{"id":322,"date":"2025-04-29T03:23:43","date_gmt":"2025-04-29T03:23:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/?p=322"},"modified":"2025-04-29T03:23:43","modified_gmt":"2025-04-29T03:23:43","slug":"hacking-humans-analysis","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/2025\/04\/29\/hacking-humans-analysis\/","title":{"rendered":"Hacking Humans Analysis"},"content":{"rendered":"\n<p><strong>Summary<\/strong><br>        In \u201cHacking Humans: Protecting Our DNA From Cybercriminals,\u201d Juliette Rizkallah<br>addresses the increasingly grim outlook of cybersecurity threats to genetic data; emphasizing the<br>urgent need for stronger protective measures. A characteristic that makes genetic data especially<br>enticing for cybercriminals is that it is distinct and permanent. Once obtained, such information<br>is suitable for identity theft, discrimination in employment or insurance, and highly focused<br>social engineering attacks. While several consumer genetic testing services exist today, many<br>organizations involved in handling genetic data fall short when it comes to security measures and<br>protocols, leaving that data open for breaches (Rizkallah, 2018). Rizkallah&#8217;s view is that robust<br>mechanisms, including encryption, strict access control, employee training, regular audits, etc.,<br>are required for the effective cybersecurity of genetic data. Furthermore, she also argues that<br>there should be stronger government regulations to protect genetic data from exploitation.<br><strong>Conclusion<\/strong><br>        Data protection is important these days in healthcare, ancestry research, and personalized<br>medicine with the rise in demand for genetic testing. When one considers DNA data without<br>proper cybersecurity measures, he\/she risks creating irrevocable exposure for themselves, which<br>potentially has heavy lifelong consequences. Organizations need to begin prioritizing security by<br>increasing encryption strength and regulatory compliance, while individuals should be careful with their genetic data-sharing decisions. Governments have a major role to play in implementing stringent policies against abuse. The future of genetic privacy also depends on all stakeholders acting to ensure that all genetic information can be secured against cyber threats.<\/p>\n\n\n\n<p><br><strong>References<\/strong><br>Rizkallah, J. (2018, November 29). Hacking humans: Protecting our DNA from cybercriminals.<br>Forbes. https:\/\/drive.google.com\/file\/d\/17vZTrd3tyRkIuXtLfYKSeZypU7WpCkmM\/view<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary In \u201cHacking Humans: Protecting Our DNA From Cybercriminals,\u201d Juliette Rizkallahaddresses the increasingly grim outlook of cybersecurity threats to genetic data; emphasizing theurgent need for stronger protective measures. A characteristic that makes genetic data especiallyenticing for cybercriminals is that it is distinct and permanent. Once obtained, such informationis suitable for identity theft, discrimination in employment&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/darlaeldridge\/2025\/04\/29\/hacking-humans-analysis\/\">Read More<\/a><\/div>\n","protected":false},"author":30589,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/posts\/322"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/users\/30589"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/comments?post=322"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/posts\/322\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/posts\/322\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/media?parent=322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/categories?post=322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/tags?post=322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}