Question

In: Computer Science

While scraping user data from social media sites is not illegal, failing to secure this data...

While scraping user data from social media sites is not illegal, failing to secure this data after it has been collected poses a serious risk to the affected users as cybercriminals could use the information from the database to target them online. What are your recommendations to the online risk policy makers as you think it is a breach of PII (Personal Identifiable Information). Justify your answer. Explain the need for cybersecurity experts in such a case scenario.

Hackerssuccessfully infiltrated systems operated by the City of Baltimore this past May. The attackers encrypted data files and demanded a ransom in exchange for the decryption keys. Mayor Bernard C. “Jack” Young refused to pay and IT leaders were instructed to rebuild the municipality’s computer systems. City of Baltimore officials placed a price tag of $18 million on the estimated cost of the ransomware attack. In August, city leaders voted to divert $6 million of parks and recreation funding to IT “cyber-attack remediation and hardening of the environment,” according to the city’s spending panel known as the Board of Estimates. Now, Baltimore’s auditor told city officials that IT performance data was lost during the attacks, according to reports in the Baltimore Sun. Without backups of the locally stored data, the auditor is unable to verify some claims made by the IT department. This is the first notification made by City of Baltimore than data loss occurred from the attack.

Solutions

Expert Solution

The need or cybersecurity experts with respect to such a case scenario:

Personally identifiable information, also known as PII, is all and any data that could potentially be used to identify an individual and sometimes, even an organisation. Examples include Social Security number, driver’s license, bank account number, passport number, and email address, phone numbers etc.

Not all PII is equal in terms of importance or sensitivity.Some of them may be critically important to your identity. Often, identity thieves piece together a potential victim’s PII.

Internet, being one of its kind invention of humankind, has undoubtedly brought some significant amount of terror. We can see a constant increase in the number of cyber-attacks, there is a need for producing more and more experts in this field. Hence, we need more cyber security experts.

As we move furthur , with the advancement of the technology all the data is being stored in Cloud systems and if this is not protected properly , this data could easliy be hacked by attackers/hackers.The dependency of entire organisation's data on the internet increases the risk of data leakage by many folds.In such scenarios the need for cyber security increases at an exponential rate. To accomplish such tasks , we need highly professional and trained cybersecurity experts and specialist on whom the company can lay its trust on.

In the given scenario, Baltimore officials voted to transfer 6 million USD from a fund for parks and public facilities to help pay for the devastating impact of the May ransomware attack. According to the city's panel this funding will help in the "cyber-attack remediation and hardening of the environment".

The city of Baltimore was attacked by a ransomware called RobbinHood. All servers, with the exception of essential services, were taken offline and as a result it had a negative impact on the real estate market. The city of Baltimore was susceptible to such an attack due to its weak and obsolete IT practices, which included decentralized control of its technology budget and a failure to allocate money to fund cyberattack insurance.

Also they failed to allocate various cybersecurity experts and firewalls which could have prevented such an attack if not completely then also to some degree gain the access back from the attackers. With the technology we possess today it is of sheer importance that we invest in the security of data not only of the users but also of the platforms that the users trust dearly. This can be done by having cyber security experts as their job is to monitor, detect, investigate, analyze, and respond to security events, cybersecurity specialists protect systems from potential risks, threats, and vulnerabilities.


Related Solutions

While scraping user data from social media sites is not illegal, failing to secure this data...
While scraping user data from social media sites is not illegal, failing to secure this data after it has been collected poses a serious risk to the affected users as cybercriminals could use the information from the database to target them online. What are your recommendations to the online risk policy makers as you think it is a breach of PII (Personal Identifiable Information). Justify your answer. Explain the need for cybersecurity experts in such a case scenario.
1. How are social media sites affecting social influence?
1. How are social media sites affecting social influence?2. Why do companies sometimes target opinion leaders for marketing attention?3. Why is word of mouth so important for marketers?
Let’s talk about your social media habits. 1. What social media sites do you visit the...
Let’s talk about your social media habits. 1. What social media sites do you visit the most? How often and for what purpose? 2. After reviewing the categories of social media users, what kind of user are you? Explain. 3. Give examples of ads you see on social media sites. Are those ads influential in your purchase decision-making process? Post your response and comment on at least two other student posts.
5) a) Describe how social media differ from traditional commercial media and how they (social media)...
5) a) Describe how social media differ from traditional commercial media and how they (social media) redefine and extend the traditional three-party business model (producer, buyer or consumer, third parties) of commercial media. b) Use a social media platform of your own choice to illustrate ways by which social media redefine and extend the traditional practices of commercial media and the business models that commercial media have traditionally used.
Describe how social media differ from traditional commercial media and how they (social media) redefine and...
Describe how social media differ from traditional commercial media and how they (social media) redefine and extend the traditional three-party business model (producer, buyer or consumer, third parties) of commercial media. b) Use a social media platform of your own choice to illustrate ways by which social media redefine and extend the traditional practices of commercial media and the business models that commercial media have traditionally used.
a) Describe how social media differ from traditional commercial media and how they (social media) redefine...
a) Describe how social media differ from traditional commercial media and how they (social media) redefine and extend the traditional three-party business model (producer, buyer or consumer, third parties) of commercial media. b) Use a social media platform of your own choice to illustrate ways by which social media redefine and extend the traditional practices of commercial media and the business models that commercial media have traditionally used.
a) Describe how social media differ from traditional commercial media and how they (social media) redefine...
a) Describe how social media differ from traditional commercial media and how they (social media) redefine and extend the traditional three-party business model (producer, buyer or consumer, third parties) of commercial media. (1000 words) b) Use a social media platform of your own choice to illustrate ways by which social media redefine and extend the traditional practices of commercial media and the business models that commercial media have traditionally used. (1000 words)
One of the fastest-growing trends in employment is using social media sites during the job search....
One of the fastest-growing trends in employment is using social media sites during the job search. Locate one social media site and set up an account. Explore the site to discover how job seekers can use it to search for a job and how employers can use it to find job candidates. Summarize your findings.
Predicting High/Low user of Social Networking Sites among students A study was conducted to identify the...
Predicting High/Low user of Social Networking Sites among students A study was conducted to identify the variables which distinguish between heavy/light users of social networking sites among students. A questionnaire was designed for the purpose. The social networking sites considered for the study were Facebook, Orkut, Linked-in, Twitter, etc. the online survey was conducted on a sample of 61 students in the age group of 20 to 30. The collected response data is attached herewith in excel sheet. DATA Reference:...
How does social media differ from traditional media? How has social media changed consumer behavior?
How does social media differ from traditional media? How has social media changed consumer behavior?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT