Secure or Breached?
As technology is becoming more prevalent the manner in which we store information is changing. Gone are the days of information being stored into file cabinets. Instead information is stored in databases, a system of hard drives that stores information electronically normally accessible remotely. With this comes a rise in hackers and correspondingly a rise in security breaches, where hackers have access to sensitive information. Vulnerabilities are the root of all hacks. For businesses, they result in a decline in reliability. If an individual or a group wants to breach information, they will almost always find a way. With the increasing need for information databases, ...view middle of the document...
In 2014 another breach occurred, with the internet giant eBay. Fortunately, this breach only involved the theft of names, addresses, and dates of birth as well as manipulation of user passwords. In 2016 the largest data breach happened at Mossack Fonseca a panama law firm. The data contained information on wealthy people who invested money in fake companies in a tax evasion scheme. In the words of Lou Shipley a professor at MIT and writer for the Huffington Post the breach “sent shock waves around the world recently with the prime minister of Iceland stepping aside, Swiss authorities raiding the headquarters of the Union of European Football Associations, and relatives of the president of China linked to offshore companies”(Shipley). With breaches becoming more common its clear many are at a loss of what to do
Laws and Combating Cyber Crimes
With breaches becoming more common we are finding that the laws currently in place are not sufficient enough to protect victims and punish criminals. However, congress has been making strides in the right direction over the past few years. As of now most code is protected under the first amendment's free speech clause; meaning the writing of malicious code is protected. The use of such code is not protected under the first amendment and is a felony. However “it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce. Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.” (WGBH educational foundation) However, the odds of finding the creator of the malicious code are slim, making this penalty almost obsolete. Identify theft is protected under the Identity Theft and Assumption Deterrence Act but only discusses punishment of the violator. This is another law that does not clearly prohibit cybercrime. “It criminalizes identity theft and allows courts to assess the losses suffered by individual consumers” which does not specify the form in which identity theft must take place. Laws prohibiting and punishing cybercrimes are less effective when the root of the problem cannot be tracked. For as controversial as the topic is, there may not be laws in effect fully prohibiting cybercrimes to a full extent.
Motives behind the hack
Reasons behind a data breach are just as varied as the people who carry them out. Most hackers fall in one of three categories, white hat, black hat, and grey hat hackers. The white hat hacker is a person who hacks legally; no information is stolen or vulnerabilities exploited. Instead, white hat hackers are hired by companies to try and breach the security in place, they then inform said company of how they managed to bypass security masseurs in order to help patch exploits in the security. Then there is the black hat hackers, these hackers hack without permission for self-gain or for the challenge. They normally steal information like credit card...