Need Help ?

Our Previous Samples

CYB 310 : 3-2 Lab Worksheet Assignment : Module Three Lab Worksheet ...

CYB 310 : 3-2 Lab Worksheet Assignment

Module Three Lab Worksheet 

CYB 310 : 3-2 Lab Worksheet Assignment : Module Three Lab Worksheet

Overview

These labs represent skills and tasks that a network administrator will routinely perform. It is extremely important for a practitioner to have skills in these areas to inform security policy and procedures.

Review your worksheet and complete the subsequent labs:

  • Performing a Denial-of-Service Attack from the WAN
  • Implementing NAT and Allowing Remote Access

 

CYB 310 Module Three Lab Worksheet

Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.

Lab: Performing a Denial-of-Service Attack From the WAN

Prompt

Response

In the lab section, “TCP Flood,” Step 11, include your name after the command prompt and take a screenshot of your name with the output from running the tcpdump command.

[Insert screenshot here.]

In the lab section, “HTTP2 Flood,” Step 16, add your name at the command prompt after you run the capinfos HTTP2capture.cap command. Take a screenshot of your name and the output for the total number of packets captured in the number of packets data.

[Insert screenshot here.]

How can the Low Orbit Ion Cannon (LOIC) tool be used in the daily work an analyst would do?

[Insert short response here.]

What are two examples of information the LOIC tool could retrieve?

[Insert short response here.]

 

Lab: Implementing NAT and Allowing Remote Access

Prompt

Response

In the lab section, “Understanding NAT,” Step 27, take a screenshot of the display of the output from the ping command executed in Step 8.

[Insert screenshot here.]

In the lab section, “Secure Remote Login,” Step 34, take a screenshot of the VPN window after logging in to the network.

[Insert screenshot here.]

What useful information can be retrieved using NMAP and Wireshark together?

[Insert short response here.]

Why would it be important to map the network using tools, such as NMAP and Wireshark, prior to configuring NAT?

[Insert short response here.]

 


READ MORE >>

CYB 310 : 3-1 Discussion: Denying DoS Attacks ...

CYB 310 : 3-1 Discussion: Denying DoS Attacks

CYB 310 : 3-1 Discussion: Denying DoS Attacks

One of the biggest assets of an organization is information. Stopping the flow of that information can be detrimental to a business. If your organization experiences a denial-of-service (DoS) attack, it may be at risk to lose customers, revenue, and reputation. It is challenging for organizations to report a cyber incident and, even when they do, what they publish can be missing key facts to understanding the full attack picture.

For your initial post:

  • Find a resource outside of your assigned reading that describes a recent DoS attack. Post the link and summarize the attack for your peers.
  • Identify possible missing information from the resource that would help you prevent similar attacks in your organization.
  • Explain why there is no incentive for organizations to report these types of attacks.

In your response posts, is there any other missing information you can identify? Alternatively, what other steps could you take to protect an organization's data from a DoS attack?

 

Sample Post

Hello everyone!

One attack I was able to find some information is the DDoS attack on South Korea's Joint Chiefs of Staff (JCS) website on November 5, 2024, at approximately 5:30pm. 

Massive DDoS Attack Cripples South Korea’s Defense Site—North Korea or Russia?

Though it was affected initially, prompting an investigation from the Cyber Operations Command, the DDoS countermeasures were activated and allowed the site to remain operational for the public, though there were slower loading times and connectivity issues. The IP address was blocked, says a military spokesperson, and the department is focusing their efforts on finding the culprit responsible for the attacks. This attack is following a warning from the Korea Internet & Security Agency on October 1, which previously had alerted organization to increase cyber defenses in anticipation of an uptick of cyber threats, possibly due to the deployment of North Korean troops to Russia. People are speculating that the attacks maybe have originated from, or at least been linked to, North Korea or Russia. 

The article is unfortunately quite lacking on information, such as the countermeasures that were deployed to circumvent the attacks or if the website had protocols in place for responding to such cyber threats. It was incredibly difficult to find an article reporting recent DDoS attacks in the first place, let alone one with a lot of information. There are, however, many best practices to put in place to protect against DDoS attacks, such as prioritizing security over performance, bolstering your protection tactics, and embracing threat intelligence to stay ahead of potential attackers. 

