1. Introduction Last year on October 12, Director of Central Intelligence of America (CIA) John Brennan’s American On-Line (AOL) e-mail account was hacked by a probable high school student. News of the incident was first reported by the New York Post after the teenager established communication with the newspaper the week before. Data breach activity took place against Brennan by the teenager who was social engineering to take control of Brennan’s AOL e-mail account. The hacker wasn’t working…
Introduction The rise of the internet has led to the creation of an industry based solely in gathering and selling mass amounts of user data. The companies who work in this industry are called data brokers. This term can be used to describe companies that only work in this business, such as Epsilon or Acxiom, but it can also be used to describe other companies that collect data like Facebook and Google. They collect and distribute information on consumers, and lately a lot of that collecting…
Freedom of Expression or Freedom of Invasion? From hieroglyphics, the printing press, to the computer, the concept of communication has been an integral part of society in order to express and spread ideas. With the vast advancements in technology and social media tools, communication has evolved into a far more immediate, efficient method for greater involvement in activities locally and globally. Clay Shirky, in “The Political Power of Social Media: Technology, the Public Sphere, and Political…
In Feed, symbols play a large part in portraying the theme of consumerism. They allow for more insight on how corporations can use their power to control most of the population. The most important symbol shown in the book is the Feed itself. Would having a computer connected to your brain that is constantly spamming you with advertisements cause you to buy whatever you see? The Feed is basically a computer that is attached to your brain. Many of the people in the book received it immediately…
privacy. State lawmakers have dealt with an array of privacy issues related to online activities. This web page documents state laws in a limited number of areas: website privacy policies, privacy of online book downloads and reader browsing information, personal information held by Internet service providers, online marketing of certain products directed to minors, and employee email monitoring. Additional digital privacy resources also are available from NCSL. In addition, other types of state…
Computer forensics plays a vital role in recovering and revealing the hidden clues. A very famous case is the BTK Killer where investigators had assisted the police to discover a serial killer, Dennis Rader, through a floppy disk that Dennis sent to the police. Investigators found within the documents implicated an author name "Dennis" at "Christ Lutheran Church". This evidence helped to lead to the serial killer's arrest. Sound like watching CSI? Yes, it is. By now, you should realise how wide…
How is our information being accessed? If you feel uncomfortable knowing how easy it access your internet history, there are more serious cases where computers have been hacked into, and the user has been completely unaware of the illegal activity happening at the time. What methods are being used to get this information? Well it’s quite easy actually. Here are just a few threats that put our internet privacy at risk: Cookie proliferation: The invisible cookie software agents that track your…
As the world increases its dependence on technology, it is inevitable that this technology is brought into voting machines. Electronic voting machines are a relatively new invention which allow voters to vote via a computer rather than a ballot sheet. Some people are uncomfortable with electronic voting machines either because of fear that they can be hacked or because of lack of electronic literacy; however, electronic voting machines should be used because of their easier and more secure vote…
Home Depot appropriately handled its data breach crisis through the company’s quick acting with an initial statement to the general public and through crisis management emails sent to its customers. In Home Depot’s initial statement spokeswoman Paula Drake reassured their customers that the company had been actively working with forensics and security teams since they had become aware of a potential breach (Li, 2014). According to W. Timothy Coombs, Ph.D. in his research paper Crisis Management…
Having an effective security system for your organization is one of the most critical issues that the government and businesses face in this new era of technology. Technology has become the pivotal point of everything; it is a part of daily lives. There was a time where your cellphone was just a phone, now it’s a portable computer that is able to monitor your movement and health status (Jones & Aiken, 2014). In a world where millions of computers are connected to the Internet and one time,…