Unit 4 – Question 3

3. Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share online today. What information will hackers try to get in the future? What approaches do you think they will use?

The way we interact with the Internet has definitely evolved drastically with improvements made over the years. Instead of carrying around multiple devices for different purposes, data is now conveniently stored on the cloud, which is constantly updated via wireless connection. Gone were the days of copying files to floppy discs or chunky USB sticks to transfer data between devices, as it can be done with ease by one simple click. The risks posed here is therefore obvious. People figured out the way to hack into a device before, they certainly can work their way around getting access to photos and documents made abundantly accessible online.

In terms of public sharing, citizens of the modern society feel like they need to let their followers in on every detail. What I find most concerning is that they would share information of other people on those posts, particularly their children. The baby may not be of age to create a Facebook account yet, but worry not because their parents had done it and upload every photo from when they were born, revealing their changes over the years, where they hang out, which school they go to, and so on. This is particularly concerning because by the time they can start using social networking sites, they had had every inch of their life posted on the Internet, making them vulnerable to identity thieves.

I believe that with the advancements in technology and AI, especially in recent years, things can escalate so fast that hackers can easily tap into our devices and track our digital footprint, monitor our online presence, and even listen in on our phone calls. They could pretend to be us and use it to their advantage. Scams like this has happened, when a hacked account ask people in the friends list to send them an emergency sum, but it could get even more sophisticated when they can imitate our voice or even make a video call using Deepfake to convince our acquaintances. What’s even more concerning is that all the necessary technology for this is already available.

I have learned that in order to protect ourselves and others online, it’s important to think twice before sharing and constantly update our passwords, use two-factor authentication for our accounts.

+ There are no comments

Add yours