There are quite a few reasons why organizations may not want to report on DDoS attacks. For instance, it could give a public perception of weakness for the organization, which could lead to an escalation of attacks. DDoS attacks are generally used as part of "stress" testing for servers, and if they report that the attack was successful in disrupting services, attackers could use that information to mark that organization as a viable target for future attacks. Additionally, there are no legal requirements to report such attacks, meaning most organization may opt to handle the problems internally to avoid the consequences that could result from disclosure. 

Thank you!

Sample Reponse

Hello,

Thank you for sharing such an insightful example! The DDoS attack on South Korea's Joint Chiefs of Staff is a strong reminder of the need for robust cybersecurity measures, especially amidst heightened geopolitical tensions involving North Korea and Russia. Another key piece of missing information is whether the organization performed a post-incident analysis to identify and address vulnerabilities exposed during the attack. Additionally, it would be valuable to know the scale of the attack, such as the traffic volume or duration, as this could provide insight into the attackers’ capabilities and intentions. Sharing more details about the countermeasures—such as traffic filtering or reliance on cloud-based mitigation—could also help other organizations enhance their defenses.

To prevent or mitigate DoS attacks, organizations can take several proactive steps. Implementing redundancy by distributing server resources across multiple locations can reduce the risk of single points of failure. Real-time traffic monitoring tools can detect and neutralize unusual patterns before they escalate. Rate limiting helps control excessive requests from individual users, while partnering with ISPs can block malicious traffic closer to its origin. Moreover, having a robust incident response plan, regularly tested through drills, ensures organizations can act swiftly and effectively. These measures, combined with international collaboration and information sharing, could significantly strengthen collective defenses against such threats. What are your thoughts on the potential benefits of increased transparency and cooperation between organizations in mitigating attacks like these?

Thanks.


READ MORE >>

CYB 310: 2-2 Lab Worksheet: Module Two Lab Worksheet. ...

CYB 310 Module Two Lab Worksheet

Overview

These labs represent skills and tasks that a network administrator will routinely perform. It is extremely important for a practitioner to have skills in these areas to inform security policy and procedures.

Review your worksheet and complete the subsequent labs:

  • The OSI Model
  • Network Troubleshooting
  • TCP/IP Protocols – The Core Protocols

Prompt

Complete the Module Two Lab Worksheet, which is linked in the Lab Worksheet assignment in Module Two of your course.

What to Submit

Submit your completed worksheet. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.

 

Module Two Lab Worksheet Word Document 

 

The OSI Model

Prompt

Response

What HTTP message type is used to request data?

[Insert short response here.]

Identify which flags are set in each of the three segments of the three-way handshake.           

[Insert short response here.]

What command can be used on a Windows machine to view the MAC address?

[Insert short response here.]

 

Network Troubleshooting

Prompt

Response

In the lab, “Troubleshooting a Suspected DNS issue Using CLI Utilities,” Step 11, type your name after the command prompt and take a screenshot of the output after running the nslookup command.

[Insert screenshot here.]

In the lab, “Troubleshooting a Suspected DNS issue Using CLI Utilities,” Step 14, take a screenshot of the webpage after correcting the URL.

[Insert screenshot here.]

What utility can be used to find out the IP address, subnet mask, and default gateway configured on a computer?

[Insert short response here.]

What is the function of the ipconfig/release and the ipconfig/renew commands?

[Insert short response here.]

What type of devices would be better served to have static IP configuration?

[Insert short response here.]

 

TCP/IP Protocols – The Core Protocols

Prompt

Response

In the lab, “Capture and Analyze Transport Layer Protocol Packets,” Step 10, take a screenshot of the output of the field details of the TCP segment.

[Insert screenshot here.]

In the lab, “Capture and Analyze a UDP Datagram,” Step 8, take a screenshot of the output of the User Datagram Protocol field details.

[Insert screenshot here.]

What type of packet is an ARP request?

[Insert short response here.]

What type of packet is an ARP reply?

[Insert short response here.]

 


READ MORE >>

CJ 4440: Discussion #1: Problem-Based Learning Scenario ...

CJ 4440: Discussion #1: Problem-Based Learning Scenario

Discussion #1: Problem-Based Learning Scenario:

Assume you are the incoming Secretary of the Department of Homeland Security, sworn into office on January 21, 2025. Based on your reading and knowledge about the lack of intelligence-related authority among federal agencies before the 9/11 terrorist incidents, which resulted in the enactment of the US Patriot Act and the creation of the Department of Homeland Security in 2003. Does your agency currently have the authority and essential tools available under the Patriot Act to investigate and monitor potentially radicalized American citizens on social media within the United States? The initial posting should outline the authority and investigative tools under the Patriot Act and other recent legislation to determine whether successful monitoring of individuals under the overall current national security strategy is effective within the United States.  A well-written initial persuasive argument will include at least three (3) different in-text citations and at least three (3) different references. Both replies to classmates or the Professor must have at least one (1) in-text citation and at least one (1) reference listed below the arguments.

 

Sample Post

Hello Eveyone,

The USA Patriot Act, enacted shortly after the September 11, 2001 attacks, granted federal agencies—including the Department of Homeland Security—expanded authority to investigate potential threats, including those arising within the U.S. The Act facilitates several key investigative tools, including the ability to conduct surveillance on individuals suspected of being involved in terrorism-related activities (U.S. Department of Justice, 2001).

Within the Patriot Act is the expansion of the Foreign Intelligence Surveillance Act (FISA), which allows surveillance of individuals believed to be engaged in espionage or terrorism-related activities. Under FISA, DHS can monitor communications and social media posts, particularly those involving foreign contacts or affiliations that could pose a national security threat (American Civil Liberties Union [ACLU], 2006). While FISA traditionally focused on foreign nationals, the broad interpretation of what constitutes "foreign intelligence" has allowed agencies to monitor U.S. citizens in certain contexts, especially if they are suspected of involvement in international terrorist organizations.

Despite these expanded tools, monitoring American citizens on social media raises significant concerns about privacy and civil liberties. The challenge for DHS is to balance its mission of protecting national security with the constitutional rights of individuals. The 2021 amendments to the Patriot Act and various judicial rulings have placed limits on certain surveillance activities, such as restricting warrantless monitoring of U.S. citizens (American Civil Liberties Union, 2021). Moreover, social media platforms like Twitter and Facebook now have policies in place to monitor extremist content, but these platforms often push back against government requests for data, citing privacy and free speech issues (Smith, 2020).

While the DHS possesses a robust toolkit for monitoring and investigating potential domestic radicalization through the Patriot Act and recent legislation, its ability to fully monitor radicalized individuals on social media must be carefully navigated.

References:

- American Civil Liberties Union (ACLU). (2006). *Surveillance under the USA PATRIOT Act*. Retrieved from https://www.aclu.org

- American Civil Liberties Union (ACLU). (2021). *Privacy and the surveillance state*. Retrieved from https://www.aclu.orgLinks to an external site.

- U.S. Department of Justice. (2001). *The USA PATRIOT Act: Text of the law*. Retrieved from https://www.justice.govLinks to an external site.

- Smith, S. (2020). *Social media platforms' role in combating radicalization*. *Journal of Cybersecurity Policy*, 13(2), 45-62.

 

Sample Reply

Hello [Classmate's Name],

You’ve provided a thorough overview of the USA Patriot Act's impact on surveillance authority. One area that stands out is the tension between security and privacy, especially regarding monitoring U.S. citizens on social media. The expanded surveillance powers under FISA indeed broaden the scope of DHS's reach, enabling them to track communications with foreign ties as potential risks to national security (U.S. Department of Justice, 2001). This increased oversight is crucial for preventing threats, yet, as you mentioned, it can raise civil liberties concerns, especially when it comes to warrantless surveillance. Social media platforms also have a role in this balance. While companies like Twitter and Facebook aim to prevent extremist content, they often prioritize user privacy, pushing back against requests for data without court orders (Smith, 2020). Striking the right balance is key for maintaining public trust in national security measures.

References

Smith, A. (2020). Social media and privacy policies: The pushback on government surveillance. Journal of Digital Rights, 15(3), 202-218.

U.S. Department of Justice. (2001). The USA PATRIOT Act: Preserving life and liberty.


READ MORE >>

CYB 260: 3-2 Worksheet Activity: Summation of Privacy Laws Part 2 ...

CYB 260: Legal and Human Factors of Cybersecurity

3-2 Worksheet Activity: Summation of Privacy Laws Part 2

3-2 Worksheet Activity: Summation of Privacy Laws Part 2

Overview

This assignment is the second of three activities where you will explore privacy laws that govern personally identifiable information (PII). Your completed table will include the following requirements:

  • A summary of the laws
  • Information about who the laws apply to
  • Who is responsible for ensuring compliance in an organization

It is important that you fill out this table using your own words because it will help you master the material. Since the descriptions will be in your own words, you are not required to cite the sources. This exercise introduces a small sample of laws. You will examine more laws in future course activities. By the end of Module Four, the completed table will be a great addition to your cyber playbook and provide a useful reference for Projects One and Two.

