Student Loses Online Identity After Being Hacked

1074 Words3 Pages

People every day uses technology in order to get their needs met. Basically everyone does pretty much everything with technology. For example, flashlights, compasses, calculators, watches, alarm clocks, portable game systems, and yellow pages. Here's the question, is the device connected to the internet secure? Is people's information safe from anyone hacking into user account? Is convenience more important than security? Years ago, nobody depended on these smartphones to do everything for them. What happens if all this goes out? There needs to be some government regulations for our cloud storage in order to protect us. There needs to be better security for accessing user personal information from cloud storage without someone breaking …show more content…

Such as, accounts, money, and user identity. YouTube is famous for video sharing. Ever seen a famous person that makes YouTube videos? Imagine what would happen if a user were to get hacked by someone watching that users YouTube videos. After observing an article that explains more in detail about this, it talks about how insecure the storage cloud storage really is. The title of this informative article, “Student Loses Online Identity After Being Hacked”, in which it talks about a student that was majoring in game design had encountered a problem online, due to someone taking his information. He was a sophomore at his local high school and had an extraordinary interest of making videos and uploading it to YouTube. He started uploading videos to YouTube when he was in seventh grade. Someone hacked his Google account. Not only that, he got locked out and could not get his online identity back. The hacker became him online. The hacker had access to his pictures, documents, PowerPoints and basically everything he provided to google. All users that use Google services are all connected to Google. If your account gets hacked it also affects the other accounts that Google owns, like YouTube for example. This hacker had access to his full name, his address, and other information that he provided on his Google account. This shows how in a second, someone can take all the users information that they have provided between people and the …show more content…

On the EBSCO database system, an article named, “Hackers Target Hospitals with “Ransomware”. In this article it talks about how the Hollywood Presbyterian Medical Center in Los Angeles and how hackers were trying to get $17,000. FBI states that there is a leap in cyber attacks. According to eds.b.ebscohost.com.proxy.jjc.edu, it talks about how nearly 90 percent of healthcare providers were hit by breaches in the past two years. Not only that, Criminal attacks in healthcare are up 125 percent since 2010, and are now the leading cause of data breach. The article claims that Cyber attacks against hospitals and doctors have doubled in the past five years. So user can clearly see that there is an increased number of cyberattacks. This shows that any device connect to the internet is not reliable and is vulnerable to cyberattacks. Ransomware attacks can be devastating for databases. The article claims that after the attack user have to make sure to disinfect after this event

More about Student Loses Online Identity After Being Hacked

Open Document