Discussion On Whether Global Use Of Internet Threaten Individual Security

When scientist invented computer the world started its journey towards digital world. Now all of the data are saved in a cloud. The first computer is known as Z1 made by German' Konrad Zuse' in his parent's living room it is considered to be first ever electro mechanical binary programmable computer. The world started its quest from Stone Age and now anything and everything is done on computers. Technology has been developed really fast in past years. These computers benefits us we can save some important files, information's on it instead saving them in manually but our information is not safe online.

Cyberbullying

In 2004 Mark Zuckerberg founded a website known as Facebook. To make an account you have to share some personal data on Facebook like your birthday or your gender. Sharing your gender and birthday is not a big deal but people take these as advantage and cyberbully the person especially the teenagers. No doubt Facebook has provided with privacy security but they are easily hackable. 'Facebook acknowledge that passively using social media may contribute to mental health problems but says engaging with others on its platform can relive depression and loneliness. Around 87 percent of teenagers reported cases of cyberbullying. The most victims were 19 year old guys. According to a blog on daily mail, online only sixty five percent of teenagers were bullied under cyberspace. Emma Jane Cross CEO and founder of charity beat bullying said many people were suffering in silence. 'Bullying both on and offline continues to be a serious problem for a huge number of teenagers and we cannot ignore its often devastating and tragic effects, ' She said.

Media psychologist, Arthur Cassidy said online there could be a massive impact of bullying on male teenagers life. The teenagers does not seek either teacher or parents help but suffer this abuse themselves and commit suicide. The suicide rate is high among this demographic. He said. Blog also stated percentage of cyberbullying on different website twitter was nineteen percent, BBM was thirteen, and ASK. FM was nine percent, BEBO eight percent and WhatsApp four percent. A blog published by Syed Zarar on 12 April 2017 about cyberbullying on pro Pakistani website. Digital rights foundation collect statistics on cyberbullying case which told us that Punjab has the highest number of internet abuse victims. Five thirteen queries were made via their helpline number in first four months of their mission. Sixty two percent were of women's.

On Facebook page of BBC they uploaded a video about a seventeen year old teenager Felix taking his own life because of cyberbullying. His mother told the interviewer that Felix was addicted to mobile phones and the internet. Felix has been the victim of cybercrime for four and on age of seventeen he jumped in front of the train and died. At night Felix would come downstairs and would check what people are saying about him, her mother added. BBC one mentioned in the video that in Britain teens spend eighteen hours on their mobiles. Bullying leads to different situations regarding the victim sometime the person suffer from different mental problems which leads them to suicide or victims cut them from social life.

Cyber bully should face a terrible fate. NGOs and the police of specific area should expose the bully in front of whole community. To prevent cyberbullying the person suffering from cyber bully should speak up and share their problem with their parents and friends. From parent's side they should keep check on their children mobile that who is messaging them and who calls them. Before checking your children mobile parents should ask them so a rift should not arose between parents and children. Parents should ask their children about their life and ups and down. They should ask about the changing moods and schedule from their children.

Hacking

Hacking is also the main problem and is the foremost reason of cyberbullying. There are three types of hackers white hackers, black hat hackers and the hacktivist hacker. A white hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hackers use their skills to improve security and expose black hat hackers. A black hat hacker is a person who attempt to find security and vulnerabilities for personal use or other dangerous reasons. Two of the more prominent are DEFCON and Black Hat and the last type of hacker are hacktivist or grey hat hackers. These hackers some time violate the ethics and laws but are not considered as dangerous as black hat hackers. On August three time of India issued a journal on which they told that an Indian hacker by name of Ne0-h4k3r the Pakistan government website. He posted a message about independence and Indian national anthem on the website. On 14 August 2017 several of Pakistani website were hacked including dozens of ministry websites a report on pro Pakistani stated.

Indian defense ministry website was also hacked and showed something on Chinese language on upper left before going offline, on sixth May 2018 sputnik issued reported online. Nirmala sithraman Indian defense minister tweeted that; Action is initiated after hacking MoD website. The website shall be restored shortly. Needless to say every possible step required to prevent any such eventually in the future will be taken. Nuix Black report surveyed 70 of the world's best professional hackers and 88 percent of hackers can break into any system and pass through cyber security within twelve hours or less. Additional twelve h ours are taken by 81 percent of hacker to collect valuable data.

Reports says:The firewall and ant-virus software does not stop the hacker from hacking into the computer website. The hackers say that most of effective way to stop them is the endpoint technology. However most of the hackers say that the tactics they use to hack are not the same. They first find the computer with weak password.

Studies found out that hacker became active by entering the network, from this they extract all the important information. Sometimes company cannot track that they have lost important data. Usually they found out when hacker is no more in the system. One third of the business never found out that they have been attacked.

It takes around 250 – 300 days to detect a data breacher. If they are detected. The attacker break in the system in less than 24 hours said Chris Progue, Nuix chief information security officer and co-author of Nuix Black Report. To ensure the security of the company you have to work from hackers mind and look out of the box for weaknesses. The company should be alert all the time.

Tracking

Another great problem of uploading personal information online is tracking. People upload there status on Facebook what are they doing where are they and with that they are providing their enemy's a chance to do something wrong with them for example theft. Now theft can be define in different ways theft is not of just things it can be of life and honorTracking is not always bad, I have asked a tracking company to fit in a tracker inside our car so if it get stole we could easily track it down by GPS in the car. So tracking is also used for safety. Online tracking is easy if you live in India and have Aadhar card now I will justify my statement. East India Company an account on YouTube run buy comedians. A person known as Angad Singh Rayal and his friends raised an important issue about Aadhar card introduced in India. It’s like an ID card but on information printed on paper with black and white ink. It is a twelve digit identity number code based on biometric system. He said anyone in India with your name photo address can make your aadhar card. As code is not check you can write any digits on it. In some area of India people took 500rs from citizens and made a copy of Aadhar card although government was making it for free. All of your information your home address, your contact number is uploaded online and is a search away. Angad said file filetype:xis on google will give you file of excel with contact of Indian citizens. Now people can easily can easily find your home address and track you. Your enemy can reach to your home anytime by just finding your whole contact online. CIA, FBI, and ISI the all track down the target by hacking into online data or phone locations.

Conclusion

Has global use of internet threaten individual security. In many ways yes there are lot of cases regarding this. As much we uses internet we became close to be a victim of any three things hacking tracking and cyberbullying. People don’t realize that how much their security is threaten when the share their biodata online. From the day I started writing this report several people would have been bullied and several people committed suicide because of depression caused by cybercrime. We cannot do much to keep our data safe online so we should not share personal information online. I think global use of internet threaten individual security.

15 July 2020
close
Your Email

By clicking “Send”, you agree to our Terms of service and  Privacy statement. We will occasionally send you account related emails.

close thanks-icon
Thanks!

Your essay sample has been sent.

Order now
exit-popup-close
exit-popup-image
Still can’t find what you need?

Order custom paper and save your time
for priority classes!

Order paper now