Prompt

Complete the Module Three Worksheet, linked in the What to Submit section, by filling in the three columns for each law provided in the table. The following information is required for your worksheet:

  • Briefly describe the law in fewer than 50 words.
  • Whose rights are covered by the law? Identify the main party covered under the law.
  • Who in an organization is responsible for ensuring compliance with the law? Identify the entity in the organization who is responsible for ensuring compliance with the law.

What to Submit

Fill in the required information directly in the provided Module Three Worksheet and submit it as a Word document. Use a file name that includes the course code, the assignment number, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.


READ MORE >>

3-1 Discussion: Ethical Dilemmas in Cybersecurity ...

CYB 260: Legal and Human Factors of Cybersecurity

3-1 Discussion: Ethical Dilemmas in Cybersecurity

3-1 Discussion: Ethical Dilemmas in Cybersecurity

For your initial post, develop a scenario that presents an ethical dilemma in an information security setting. Take this opportunity to develop a scenario that will stimulate a discussion on different approaches to privacy and ethical problems. The scenario you create should be realistic but unique. It’s okay to think creatively!

Your scenario will be more engaging and meaningful if it is plausible. Focus on typical events rather than rare occurrences or unrealistic characters.

  • Provide enough background for participants to see how the situation and policies could influence outcomes.
  • Leave enough ambiguity for participants to interpret unknown factors that might influence their approach.
  • Provide a clear question or decision for participants to address.

Review the following example of an ethical dilemma scenario, but don’t use it as your initial post.

Your IT administrator assigns the members of your department to perform the company’s yearly ethical hacking audit. During last year’s exercise, one of the IT engineers went outside the scope of the ethical hacking contract and accessed HR files. This was deemed a deliberate violation of the plan, and the employee was fired. However, the vulnerability to access the records was included in the ethical hacking audit report. Knowing that this vulnerability existed last year, how would you proceed in this year’s audit?

In your response posts, address the ethical dilemmas posed by your peers. Apply what you have learned from this module’s resources on ethical standards to justify your response.

SAMPLE SOLUTION

Hello class,

You are working as a security analyst at a local bank when one day you walk in and the whole office is silent and standing around a handful of computers. You walk over and see what everyone is looking at and notice that the homepage for the website and application have been change to a photo of a meme with giant red letters that say "LoLz HaCkEd". Everyone in the security team is called into a meeting and an audit is performed. It appears that a user was able to gain access to a developers backdoor and was able to change around the homepage. However, their does not appear to be a security breech, for now. Your team gets to work patching the holes in the network while working with the developers to close their doors in the code. Once your team is satisfied with the solution, someone finds a clue to who the perpetrator is. You see that they are local college student and have to decide if it is worth it to call the cops on this person, to handle it yourself and confront them or offer the young adult an internship to help you fix your security. 

Nicholas Allegra was once hired by apple after creating a jailbreaking app for the iPhone. He was also a young college student who created an application that could jailbreak iPhones to allow users to download apps for free or change their OS. Apple had a dilemma to either keep fighting the Nicholas, sue him or hire him and decide that hiring him was the correct choice. However, not everyone feels that way. Hackers like George Hotz who was sued for jailbreaking PlayStation 3's had his lawsuit dropped if he agreed to no longer bypass Sony's security and paid a fine. There are different ways to handle hacking scenarios and no one way is correct. 

References

https://www.smh.com.au/technology/iphone-hacker-golden-boy-hired-by-apple-20110830-1jj18.html

https://www.wired.com/2011/04/sony-settles-ps3-lawsuit/

SAMPLE REPLY

Hello ****,

Your scenario brings to light a fascinating ethical dilemma in cybersecurity. The situation you described, where a local college student hacked into the bank's website, presents several intriguing options. The examples of Nicholas Allegra and George Hotz illustrate the varying ways companies handle such incidents.

A best practice in this scenario would involve a thorough evaluation of the hacker's intentions and skills. If the student's actions were more mischievous than malicious, offering an internship could turn a potential threat into a valuable asset. However, this decision must be balanced with the need to uphold legal and ethical standards.

Your team's approach to patching the holes and collaborating with developers is commendable. Ensuring that such vulnerabilities are addressed promptly is crucial in maintaining the security and integrity of the bank's systems.

What factors would you consider in deciding between legal action and offering a constructive opportunity like an internship?

Thanks for sparking this important discussion!

