{"id":2185,"date":"2016-04-13T13:21:24","date_gmt":"2016-04-13T17:21:24","guid":{"rendered":"http:\/\/www2.hshsl.umaryland.edu\/hslupdates\/?p=2185"},"modified":"2016-04-13T13:21:24","modified_gmt":"2016-04-13T17:21:24","slug":"notable-tech-trends-cybersecurity-digital-privacy-and-online-surveillance","status":"publish","type":"post","link":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/?p=2185","title":{"rendered":"Notable Tech Trends: Cybersecurity, Digital Privacy, and Online Surveillance"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2186\" src=\"http:\/\/www2.hshsl.umaryland.edu\/hslupdates\/wp-content\/uploads\/2016\/04\/1techtrends-300x122.jpg\" alt=\"1techtrends\" width=\"300\" height=\"122\" srcset=\"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/wp-content\/uploads\/2016\/04\/1techtrends-300x122.jpg 300w, https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/wp-content\/uploads\/2016\/04\/1techtrends.jpg 549w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Cybersecurity is an interesting and important topic, one closely connected to those of digital privacy and online surveillance. Many of us know that it is difficult to keep things private on the Internet. The Internet was invented to share things with others quickly, and it excels at that job. Businesses that process transactions with customers and store the information online are responsible for keeping that information private. No one wants social security numbers, credit card information, medical history, or personal e-mails shared with the world. We expect and trust banks, online stores, and our doctor\u2019s offices to keep our information secure and safe.<\/p>\n<p>Keeping private information safe and secure is, however, a challenging task. We have all heard of security breaches at<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"http:\/\/money.cnn.com\/2015\/12\/02\/news\/companies\/target-data-breach-settlement\/\" target=\"_blank\">Target<\/a>,<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"http:\/\/www.bloomberg.com\/news\/articles\/2015-10-20\/sony-to-pay-as-much-as-8-million-to-settle-data-breach-claims\" target=\"_blank\">Sony<\/a>,<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"https:\/\/www.washingtonpost.com\/news\/federal-eye\/wp\/2015\/07\/09\/what-you-need-to-know-about-the-hack-of-government-background-investigations\/\" target=\"_blank\">the Office of Personnel Management of the U.S. federal government<\/a>, and even<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"https:\/\/www.washingtonpost.com\/local\/college-park-shady-grove-campuses-affected-by-university-of-maryland-security-breach\/2014\/02\/19\/ce438108-99bd-11e3-80ac-63a8ba7f7942_story.html\" target=\"_blank\">University of Maryland at College Park<\/a>. Sometimes, a data breach takes place when an institution fails to patch a hole in its network systems. Sometimes, people fall for a phishing scam, or a virus in a user\u2019s computer infects the target system. Other times, online companies compile customer data into personal profiles. The profiles are then sold to<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"http:\/\/www.cbsnews.com\/news\/the-data-brokers-selling-your-personal-information\/\" target=\"_blank\">data brokers<\/a><span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span>and on into the hands of malicious hackers and criminals.<\/p>\n<p>To prevent such a data breach, institutional IT staff are trained to protect their systems against vulnerabilities and intrusion attempts. Employees and end users are educated to be careful about dealing with institutional or customers\u2019 data. There are systematic measures that organizations can implement such as two-factor authentication, stringent password requirements, and locking accounts after a certain number of failed login attempts.<\/p>\n<p>While these measures strengthen an institution\u2019s defense against cyberattacks, they may negatively affect the usability of the system, lowering users\u2019 productivity. Security is important, but users also want to be able to do their job without being bogged down by unwieldy cybersecurity measures. The more user-friendly and the simpler the cybersecurity guidelines are to follow, the more users will observe them, thereby resulting in a secure system. Users who encounter cumbersome and complicated security measures, may ignore or try to bypass them, increasing security risks.<\/p>\n<p>Usability and productivity may be a small issue, however, compared to the risk of mass surveillance resulting from aggressive security measures. In 2013,<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\" target=\"_blank\"><em><span style=\"color: #393e37; font-family: Arial;\">the Guardian<\/span><\/em>reported<\/a><span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span>that the communication records of millions of people were being collected by the National Security Agency (NSA) in bulk, regardless of suspicion of wrongdoing. A secret court order prohibited Verizon from disclosing the NSA\u2019s information request. After a cyberattack against the University of California at Los Angeles,<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"http:\/\/www.sfchronicle.com\/bayarea\/matier-ross\/article\/Cal-professors-fear-UC-bosses-will-snoop-on-them-6794646.php\" target=\"_blank\">the University of California system installed a device that is capable of capturing, analyzing, and storing all network traffic to and from the campus for over 30 days.<\/a><span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span>This security monitoring was implemented secretly without consulting or notifying the faculty and those who would be subject to the monitoring.<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"http:\/\/www.sfchronicle.com\/bayarea\/matier-ross\/article\/Cal-professors-fear-UC-bosses-will-snoop-on-them-6794646.php\" target=\"_blank\"><span style=\"color: #393e37;\"><span style=\"font-family: Arial;\"><em>The San Francisco Chronicle<\/em><span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/span>reported<\/a><span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span>the IT staff who installed the system were given strict instructions not to reveal it was taking place. Selected committee members on the campus were<span class=\"Apple-converted-space\"><span style=\"color: #555555; font-family: Arial;\">\u00a0<\/span><\/span><a href=\"https:\/\/www.insidehighered.com\/news\/2016\/02\/01\/u-california-faculty-members-object-new-email-monitoring\" target=\"_blank\">told to keep this information to themselves.<\/a><\/p>\n<p>The invasion of privacy and the lack of transparency in these network monitoring programs has caused great controversy. Such wide and indiscriminate monitoring programs must have a very good justification and offer clear answers to vital questions regarding what exactly will be collected, who will have access to the information, when and how the information will be used, what controls will be put in place to prevent information from being used for unrelated purposes, and how the information will be disposed of.<\/p>\n<p>Because security is essential to privacy, it is ironic that certain cybersecurity measures can be used to greatly invade privacy rather than protect it. Because we do not always fully understand how the technology actually works or how it can be exploited for both good and bad purposes, we need to be careful about giving blank permission to any party to access, collect, and use our private data without clear understanding, oversight, and consent. As we share more and more information online, cyberattacks will only increase, and organizations and the government will struggle even more to balance privacy concerns with security issues.<\/p>\n<div><strong><span style=\"color: #555555; font-family: Arial;\">Bohyun Kim<\/span><\/strong>, Associate Director, Library Applications and Knowledge Systems<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is an interesting and important topic, one closely connected to those of digital privacy and online surveillance. Many of us know that it is difficult to keep things private on the Internet. The Internet was invented to share things &hellip; <a href=\"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/?p=2185\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-2185","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=\/wp\/v2\/posts\/2185"}],"collection":[{"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2185"}],"version-history":[{"count":1,"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=\/wp\/v2\/posts\/2185\/revisions"}],"predecessor-version":[{"id":2187,"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=\/wp\/v2\/posts\/2185\/revisions\/2187"}],"wp:attachment":[{"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.hshsl.umaryland.edu\/hslupdates\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}