Protection is the key.
93% of breaches could have been avoided by taking simple steps, such as regularly updating software or leveraging modern cloud based solutions. Can you believe that breaches are easy to prevent? There is an old saying that “the best defense is a good offense”. It applies to the cyber security world too.
Advanced Security For Advanced Threats
CYSE 200T - Cybersecurity, Technology, and Society
I explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention was given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains.
Impact of Cybersecurity
The advancement of technology has guaranteed that it plays a significant role in our lives. We utilize it throughout the day as part of our everyday routine. This phenomenon demonstrates our reliance on ever-strengthened technology. Moreover, the digital revolution has transformed and continues to affect the world and our lives. Even though technological improvements have a positive impact on our lives, there is overwhelming evidence that digital technology might have a harmful impact on human behavior, ethics, and small businesses.
Human Behavior: Cyber Stalking/Cyber Harassment
According to Hazelwood and Magnin (2013), cyber stalking and cyber harassment have become widespread issues that demand criminologists’ and criminal justice experts’ attention. Although there are no nationwide assessments of the scope and pervasiveness of these crimes, research of various towns and universities raises concerns. The Department of Justice (1999) estimated that roughly 20% of stalking cases in Los Angeles and 40% of stalking cases in New York used the Internet as the medium for this criminal conduct in a discussion of the scope of cyber stalking. According to recent research, over 40% of college students have experienced cyberstalking at some time in their life (Reyns et al., 2012). Based on these figures, as well as the rising usage and availability of electronic gadgets, I think it is apparent that cyberstalking and cyber harassment deserve the criminal justice system’s attention.
Cyber Harassment (CH)
Cyber harassment entails tormenting, annoyance, terrorizing, offending, or threatening an individual over email, instant chat, or other means with the purpose of injuring that person. Harassing communications includes all aspects of conventional harassment, but also includes the use of technological devices to send messages that make a person feel personally targeted for damage. Creating a Facebook account in someone else’s name and using that profile to insult others is an example of CH. Additional instances of CH include sending improper text messages (e.g., of a frightening or sexual nature) or building a website with photo-shopped photographs of an uninformed individual engaged in sexual actions (Hazelwood & Magnin, 2013).
Cyber Stalking (CS)
Cyberstalking is defined as “the repeated pursuit of an individual utilizing electronic or Internet-capable devices” in its simplest form (Reyns et al., 2012, p. 1). Any unsolicited electronic messages that are threatening, coercive, or frightening are considered repeated pursues. In the end, stalking is a crime that causes the victim to feel dread, terror, intimidation, tension, or worry. The victim may lose a sense of control over his or her own life as a result of the stalker’s repeated nature, as the victim never knows when the stalker may emerge or contact him or her again. The stalker’s ability to access the victim at any time and from any distance undermines the victim’s feeling of security and can lead to a perpetual state of terror (Hazelwood & Magnin, 2013).
CYSE 200T
Ethics
The tremendous advancement of technology has created a slew of legal and ethical challenges that are unique to the twenty-first century. The legal and ethical challenges in technology are varied and complicated, ranging from personal privacy online to the acceptable use of new technology to copyright and intellectual property on the Internet. Because of the ever-changing nature of technology, new ethical and legal problems emerge regularly, posing challenges to both ethicists and legal practitioners.
The right use of technology is one of the most serious ethical dilemmas, which frequently becomes a legal issue. As technology progresses in its capacities, age-old ethical issues are highlighted and brought into the public eye. The progress of stem cell research, for example, has resulted in a slew of ethical and legal ramifications for scientists and governments that support it. Earlier advances in cloning technology sparked similar discussions over the meaning of “human” and the ethical responsibilities of the biological sciences. In the sphere of non-scientific technology, the creation of technology for military use has prompted concerns about the responsibilities that come with developing technology that might aid in the encouragement or escalation of war and genocide.
Given the pervasiveness of the Internet in people’s daily lives, privacy is a particularly contentious subject in technology. Many websites gather user data, ranging from usernames and passwords to personal information like addresses and phone numbers, without the users’ explicit consent. Selling this information should be seen as immoral, yet it frequently falls into a murky legal area because the data is provided by the user in the first place. Similarly, the use of Internet monitoring equipment in the classroom and workplace has created concerns about where the boundary should be drawn between personal Internet usage and public resource use. On a broader scale, the use of technology by certain governments to violate our privacy rights is a problematic legal and ethical issue that is being addressed in the legal systems of many nations.
Copyright and intellectual property rights are two other key concerns that have come to the fore with the advancement of technology. The emergence of the Internet as a publishing medium provided an arena in which copyright infringement became exceedingly easy, and for many artists, practically inescapable. Software piracy and the struggle of copyright holders to regain control of their intellectual property is a conflict that is waged on a daily basis both online and in court.