 


READ MORE >>

CYB 260 : 2-2 Activity: Privacy Case Study ...

CYB 260: Legal and Human Factors of Cybersecurity

2-2 Activity: Privacy Case Study

2-2 Activity: Privacy Case Study

Privacy Case Study

Overview

As a cybersecurity analyst, you must be able to evaluate current scholarly articles because that skill will help you protect data. Evaluating privacy laws and regulations helps analysts form baselines for policies within organizations. Choose one of the case studies from this module’s resources to analyze for this assignment.

Prompt

After reading your selected article, address the following critical elements:

  1. Analyze the privacy issues addressed in the article.
  2. Describe the regulations or laws in the article that play a role in the protection of privacy.
  3. Explain your opinions on the conclusion of the article. Consider these questions:
    1. Is the conclusion comprehensive?
    2. Do you agree with the conclusion?
    3. Are there areas that could be improved upon?

What to Submit

Your submission should be 1 to 2 pages in length and use double spacing, 12-point Times New Roman font, and one-inch margins. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.

 


READ MORE >>

CYB 260: 2-1 Discussion: Convenience vs. Privacy ...

CYB 260: Legal and Human Factors of Cybersecurity

2-1 Discussion: Convenience vs. Privacy

CYB 260: 2-1 Discussion: Convenience vs. Privacy

Review the "Internet of Things: Convenience vs. Privacy and Secrecy" resource. Then create an initial post in which you consider the following questions:

  • As internet of things (IoT) devices become more widely adopted, to what extent are you willing to sacrifice your privacy for convenience?
  • Given your stance on privacy, what effect does the pervasiveness of IoT have on your choices as a consumer?

In your response posts, imagine that you are developing a new IoT device for a company. What aspects of privacy would influence your design based on the points your peers made in their initial posts?

Note: Privacy can be a highly personal topic. In your posts, remember to maintain professionalism. Focus on the topic and not on the person.

 

Sample Solution

Hello everyone,

Happy Monday! Internet connected devices are new and convenient. Since I have moved out of my parents house, there have been advancements in thermostats that I could not believe at first. When my husband and I moved into our house, the base thermostat was a Honeywell that had a few features but mostly just raised and lowered the temperature like our old apartment. When we invested in solar we were offered a google nest device which worried me. What if someone else gained access and controlled our temperature? What if the device lose connection and we cannot change the temperature? We live in Texas and that could be deadly for our dogs. My husband assured me that everything would be fine and we set it up. For the last 6 years it had run perfectly and we never had any issues. This summer has been different, the city has been changing our temperature on the thermostat and setting it to the upper 70's. We have a new baby and that will not work for us so we had to switch back to the Honeywell. We had to give up our convenience of changing the temp from our phone to having to change it manually so that we can use our thermostat as we need to. I think that the IoT can be incredibly useful and also scary to put your trust in a device to not fail.

The question of privacy vs convenience has also had me thinking. There are so many devices that make our lives easier like smart locks that allow you to come and go from your house or room without a key, you only need a passcode or fingerprint. Some locks even let you give one time codes to people like pet sitters so they can come in and walk your dog and then leave. However, the ease of these locks can also be their down fall. Before, we used to need keys to enter a house and these were not easily duplicated. The person trying to break in would either need to take your keys or make an impression of them to gain access. Now, a person only needs to watch you enter the code or know enough about you to guess what your passcode is. There is also the issue of having the lock die and you being locked out until you can get a battery to fix it. 

Finally, police body cams are important when they are used correctly. Body cams can show an unbiased video of what happened in a particular scenario. They are there for both the police officer and citizens safety. Just like if you get into an accident that is not your fault and you have a dash cam, the insurance can look at that footage and show/argue that it was not your fault and save yourself the struggle of determining fault. 

References

http://ezproxy.snhu.edu/login?url=https://heinonline.org/HOL/P?h=hein.journals/nclr96&i=1521

 

Sample Response 

Hello ****,

Your experiences with IoT devices like thermostats and smart locks highlight both the conveniences and concerns associated with their adoption. As a developer creating a new IoT device, I would prioritize user control and reliability. Your story with the Google Nest thermostat underscores the importance of ensuring robust security measures to prevent unauthorized access and maintain reliable connectivity, especially in critical situations like extreme weather conditions in Texas. Designing intuitive interfaces that allow easy manual override in case of connectivity issues, like your switch back to the Honeywell thermostat, would be crucial. Additionally, for devices like smart locks, emphasizing strong encryption and secure authentication methods would address the privacy and security concerns you raised about potential vulnerabilities and unauthorized access.

 


READ MORE >>

CYB 260 Module One Worksheet Activity: summation of Privacy Laws Part 1 ...

CYB 260: Legal and Human Factors of Cybersecurity

1-2 Worksheet Activity: Summation of Privacy Laws Part 1

CYB 260 Module One Worksheet Activity

Summation of Privacy Laws Part 1

Overview

This assignment is the first of three activities where you will explore privacy laws that govern personally identifiable information (PII). Your completed table will include the following requirements:

  • A summary of the laws
  • Information about who the laws apply to
  • Who is responsible for ensuring compliance in an organization

It is important that you fill out this table using your own words because it will help you master the material. Since the descriptions will be in your own words, you are not required to cite the sources. This exercise introduces a small sample of laws. You will examine more laws in future course activities. By the end of Module Four, the completed table will be a great addition to your cyber playbook and provide a useful reference for Projects One and Two.

Prompt

Complete the Module One Worksheet, linked in the What to Submit section, by filling in the three columns for each law provided in the table. The following information is required to complete your worksheet:

  • Briefly describe the law in fewer than 50 words.
  • Whose rights are covered by the law? Identify the main party covered under the law.
  • Who in an organization is responsible for ensuring compliance with the law? Identify the entity in the organization that is responsible for ensuring compliance with the law.

What to Submit

Fill in the required information directly in the provided Module One Worksheet and submit it as a Word document. Use a file name that includes the course code, the assignment number, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.


READ MORE >>

CYB 260: 1-1 Discussion: What Is Privacy? ...

CYB 260: Legal and Human Factors of Cybersecurity

CYB 260: 1-1 Discussion: What Is Privacy?

CYB 260: 1-1 Discussion: What Is Privacy

Introduce yourself briefly. Based on your own personal ideas and viewpoint, provide a definition of privacy. This definition can be based on any aspect of privacy.

In your response posts, compare and contrast your thoughts with those of your peers. Did anything influence your perspective?

Note: Privacy can be a highly personal topic. In your posts, remember to maintain professionalism. Focus on the topic and not on the person.

 

SAMPLE SOLUTION

Hello Everyone,

My name is ***** and I am a stay at home mom to a 6 month old. Before my baby was born I was a lead programming instructor for a local non profit that teaches low income students. Most of my work experience is in early childhood education and I would like to take the information I have learned to create resources to teach children safe practices online. In my free time, I love to spend time with my family, crochet and listen to audiobooks/podcasts. I also like to use my free time to create cosplays for my local conventions. 

Privacy is a personal topic, everybody is going to have their own preferences. For example, in the paragraph above, I did not name the city I live in or company I used to work for. This is information that other people might be comfortable sharing but I am not. When I was younger and the internet was younger, I used to be very active on social media and post about every thought I had. Over time I grew up and saw the downsides to the internet as it grew. Now, I prefer to keep the information about me limited and try to keep what I can private but also understand that its inevitable. Like I might not post photos of my family online often but my in-laws love to share photos of their grandchildren and policing every photo they put online would ruin our relationship. So I try to do what I can to limit it while accepting that there are some things out of my control. I also do not judge others who choose to live their life online. Another aspect of privacy is the information we give to businesses. Information like social security numbers, credit card information, etc. can end up online due to data breaches. It is important that businesses offer ways to opt out of sharing personal information and make sure there is adequate encryption and security set up. Privacy is something we should all be allowed to choose for ourselves and when we work in the professional world, the businesses we work for will decide what information they want private.

References

https://iapp.org/about/what-is-privacy/ 

 

Sample response

Hello ****,

I agree that the use of social media and the Internet can create conflicts of privacy, both individually and between real world relationships. My mother and father up until recently did the same thing, to the point where I had to explain to them that their complaints about "Big Brother" and being watched was largely due to the choices they were making about what to post. For example, they would be posting about a vacation we were on with a geotag, and then say that the government was monitoring them because all their ads would be for tourist locations and events occurring around us. They couldn't really see that they were practically walking around with a huge sign saying to advertise here. Also, my mother would shop online a decent amount, and in her spirit of saving money would go to sites like Wish or Temu that are known for data harvesting. These are commonplace now, but the average consumer typically doesn't care until an issue arises, such as someone stealing their credit card information. Good luck in this course, and best wishes to you and your family. 

 


READ MORE >>
WhatsApp