logo

Digital Revolution

Answering three short-essay questions based on the book 'Listening In' by Susan Landau, discussing the challenges and threats posed by the digital communication revolution to privacy and security.

6 Pages1052 Words131 Views
   

Added on  2023-04-21

About This Document

This article discusses the evolution of the digital communication revolution and the challenges it poses to society. It explores the factors contributing to the changes of the digital revolution and examines three major challenges to privacy and security. The author also provides recommendations for enhancing cybersecurity and protecting digital privacy.

Digital Revolution

Answering three short-essay questions based on the book 'Listening In' by Susan Landau, discussing the challenges and threats posed by the digital communication revolution to privacy and security.

   Added on 2023-04-21

ShareRelated Documents
Running head: DIGITAL REVOLUTION
DIGITAL REVOLUTION
Name of the Student
Name of the University
Author Note
Digital Revolution_1
1
DIGITAL REVOLUTION
1. In what ways has the digital communication revolution evolved faster than the ability
of society to keep pace with it? What are some of the factors that contribute to the
changes of the digital revolution?
The digital revolution is considered as the third revolution after the agriculture and the
industrial revolution. The first two revolution change the social and economic life and the
human force was a major part of it that provided direction for the revolution (Landau, 2017).
As the revolution is taking place, it seems that the computers, sensors, internets are becoming
an integral part, as much as it is threating to replace the human efforts although all these
technologies are being created by the human intelligence only.
The advancement in computers, smartphones and technologies such as sensor, internet
is making the social life more connected through applications such as Facebook, Twitter,
Instagram and other numerous social app being developed. Apart from this social app, there
is applications for any kind of service such as app for car booking, app for watching sports
and app for shopping and any other service that is required (Landau, 2017). Even agriculture
activities are being controlled by sensors, old telephones are being replaced by smart phones,
cash is being replaced by cashless transaction , taking connectivity and communication to a
whole new level.
However threat to privacy and data security leading to exploitation of personal data
and digital identity is showing that it is becoming difficult for the large section of the society
to keep up with the pace of the digital revolution. Incident like Apple FBI dispute regarding
access to the iPhone of a terrorist, 2014 attack on Sony pictures, hacking of three power
distribution companies in western Ukraine shows that while digital revolution making the
social life more connected, organized and developed, it is making the social life more
Digital Revolution_2
2
DIGITAL REVOLUTION
vulnerable than ever before threating the human race to be incompatible for the digital
revolution (Landau, 2017).
2. The digital revolution has created new challenges and threats to privacy and
security. Discuss in detail at least three (3) of these challenges.
Malware attack:
Here the hackers get access to the target computer or the target system through
injection of malicious software. Once the software is installed in the target computer or
system the hacker then get complete access to the system and steal whatever data the hackers
require including personal and financial data such as credit card information (Landau, 2017).
In 2009, Stuxnet, a Natanz-specific malware was applied to exploit the centrifuges in Iran.
The Stuxnet malware applied "zero-days" vulnerability to execute the cyber crime and this is
not often known to the software developer due to its advance and shophisticated technology.
Network exploitation:
Here the hackers get access to the primary computer network to get access to the main
server to which each of the computer is connected. Once access to the server is established, it
then becomes possible to retrieve data from each of the computers (Landau, 2017). This is a
popular method for hacking often considered by cyber criminals.
Botnet attack:
Here the computers are first arranged in a predetermined fashion for forming network
of compromised computers known as bot and the connection is known as botnet. Bots are
controlled by third parties or any individual hackers to transmit spam to the target system for
accessing valuable data from the target system through an organized cybercrime (Landau,
2017). The Russian Business Network, a criminal group, supported by the russian
Digital Revolution_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet, Mobile, Email and Cloud Security Threats and Strategies
|7
|2434
|409

Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT
|7
|1808
|461

Internet of Things: Privacy Issues and Contents
|9
|1402
|116

Internet of Things (IoT) Security: Real World Example, Solution and Conclusion
|5
|1410
|66

Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security
|11
|1381
|117

NIT2201- Digital Legacy & Privacy
|8
|2196
|474