An Internet Risk Profile

The term "internet risk profile" refers to the compromise between convenience and safety in the contemporary age where using the internet is necessary for almost everything. When using online services, understanding your internet risk rating is crucial. This is because the internet should be regarded as a hostile environment because it is one. On the internet, there are many dangers, including hacking. There have been instances of Group E-compromised networks in the past. These threats necessitate the creation of an internet risk profile that can be used to defend oneself against online assaults. The essay concentrates on the critique of strengths and weaknesses of one's Internet risk profile. It goes on to discuss the best practices in cyber security that can be used to come up with the best internet risk profile. Then the paper will portray the newly revised profile and discusses ways to stay safe online. Finally, the paper discusses the steps that one has to take in case personal information gets compromised.


Keywords: Internet risk profile, Cybersecurity, and internet threats.


Internet Risk Profile


The internet ought to be treated as an environment that is hostile. Therefore, there is a need for services and websites proactive protection. It is advisable to assume that any service or sites are regularly scanned for vulnerabilities by individuals intending to exploit them. The high level of threat activity on the internet calls for alignment of individual efforts of management around the risk impact. Individual management levels should not be aligned to its perceived likelihood (New Zealand Government, 2015, para, 3). Further, several internet-based threats depend on opportunities. More so research shows that cybercrime has become personal. One out of five victims' believes that online fraudsters specifically targeted them (Mitchell, 2015, para.1).


A person's level of visibility directly propels the likelihood of the malicious actor making attempts to cause harm by identifying a threat. The internet environment is made unsafe by teenage vandals, curious college students, curious cyber-surfers, espionage agents, or criminals (Vacca, 2007, p.62). An individual accessing the internet is susceptible to threats such as information browsing, misuse of information, unauthorized modification, deletion, or information disclosure, misrepresentation, and penetration (RXN Editors, 2017, para.2). Cases of hacking are the most prevalent. Hackers aim to blackmail the person hacked or sell the information to the highest bidder. A good example of theft of information through hacking is the case of Yahoo e-mail breach by the Group E (Pauli, 2016, para.1).


Therefore, if it is this easy to breach large organizations and access confidential information, how much easier would it be to breach individual Web applications, networks or databases? This is one of the reasons why it is important to come up with an internet risk profile to help one remain safe while using the internet. I have personally been a victim of several internet scams. They left the victim angry and confused after the intrusion.


My internet risk profile


Device Most Used: Smartphone and Laptop


Connection Types: Wireless network access and third parties through the use of a modem


Most likely to Access: social media, Book holidays online


Security weaknesses: I do not use privacy settings when accessing the social media and have no idea where to get advice on online safety


Reason for worry: Hacking of webcams to steal personal images and identity theft


Crimes that gave me reason to worry: Continued cases of crimes of violence perpetrated by people met online


Most likely to fall prey to: Scams of fake tax rebate and tablet, phone, or laptop hacking


Impact financially: 50% of known victims lose money to as much as $ 1000


43% of known victims are bound to lose money


Impact emotionally: Feeling angry and violated


Strengths and weaknesses of the Internet Risk Profile


Many times, we assume that once we have determined the list of services we run online and the vulnerabilities we are likely to fall prey to we have conducted a risk assessment. The truth is, every single vulnerability identified could have three or more risks associated with it, and they all have different ratings for risk exposure (Wheeler, 2011, p.50). In this case, the internet risk profile is more of a vulnerability assessment and not a risk assessment. However, it has strengths in that it provides an outline of the Information and systems of information I am interested in protecting (Walt, 2002, para.5). In this case, it is clear I would like to protect my personal images from being stolen and misused as well as preserve my identity from being stolen. The only limitation is that after identifying the resources, I fail to come up with strategies to keep myself safe on the internet.


The second strength with my internet profile is that it identifies the monetary value to be a lot in case the resources were to be compromised. The weakness is that it fails to attach value to the resources that are vulnerable to internet threats. The other strength is that it identifies all the possible threats that the resources face (The State of Queensland, 2016, para.2). In this case, they are the fake tax rebate scams and tablet, phone, or laptop hacking. The only problem is that it does not outline ways in which the threats can be realized (Walt, 2002, para.6). However, it shows the possibility of their realization since there are continued cases reported of violent crimes for people who meet online. Finally, the Internet risk profile depicts how the threats would impact on my personal life are they were to be realized. For instance, if hackers were to access my databases then I would end up facing financial losses and feelings of anger and violation.