Main Points
The rapid advancement of technology presents a myriad of legal and ethical challenges, encompassing issues such as appropriate technology use, privacy concerns regarding data collection and government surveillance, and the ongoing struggle to protect copyright and intellectual property rights in the digital age.
New ethical and legal challenges arise due to the constant development of technology.
Privacy is a major concern.
Copyright infringement is an issue.
Small Businesses
As the National Institute of Standards and Technology (2016) stated, small businesses play a critical role in the economic and cyber infrastructure of the United States. There are approximately 28.2 million small businesses in the United States, according to the Small Business Administration. These enterprises account for over 46% of our nation’s private-sector output and 63 percent of all new jobs [SBA FAQ]. The Small Business Administration is in charge of defining small enterprises, which changes depending on the industry sector [SBA SBSStds].
Small business owners continue to underestimate their risk and overestimate their capacity to cope with cyberattacks, yet just one cyber attack can destroy a small business. According to a CNBC and Momentive survey, most small business owners greatly underestimate their chances of being hacked while grossly overestimating their capacity to respond to a cyberattack. Even though the majority of those business owners claim to have no cybersecurity or disaster recovery plan in place. The misleading perception that cybercriminals choose large business or government targets has contributed to this overconfidence. In reality, hackers are simply seeking insecure networks that may be readily penetrated, and small businesses are frequently targeted.
Moreover, even though cybersecurity is critical for organizations of all sizes, I believe many small businesses believe they are not at risk of cyberattacks because of their size. Consequently, they do not create or possess a security plan, nor do they invest in their security. Ways I would spend (invest) the limited funds:
- Improve Security System: Turning off superfluous services, for instance, can significantly improve security. Repairing one’s current security system can also keep hackers out of even the tiniest security flaws.
- Training and Awareness: Making employees aware of the potential for a cyber attack, as well as the potential consequences for the organization, as well as training them on how to prevent attacks, can help to minimize the threat level in the workplace. Set up time to thoroughly teach your personnel so that they know what to look for and how to respond in the event of an attack.
- Develop a Security Policy: It is critical to develop security standards for every element of one’s organization in order to defend one’s company against cyber attacks. These procedures should be part of your company’s overall strategy. As more and more sensitive data is held digitally, it’s critical that your policy addresses not only basic procedures like routine security audits and data backup but also newer concerns such as:
Social media security
Cloud computing
Internet of Things (IoT)
- Educate Employees: Employees are frequently uninformed of how hazardous their online behavior is. Train employees on best cybersecurity practices, as well as warning indications of a cyberattack and what to do if one occurs.
CONCLUSION
In conclusion, the internet has brought the globe smaller in many ways, but it has also exposed us to a plethora of malevolent influences that have never been so diverse and complex. The hacking world has developed at the same rate as cybersecurity solutions. Cybersecurity is critical in a world where fraudsters’ expertise and unrelenting attacks are unrivaled. There is a mountain of data that suggests digital technology may have a negative influence on human behavior, ethics, and small enterprises. Unfortunately, research into the impacts of cybersecurity has been both comprehensive and scarce, ranging from affecting human behavior, and small businesses to creating ethical issues. Reflecting on cybersecurity challenges in society, the analysis reviewed in this paper outlines problems and proposes some solutions. However, further research is needed to categorize the impacts cybersecurity has on society and develop effective solutions to address these challenges.
References:
Moore, M., (2021). Top cybersecurity threats in 2020. University of San Diego.
Cyber risks for businesses in Canada. EasyCover Canada. (2021). https://www.easycover.ca/blog/cyber-risks-for-businesses-in-canada/
Sourour, B. (2016). The code I’m still ashamed of. FreeCodeCamp.
Hazelwood, S. D. & Magnin, S. K. (2013). Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology. Vol. 7 Issue 2, p155-168. 14p.
Hoehe, M. R., & Thibaut, F. (2020). Going digital: how technology use may influence human brains and behavior . Dialogues in Clinical Neuroscience, 22(2), 93–97. https://doi.org/10.31887/DCNS.2020.22.2/mhoehe
Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant behavior, 33, 1- 25. https://doi.org/10.1080/01639625.2010.538364
JONAS, H. (1973). TECHNOLOGY AND RESPONSIBILITY: REFLECTIONS ON THE NEW TASKS OF ETHICS. Social Research, 40(1), 31–54. http://www.jstor.org/stable/40970125
National Institute of Standards and Technology (2016). Small business information security – NIST. Special Publication (SP). https://doi.org/10.6028/NIST.IR.7621r1
Erprose. (2021). Main street overconfidence: America’s small businesses aren’t worried about hacking. CNBC.
Stay connected.
Welcome to a platform where cybersecurity becomes more than a skill—it's a passion. Let's embark on this transformative journey together. Welcome aboard, Cyber Defender!