Pros And Cons Of Cyber Warriors

840 Words2 Pages

According to Technopedia, a Cyber warrior is somebody who engages in cyber warfare. This could be for personal reasons or out of religious or patriotic beliefs. (Hub Pages, 2015) Cyber-warriors, depending on their roles, come in different forms. They all deal with information security in one way or another. Cyber warriors battle in the front line of computer security either by attacking or defending other systems. In modern days, cyber warriors can use social media sites such as Facebook, Instagram, and Twitter as cyber weapons. (Hub Pages, 2015, Para 1) People use electronic communication to share their contents via online communities in social websites. Some popular social media include Facebook, Twitter, LinkedIn, Instagram, etc. Many (Hub Pages, 2015, Para 2) Cyber warriors with bad intentions can use these pieces of information to steal users’ identity and case harms to their physical properties. Through hacking, by “friending’’ a user, or simply accessing the user’s profile that is not set to private, a cyber-warrior can learn about the user’s habit, frequent places the user visits, and his history. By the use of Google or visiting the Facebook or LinkedIn Profile, with little diggings from the “About” section of a user’s profile and looking at the user’s past posts, videos, photos, and tags from friends in social media, a hacker or cyber-warrior can easily learn about the user’s security questions like: “What’s your best friend’s name,” “Where did you first meet your wife,” etc. (Hub Pages, 2015, Para 3) A New York Times article published in 2010 talked about the real dangers of GPS-equipped smartphones or digital cameras have geotagging. Many users do not see geotags easily. In many cases, the users may be unaware of it. Even if the users know about the Geotags, the social media users may not realize how easily the cyber warriors can see and track the locations of geotag-enabled pictures and the videos and put the users’ safety and security at risk. (Hub Pages, 2015, Para 4) James Lyne, in his TED talk, once talked about cybercrime. Here he explained how through a collaborative project with many different agencies, the cyber warriors over the course of a year, were able to track down a Russian cybercriminal ring. The cyber warriors tracked down the individuals purely online. For this, they used different technological clues. One of them was through a criminal’s wife who put plenty of information online in social Media, including the phone number associated with the case. (Hub Pages, 2015, Para 5) Social Media provide rich opportunities for sharing interests with others and making new friends with people. Popular networks like Facebook and Twitter have facilitated interactions between hundreds and thousands of users worldwide today; but many do not realize that such social media, at the same time, have made many of those

More about Pros And Cons Of Cyber Warriors

Open Document