useful in identifying open doors in which information can go in and out. They can be useful as well as harmful to networks, which is why it is seemly important that we know what ports are opened and closed. It’s important to understand that there is no way to stop someone from port scanning your computer, while you are on the Internet because when you access an Internet server it opens a port, which opens a door to your computer. However, there is software out there that can aid in the fight against port…

    • 1187 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Using cyber terrorism is a serious crime and should be stopped. The CIA group keeps track of this happening daily to stop people from hacking others email addresses or passwords. (csciwww.etsu.edu) More types of terrorism are: state sponsored, anti state, international, and domestic. They all involve with finding out information secretly by using terrorists groups. But terrorists focus on one part of a country at a time.…

    • 1184 Words
    • 5 Pages
    Decent Essays