Abstract: I hope to research more on the cyber security, something like your information online, and people sell them out because of money. I want to dig in more to find what kind of information that companies sell out, and who do they sell it to?
Title: Cyber Personal Info
Background: On the news say, companies will sell people's personal information out to other, and I think it's a very immoral move to do. for example: Facebook uses information people provide — such as their age, gender and interests — to target ads to a specific audience. Although Facebook doesn't directly sell your data to outside parties, it does make money from it
Purpose: The goal of my project will be to know and understand more who do the companies sell data to, and what species information they give out. In my opinion, I think the success look will be getting most of the reason why companies selling out the information and who they mostly sell it to. Also, how do they sell it to not get find out.
Tool: I think I need to go on some website to research about it, and maybe if I can, interviewing some people will be a really good idea. Maybe some website is not credible enough, so I think interviewing some people will be a needed resource.
Impact: Since, Technology has come a long way. The advancement of technology has paved the way for much more development in the fields of medicine, transportation, economics, finance, and many more. Along with the multitude of benefits that came with the rapid growth of technology came some issues, one of which is cybersecurity. This will impact not just the people in HPA, also the people in this big community, because when we find out that how are those companies are selling our information, we can start to prevent it, or make something that can block it. The cyber security will be much safer for everyone in the community.
1. Start offline. – Keep your financial documents and personal records in a safe place at home. Make sure to only bring necessary identification cards, credit or debit cards, and insurance card when you leave your house. Don’t carry your social security card with you unless you will use it. When giving out information at work, the doctor’s office, or a commercial establishment, make sure to ask what they need it for, how they plan on protecting the information, and the consequence of not sharing the information. Destroy documents containing your personal information once you don’t need it anymore.
2. Be vigilant online. – Beware of e-mails that do not come from trusted sources. Do not enter your personal information into any forms online unless you initiated the contact with the website. Banks and other financial entities will never ask you for your personal information online. If you’re unsure, it’s best to contact the company themselves. Go to the company’s official website and contact them through their customer service.
3. Clean your hardware. – Before disposing of a computer or mobile device, make sure that you clear all of your personal information from it. Check user manuals or online resources about how to completely wipe your device. Make sure to delete all messages, contact details, call history, Internet browsing history, voicemails, and media like photos and videos before you dispose of the device.
4. Rules for passwords. – It’s best to have a longer password with a mixture of letters, numbers, and special characters; this will make your accounts harder to get into. Do not share your password with unverified sources. Try to change your passwords every couple of months to make sure that your data is secure.
- Limit what you share online. The less you share about yourself, the smaller the target you are for a phishing attack. Cybercriminals use information you post online to learn how to gain your trust.
- Protect your credentials. No legitimate company or organization will ask for your username and password or other personal information via e-mail. Your school definitely won't. Still not sure if the e-mail is a phish? Contact your IT help desk. (Many institutions now offer a "phish bowl" so end users can quickly and easily report phishy messages or view the latest scams.)
- Beware of attachments. E-mail attachments are the most common vector for malicious software. When you get a message with an attachment, delete it—unless you are expecting it and are absolutely certain it is legitimate.
- Confirm identities. Phishing messages can look official. Cybercriminals steal organization and company identities, including logos and URLs that are close to the links they're trying to imitate. There's nothing to stop them from impersonating schools, financial institutions, retailers, and a wide range of other service providers.
- Trust your instincts. If you get a suspicious message that claims to be from an agency or service provider, use your browser to manually locate the organization online and contact them via their website, e-mail, or telephone number.
- Check the sender. Check the sender's e-mail address. Any correspondence from an organization should come from an organizational e-mail address. A notice from your college or university is unlikely to come from ithelp@hpa.edu
- Take your time. If a message states that you must act immediately or lose access, do not comply. Phishing attempts frequently threaten a loss of service unless you do something. Cybercriminals want you to react without thinking; an urgent call to action makes you more likely to cooperate.
- Don't click links in suspicious messages. If you don't trust the e-mail (or text message), don't trust the links in it either. Beware of links that are hidden by URL shorteners or text like "Click Here." They may link to a phishing site or a form designed to steal your username and password.