blog




  • Essay / The different aspects of online security

    Young people aged 15 to 24 are spending more and more time online. The International Telecommunications Union (ITU) reported that 70% of young people aged 15 to 24 are online (International Telecommunications Union, 2017). One of the main factors that have made this possible are technological innovations such as smartphones, personal computers, and tablets that have made the Internet accessible virtually everywhere. The Internet being a vast source of information, it constitutes the most important and probably the most common reference tool. Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”? Get an original essay The curious nature of young people tends to bring out inappropriate behaviors when online, such as sexual indecency which results in exposure to pornographic material, radicalization, cybercrime. -bullying, viewing and disseminating indecent images of children. Broadband is increasingly mobile: more than 55% of the world's population accesses it via mobile devices. Mobile broadband subscriptions have grown by more than 20% annually over the past five years and are expected to reach 4.3 billion users worldwide by the end of 2017 (International Telecommunications Union, 2017). With this increasing access via mobile devices, largely via mobile phones, the threat to online security continues to grow. These threats range from data leaks, Wi-Fi breaches, phishing attacks, privacy violations, and espionage (Kaspersky Lab, 2017). It should be rightly assumed that young adults are therefore most likely to be affected by regressed or inadequate online safety. This literature review intends to focus on the different aspects of online security. It seeks to collect information from various resources and perform analysis of security issues. This literature review is compiled from a vast source of online information on the online behavior of young people globally. Specifically, it focuses on the risks young people face online and the mitigation efforts that can be introduced to secure mobile platforms. Online safety, also called Internet security, involves prevention, protection and deterrence from security risks associated with Internet use. any computer crime that can be published online (Scheff, 2017). According to the Institute's report on how parents viewed their children's safety online, only 37% of parents felt their children were safe. The remainder expressed concern that their children were somewhat or completely in danger while online (Family Online Safety Institute, 2014). This poses an urgent need for ways to secure young users and/or monitor their online activity. The main risks encountered online include phishing, Internet scams, malware, stalking, intimidation, obscene exposure, invasion of privacy and identity threat. Phishing involves the theft of user data or security credentials by operators who pose as trusted sources. These sources will acquire user information such as login details, credit card numbers, passwords, and other critical information. This information is then used to steal funds, steal identities, or make unauthorized purchasesby credit card (Norton, 2017). Time reported that MacEwan University in Canada unintentionally lost $10 million to a phishing scam in 2017 (Abrams, 2017). Phishing scams are estimated to have cost U.S. businesses half a billion dollars in 2016 alone, with the FBI investigating just over 22,000 incidents between December 2015 and December 2016 (Federal Bureau of Investigations, 2016). ). Social isolation occurs when young adults choose to build relationships on online social platforms rather than physically interact with friends and peers. While online relationships certainly have positive aspects, especially for young people who may face social isolation in one way or another, a growing body of research shows that heavy Internet use can indeed cause isolation. By [DS1] unconsciously allowing time spent online to replace one-on-one interactions with friends and family and spending their lives alone, glued to a laptop or phone, young people are missing out on real-world experiences that are not available in the virtual world. world. Social withdrawal can lead to anxiety attacks or other advanced psychological complexities such as social phobia, withdrawal, speech problems, and agoraphobia (Calm Clinic, 2017)[DS2]. Cyberbullying can also manifest itself on social platforms. Just like with social interactions in the physical world, they may also face “cyberbullying.” In a study of a sample of 5,700 young people between July and October 2016, 33.8% of all respondents reported having been confronted with cyberbullying (Patchin & Hinduja, 2016)[DS3] [DS4]. With this rapid growth in online interactions among young people, moral concerns in the form of indecent exposure, obscenities, and sexual predation are surfacing. Unwanted content and proposals for unsupervised access to technology mean young people have access to materials and situations they would not otherwise have access to. This also includes the possibility of young people becoming victims of sexual predation and pornography. It can also lead to sexual deviance as well as pornography addiction. It can also lead to sextortion as well as other crimes, including remote sexual assault (Wittes, Poplin, Jurecic, & Spera, 2016). lots of information about users. This is especially true in the context of many unverified applications that can be installed on phones and open the possibility of information leakage, including emails, phone numbers, social media accounts, GPRS locations, photos and other sensitive private information[DS5]. This has led mobile phone developers to invest in ensuring the security of applications in the market[DS6]. In 2016, Apple's interventions included requiring all apps in their marketplace, the App Store, to have Transport Layer Security (TLS), a data privacy and integrity protocol that ensures security between two communicating applications (Purcell, 2017). Symantec, in its 2016 Norton Cyber ​​Security Insight report, states that millennials are the most vulnerable when it comes to cybercrime, with 40% having been exposed to such crime within the year. The main form of transgression against them was password compromise, victims of phishing scams via email, instant messaging, text messages and chat rooms(Norton, 2017). Near field communication (NFC) uses wireless technology to send and receive information. as well as complete transactions on mobile devices through chip integration. This platform creates a virtual wallet when used primarily for transactions where it is interconnected with the credit card or bank. Unfortunately, this convenient means has been found to be exposed to risks such as eavesdropping by a third party, manipulation of the data contained in the chip as well as infection by viruses or worms. This leaves the user exposed to too many unforeseen risks and exposes them to losing data as well as funds when the attack involves money (Square Inc., 2017)[DS7]. The Guardian reported that “All WIFI networks” are vulnerable to hacking. (Hern, 2016). In the article, they reported that a Belgian security expert, Mathy Vanhoef, discovered gaps in the WPA2 wireless security protocol, which is the world's most widely used security protocol for WIFI connections. Some of the flaws he reported involved possible malware introduction and data manipulation. This is due to the possibility of decryption via a weakness called Key Reinstallation Attack (KRACK). Even though this WIFI flaw requires the attacker to be near the source and the WIFI network, it is still a process to follow. The General Data Protection Regulation (GDPR) is expected to come into effect across the board. of the European Union in May 2018[DS9]. As can be seen, the General Data Protection Regulation contains many provisions which are of particular importance for children and adolescents and their rights to participation and protection[DS10]. This includes, but is not limited to, the proposal that anyone under the age of 16 will now need parental consent to sign up for social media and other online services. If this happens, we could be one step closer to making young people safer online (Burges, 2017). Another approach would be for teachers and parents to understand the development of children's moral reasoning in the information age. Through consultative interaction with others, young people develop a framework for reasoning about moral issues which, consequently, shapes the individual's level of cognitive development. This means that young people will be able to build a basis for discerning and avoiding dangerous or even simply suspicious platforms and reporting any crude activity online. It's also helpful to have some general principles or guidelines for young adults and teens when live streaming on social media platforms. They need to continue to be kind to people online so that they are not the perpetrators of bullying and victimization when they are not the victims. They also need to be careful about what they share, as this can sometimes disclose very sensitive information. This can also be verified by keeping personal information private. It is also very important to check your privacy settings. Young adults also need to know how to report posts to avoid hate speech and insensitive posts. Passwords should also always be kept secure and secret. It should also be ensured that they never meet in person with someone they only met online and if they see something online that they don't like or find upsetting, they should have the courage to tell someone they trust. more young people are.