One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1276265
Date de publication 2019-08-21 13:00:00 (vue: 2019-08-21 16:00:51)
Titre Cyberbullying and cybersecurity: how are they connected?
Texte guy who looks like he might be a cyberbully Image Source: Pixabay Cyberbullying and cybersecurity incidents and breaches are two common problems in the modern, internet-driven world. The fact that they are both related to the internet is not the only connection they have, however. The two are actually intimately connected issues on multiple levels. It may seem like an odd notion. After all, cyberbullying typically involves using technology to harass a person (often overtly), while cybersecurity involves preventing hackers and identity thieves from accessing information and then simply getting away without being caught. While the two have similarities in that they both involve malicious actors online, the motives are quite different. However, the points of connection between these two topics are worth exploring. Defining cyberbullying and cybersecurity When comparing terms like these, it can be helpful to lay out a definition for each in order to make sure everyone is on the same page. Cyberbullying is, simply put, bullying a person through technological outlets, such as social media or texting. Cybersecurity is the protection of sensitive data (and therefore people) using specific measures. Cyberbullying The modern world now knows that bullying can go beyond simple physical abuse; it can take place digitally as well. Cyberbullying can involve intimidating, deceiving, harassing, humiliating, and even directly impersonating a person. Since it takes place online, it also isn’t restricted to places like school or social gatherings. Due to the ubiquitous nature of the internet, cyberbullying can follow victims throughout every aspect of their lives. It also typically involves the common issue of cyberstalking. While it may be cute or entertaining to learn about a new friend or potential partner by following their goings-ons on Facebook, the issue of cyberstalking in a cyberbullying context is serious and is one of the key things that connect it to cybersecurity. From various levels of emotional abuse to stalking and even physical violence in extreme cases — such as that of Shana Grice in 2016, cyberbullying has a well-documented track record as a malicious and dangerous practice. Cybersecurity While cybersecurity is a broad topic, it’s worth taking the time to highlight some of the more specific areas of the practice that directly relate to the issue of cyberbullying. Identity theft is the poster child of cybercrime, and it’s a threat that’s used in cyberbullying often. In addition to defrauding an individual by accessing or opening new lines of credit in their name, cybercriminals may impersonate an individual for other motives. For instance, if a cyberbully is stalking someone else, they may hack into their user account on a game, an email address, or social media account in order to impersonate them. This allows them to get information from their victim’s friends and family or harass them. Another way a cyberbully can be a cybersecurity threat is by using malware to hack
Envoyé Oui
Condensat  smart 2016 ability about abuse abuse; access accessing account activities actors actually addition address addressed after again against alarms all allows also always another any anyone are areas arise aspect automated automatic aware away back being best between beyond birthday both breach breach: breaches broad bullying businesses call camera cameras can cases caught changing check child children clear click comes coming common communication comparing comprehensive confidence confused connect connected connection consider context counselors course create credit cultivate cute cutting cyberbully cyberbullying cybercrime cybercriminals cybersecurity cybersecurity: cyberstalking dangerous data date days deceiving defining definition defrauding device dialogue different digitally diligence directly disposal diverse documented doesn’t doors download driven due each edge effects else email emotional entertaining especially even every everyone exploring extra extreme facebook fact family finally follow following forgotten form fosters friend friends from front game gatherings get getting give goings good gps grice guard hack hackers happier harass harassing harm has have healthy help helpful highlight home honest house housed how however human humiliating idea identify identity image impersonate impersonating importance important improve incidents include includes including including: increase increased increases increasing increasingly individual information informed initials instance instead internet intimately intimidating involve involves isn’t issue issues it’s keep keeping key kind know knows lack laptop’s lay learn less level levels like likely lines link live lives location locking looking loved made maintain make malicious malware manage manifestations many may measures media minimize modern more most motion motives multiple must name naturally nature nearly never new not notifications notion now number odd often once one one’s ones online only ons open opening options order organize other out outdated outlets over overtly own page parents partner passwords patches people perhaps person personal phone physical pixabay place places point points poster potential practice practices precautionary premises preventing problem problems programs protection provides put quite receiving record regarding relate related relationship representative researching restricted right risk risks safe safety same scams scare school secret secure security see seem seems sense sensitive sensors serious seriousness several shana should similarities simple simply since situation smart social software some someone source source: speak specific stalk stalker stalking steps strangers strive strong such sure system tablet tabs tactics take taken takes taking target’s teach teachers technological technology terms text texting than that’s theft them then therefore these they’re thieves things threat through throughout time times tools topic topics track trusting two typically ubiquitous unknown unnerving updates upgrades use used user users using various victim’s victims violence way well what when will without world worth your
Tags Data Breach Malware Hack Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: