In 2009 Chelsea Manning from the US army, leaked over 700,000 government Videos and documents, many of them being executions of terrorists. Online security is what the social media, databases, and banks need to use for holding all the info and passwords and such. Online security needs to go further and improve because hackers are busting in, bots are overflowing the service, and people have their identities stolen every day. Online security must change because of black hat hackers. First of all, a black hat hacker is a hacker that terminates servers with knowledge of a server, and many people get dosed by these hackers.
What should happen is that the security on the internet should be improved more. Right now the internets security options are lacking and making the public more open to hackers ¨Password-protected documents (33%) were ranked as the least effective security tool, followed by facial recognition (19%)¨ (Marketwire). Furthermore, there are multiple different types of these hackers and the public needs to be more opened up to these multiple hacker threats, which is why security on the internet should be more secure.
It’s good to know that there are three types of hackers Gray, White, and Black hat hackers. ¨……black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols….. …..white hat hackers can sometimes be paid employees or contractors working for companies…… ……Grey hat hackers are a blend of both black hat and white hat activities….¨ (Norton Security) This evidence clearly shows that there is a lack of protection from the colored hat hackers that run rampant.
On top of it, all identity theft is growing faster and faster.
For example, In 2009 – 2010 a US army member named Chelsea Manning leaked more than 700,000 government documents to WikiLeaks. Things she leaked were such as combat logs, diplomatic cables, and videos. People that do this suffer from terrible consequences such as prison internet access taken. “In August 2013, a military judge sentenced Manning to 35 years in prison” (Lawrance) In addition there is still a huge lacking of security in fraud and identity theft. These hackers can steal accounts for fraud, which is stealing online info or accounts for personal benefit or gain. But the public can also make new accounts for new banking accounts and such. “New-account fraud occurs when thieves use identifying data, which can include such information as Social Security “ (GAO reports 4) With all this in mind the conclusion is that theft of accounts and private information is happening even after all security changes. Spam bots are everywhere. Bots spam and overload servers with ads and viruses. Slowing down government computers and personal computers. On April 18th, 2009 an army of bots overflowed Dakota internet services “A Tucson-based Internet services provider was attacked with malicious software this week, disrupting online access for its roughly 5,000 customers.” (Dale) It is a simple but complex task to flood these bots on computers and networks, it’s about a 4 step process to do this. The bots use a peer-to-peer connection that has to infect the main component, which slows down the servers majorly. “These bots include P2P clients. They connect to a server that uses Gnutella, an open-source file-sharing technology….” (Geer 2) As you can see Botnets and bot servers are just openly available to the public which is why botting is such a threat to the companies that own networks. Cyber security is improving by the seconds though. Cyber security gets constantly changed and improved constantly every single day. Google makes new security keys constantly. Google’s current security key is called titan, which uses FDI and adds even more secure log-in options ‘ ‘Titan Security Key gives you even more peace of mind that your accounts are protected, with assurance from Google of the integrity of the physical key.’ ‘ (Lin) But hackers constantly find new ways to hack into the system and breach in, finding login information and more and more ways to ruin others.
In November of 2011, the public thought cell phones were almost completely secure. But they found a way in and did some online shopping. “Smartphone attacks mostly come in the form of malicious apps that phone users get enticed to download. Malicious apps steal personal information and send text messages to premium numbers,” (Acohido) With everything considered, network companies keep trying to fix cyber security but it never works, new tech and old tech keeps going outdated because of these hackers. Online security must be changed because it can get hacked by just a bit of research and debugged code. A hacker can just hack into the public’s internet like nothing since the security is constantly being broken (colored hat hackers). The public all has a name and face, but hackers can breach the code and steal all information in a snap. Cameras can be broken into super fast and the footage can be leaked, all because of bots looking at the computer’s code all in the little tiny camera. As time keeps going on more and more people get their identity stolen, the public doesn’t look at faces but looks at the text on a screen.