The best Internet Risk Profile


The first step in coming up with the best internet profile is conducting research on cybersecurity measures. Also, it is important to determine the ways in which your actions put you at risk and come up with ways to reduce the risk. For instance, it is important to realize that using free Wi-Fi is one way in which hackers manage to access your database. Hackers simply use attacks of "man in the middle" to lure people into using their fake networks. Once you have logged on then it becomes very easy to steal your information and in this case pictures. According to Caplinskas (2015), using VPN (Virtual Private Network) services can help one stay safe from Wi-Fi hackers because it masks your presence whenever you are online (para.3).


Further, it is important that whenever you are accessing social media platforms, you change your social media settings. Also, avoid posting so many photos that show your background to increase anonymity of your whereabouts. Make a point of altering your privacy settings to limit the number of people who view your posts. Ideally, you should limit the number to friends you know personally not those met online. Further, your direct connections should not be seen by everyone (Caplinskas, 2015, para.2).


On the threat of identity theft, one of the ways to stay safe is by minimizing the kind of information one shares via the internet. Information shared via the internet when exchanging files, purchasing, and networking increases a person's chances of falling prey to identity theft. Further, avoid exchanging home, telephone, mobile phone, or work telephone numbers via the internet even when you are passing the information to someone you consider your friend (Memiah Limited, 2017, para.15).


Steps to take when personal information gets compromised


It takes quite some time before the filter of information through the system takes place. This is why it is important to constantly monitor one's credit card and bank accounts as well as continually check your personal credit reports information. The sooner you get knowledge of your information being compromised, the sooner you can take steps to reverse the damage and stop the crime. The two steps one must take to stop any further fraud which may be the result of personal information theft (identity theft). The second step is come up with ways to reduce the theft effects and mend your damaged credit (Miller, 2008, p.34).


Revised Internet Risk Profile


Device Most Used: Smartphone and Laptop


Connection Types: Wireless network access and third parties through the use of a modem


Most likely to Access: social media, Book holidays online


Security weaknesses: I do not use privacy settings when accessing the social media and have no idea where to get advice on online safety


Security measures: Use of VPN services, use of social media privacy settings, installing internet spyware antiviruses and limiting personal information shared with the public


Reason for worry: Hacking of webcams to steal personal images and identity theft


How the crimes are perpetrated: Use of fake luring networks, accessing information shared through the internet, hacking or the use of Denial of Attacks


Crimes that gave me reason to worry: Continued cases of crimes of violence perpetrated by people met online


Most likely to fall prey to: Scams of fake tax rebate and tablet, phone, or laptop hacking


Steps to take once compromised: Stop any further fraud and come up with measures to reduce the damage and restore damaged credit


Impact financially: 50% of known victims lose money to as much as $ 1000


43% of known victims are bound to lose money


Impact emotionally: Feeling angry and violated


References


Caplinskas, M. (2015, February 24). 8 Simple Ways to Minimize Online Risk. Retrieved April 17, 2017, from Entrepreneur: https://www.entrepreneur.com/article/243233


Memiah Limited. (2017). How to stay safe online. Retrieved April 17, 2017, from Counselling Directory: http://www.counselling-directory.org.uk/staying-safe-online.html


Miller, M. (2008). Is it Safe? Protecting your computer, your business, and yourself online. Indiana: Que Publishing.


Mitchell, T. (2015, October 19). What's your cyber risk profile? Retrieved April 17, 2017, from Get Safe Online: https://www.getsafeonline.org/blog/whats-your-cyber-risk-profile/


New Zealand Government. (2015, May 22). Establishing a Risk Profile. Retrieved April 17, 2017, from New Zealand Government: https://webtoolkit.govt.nz/guidance/security-and-privacy-management/establishing-a-risk-profile/


Pauli, D. (2016, September 30). Security Analyst says Yahoo!, Dropbox, linkedIn, Tumblr all popped by the same gang. Retrieved April 17, 2017, from Security: http://www.theregister.co.uk/2016/09/30/fiveperson_hacking_gang_claimed_behind_breaches_of_3bn_logins/


RXN Editors. (2017). Risk Profiling. Retrieved April 17, 2017, from RXN: http://www.rxn.com/services/faq/internet/ISPTG-3.html


The State of Queensland. (2016, June 22). Benefits and Limitations of SWOT analysis. Retrieved April 17, 2017, from Business Queensland: https://www.business.qld.gov.au/starting-business/planning/market-customer-research/swot-analysis/benefits-limitations


Vacca, J. R. (2007). Practical Internet Security. New York: Springer.


Walt, C. V. (2002, June 11). Assessing Internet Security Risk, Part One: What is Risk Assessment? Retrieved April 17, 2017, from Symantec - Connect: https://www.symantec.com/connect/articles/assessing-internet-security-risk-part-1-what-risk-assessment


Wheeler, E. (2011). Security Risk Management: Building an Information Security Risk Management Program from the ground up. New York: Elsevier Inc.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price