ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

A Cyber Warrior's Relationship with Social Media (Thesis Paper Example)

Updated on September 23, 2015

What is a Cyber Warrior?

According to Technopedia, a Cyber warrior is “a person who engages in cyber warfare, whether for personal reasons or out of patriotic or religious belief…Cyber-warriors come in different forms, depending on their roles, but all deal with information security in one form or another.” These cyber warriors can battle on the front lines of computer security, either by defending or attacking other systems. In our modern day and age of social media, sites such as Facebook, Twitter, and Instagram can be used as weapons in cyber warfare.

Source

Common Social Media Websites

Website
Common Use
Facebook
Social networking with real world friends.
Pinterest
Link bookmarking tool.
Twitter
140 Character microblogging tool.
Yik Yak
A location based anonymous Twitter.
LinkedIn
Online resume that connects individuals with peers in similar careers. Can assist in gaining a job.
Tumblr
Photo heavy blogging.
Instagram
Photo sharing network.
Common social media sites and their uses.

Social media websites are websites in which users use electronic communication to social and share content via online communities. Popular social media communities include: Twitter, Facebook, Instagram, Pinterest, Reddit, and LinkedIn. The reoccurring theme throughout these sites are that a user can share snippets of their life or interests with “friends,” or “followers.”


Most users do not realize, or give much thought, to how much information they share through their accounts, or the significance of the information that they do share. Huffington post ran an article three years ago about information not to post on Facebook, this includes: full birth date, mother’s maiden name, address, vacation dates, when the user will be away from home, checking in at places away from home, over sharing information about work, posting about illegal or risky activity, phone numbers, children’s names, or pictures or videos that clearly show the layout of a home or valuable goods. These are things that many users continue to post, despite the fact that this information can be used to steal their identity, or cause harm to themselves or their family.

The dangerous information that we all leave behind.

Cyber warriors with nefarious goals in mind can use these pieces of information to steal user’s identities as well as physical property. Through hacking, “friending” a user, or simply accessing a profile that is not set to private a criminal can get to know a user’s habits, frequently places they visit, and history. It’s not difficult to find the answer to most security questions with the use of a Facebook or LinkedIn Profile and Google. For instance, “what was your high school mascot,” “what was the model of your first car,” “what is your mother’s maiden name,” and “what was the name of your first pet,” are questions that can be answered with a little digging from the “About” section of the profile, past posts, photos, videos, and tagged posts from friends.


In a New York Times article sprinted in 2010, they talk about the very real dangers of geotags. “Geotags are embedded in photos and videos taken with GPS-equipped smartphones and digital cameras.” Since the Geotag data is not easily seen, most people are unaware that it exists, or if they are aware, they do not realize 1) how easy it is to see or 2) how accurate the location it. Geotagging puts not just an online user’s privacy at risk, but also their safety.

Source

Everyday Cybercrime - What you can do.

However, all of these things can also be used for good. James Lyne talks about cybercrime in his TED talk, and during his lecture he warns about the importance safeguarding our actions in relation to technology. He shows how he can pinpoint where people have been, and where they live by the stored data in their phone that is shown when someone connects to a public WiFi network, and explains how viruses are uploaded via the internet.


The inspiring thing about his talk, was when he took the time to explain how through a collaborative project with many different agencies and many different types of cyber warriors, over the course of a year they were able to track down a ring of Russian cyber criminals. They tracked this individuals down purely online. By using a flurry of different types of technological clues, they tracked down the organization. One of the final clues that helped this vigilante group of do-gooders find the criminals was through one of the men’s wives. She posted (on her very public social media profile) plenty of information, as well as a telephone number associated with the case.

Lyne: Everyday cybercrime -- and what you can do about it

Therefore, it is essential for civilians to protect their information online, because not all cyber warriors fight for good. Our computers, iPads, iPods, and smartphones, makes us incredibly vulnerable to the wicked evils of cyber magic voodoo used by these nefarious cyber warriors. One second, a user can be scrolling along their Facebook page, checking up on their online friends, and then bam! They have been nabbed for multi-million dollar international cyber crimes because of the amount of personal information on a wife’s social media profile. The bottom line is that social media can be one of the most feared tools, and the one of the greatest weaknesses of a modern cyber warrior. Through geotagging, and information mining, a cyber-warrior can help bring justice or chaos.

Source

How concerned are you with your online security?

See results

Sources Referenced

Janssen, Cory. “Cyber-Warrior.” Technopedia. Accessed 4 October 2013.

Lyne, James. 2013 Feb. James Lyne: Everyday cybercrime -- and what you can do about it. Video file. Accessed 4 October 2012.

Murphy, Kate. “Web Photos That Reveal Secrets, Like Where You Live” New York Times Online. Published Aug 2010. Accessed 4 October 2012.

Smith, Karen and Bosker, Bianca. “What Not to Post on Facebook.” Huffington Post. Accessed 4 October 2013.

"Social Media." Merriam-Webster.com. Accessed October 4, 2013. http://www.merriam-webster.com/dictionary/social media.

© 2015 Haley

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)