Tech Topics: Privacy & Network Security
Tech Topics: Privacy
Privacy and cybersecurity go hand-in-hand, but the
concept of cyberprivacy is still new to many people. To most of the general
public, the idea of having privacy online means limiting the information one
shares. But the personally identifiable information that needs to be protected
goes far beyond what people intentionally put out there such as in social media
posts. An entire industry of data collection and analytics has grown out of
many company’s need to understand consumers and figure out what they want
without having to ask. Not all data collection is done with these optimistic
intentions though, social engineering has shaped a darker side to internet
privacy. Social engineering tactics are those that are used in “manipulating
human behavior to gain unauthorized access to sensitive information by
exploiting errors, behavioral patterns, and psychological tendencies. This deceptive
technique targets employees and consumers, often tricking them into revealing critical
credentials” (Happy, Asheshemi. 2025). In my experience in banking, social
engineering tactics are often used to gather banking login credentials or even
bank account information. These tactics can range from romance scams, promising
affection in exchange for the information they want to hostage scams,
convincing people that a loved one is in danger unless they can provide the
information they are being asked for. People will go to extreme lengths to
gather personally identifiable information, only further proving how valuable
our information and therefore privacy is.
Tech
Topics: Network
Security
Network
security is crucial to safeguarding data and privacy. Beyond standard practices
like firewalls and encryption, one of the most vital defenses lies in
preventing intrusions and quickly detecting anomalies. Prevention is key, but
the next step, detection, can be even more interesting. Intrusion detection
systems track activity patterns in a network and flag any behavior that
deviates from the norm. In a discussion on anomaly detection, researcher Gunay
Abdiyeva-Aliyeva explains how AI-based techniques are revolutionizing this
process, noting, “One of the major cruxes in Intrusion Detection Systems (IDSs)
is the detection of anomalies with great precision, together with reduced costs
of computation from the enormous volume of data to be processed”
(Abdiyeva-Aliyeva, 2023). The author goes on to highlight how AI-based
algorithms can analyze and detect unusual behaviors faster, more efficiently,
and more accurately than ever before. As these systems evolve, organizations
can respond to threats swiftly, protect valuable data, and maintain user trust,
all thanks to ongoing advances in artificial intelligence.
References
Happy, F., Asheshemi, O. N., & T., E. J. (2025). Human
Vulnerabilities in Cybersecurity:
Analyzing Social Engineering Attacks
and AI-Driven Machine Learning Countermeasures. Journal of Science
& Technology (1607-2073), 30(1), 73–84. https://doi.org/10.20428/jst.v30i1.2597
G.
Abdiyeva-Aliyeva, "AI-Based Network Security Anomaly Prediction and
Detection in Future
Network," 2023 11th International Symposium on Digital
Forensics and Security (ISDFS), Chattanooga, TN, USA, 2023, pp. 1-5.
Comments
Post a Comment