{"id":294,"date":"2025-06-28T13:34:15","date_gmt":"2025-06-28T13:34:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cwest1\/?page_id=294"},"modified":"2025-06-28T13:34:15","modified_gmt":"2025-06-28T13:34:15","slug":"hacking-humans","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cwest1\/it-cyse-200t-2\/hacking-humans\/","title":{"rendered":"Hacking Humans"},"content":{"rendered":"\n<p>BLUF<\/p>\n\n\n\n<p><em>This article by Julliete Rizkallah is about how we can use DNA as PII and the possible outcomes of DNA being digitized.<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">DNA as PII<\/h1>\n\n\n\n<p>Using DNA as PII would be the most secure way to authenticate a person as who they say they are. One drawback is that you can\u2019t change your DNA if it gets stolen, as secure as it may be, it&#8217;s not the best way to secure data in case of a breach. The possibilities are endless of things that criminals could do if they had access to a person\u2019s DNA, such as selling it or using it for criminal activity. There must be more security features available before people even start to think about using DNA as a way to secure information, because the negative outcomes outweigh the positives.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Hacking Humans<\/h1>\n\n\n\n<p>The morality of corporations having access to your DNA is something that will be debated as this issue becomes more real.&nbsp; The amount of privacy that humans have is decreasing by the day as innovations in technology become more advanced.&nbsp; Eventually, the hackers and bad actors will catch up to the innovations made; we must find different ways to secure information instead of DNA. There must be laws in place to help keep companies accountable for the storage of this level of PII and the proper consequences that come with it.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>The article by Juliette Rizkallah details the possible implications of using DNA as PII, and that it would be possible to \u201chack humans\u201d if it gets digitized.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<p>Hacking. (2019). <em>Hacking Humans_ Protecting Our DNA From Cybercriminals.pdf<\/em>. Google Docs. https:\/\/drive.google.com\/file\/d\/17vZTrd3tyRkIuXtLfYKSeZypU7WpCkmM\/view<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF This article by Julliete Rizkallah is about how we can use DNA as PII and the possible outcomes of DNA being digitized. DNA as PII Using DNA as PII would be the most secure way to authenticate a person as who they say they are. One drawback is that you can\u2019t change your DNA&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cwest1\/it-cyse-200t-2\/hacking-humans\/\">Read More<\/a><\/div>\n","protected":false},"author":30945,"featured_media":0,"parent":133,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/pages\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/users\/30945"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/pages\/294\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/pages\/294\/revisions\/295"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/pages\/133"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cwest1\/wp-json\/wp\/v2\/media?parent=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}