• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Women's Legacy Project
  • Home
  • About
  • How To Curate
  • Our Collective Legacy
  • Writing Online Memoir
  • Blog
Women's Legacy Project > Blog > CREATE > Blogging & Writing > Hackers, and Security, and Databases, Oh My

Hackers, and Security, and Databases, Oh My

Written by: womenslegacy
Published: June 8, 2012 -- Last Modified: June 8, 2012
No comments yet

It is that time again, on steroids, and it is about as much fun as hemorrhoids.  Time to check my security settings on the website, tighten down the connections, and so on, with all the routine weekly checks, but the biggy today is to see what damage might have been done per  the Linked In data debacle.  http://mashable.com/2012/06/06/6-5-million-linkedin-passwords/
There is a big difference between having your personal account hacked and being a data point in a massive database breech.  There is very little you can do to protect yourself when you provide information to or create information for someone else’s database other than to limit any damage of that data being accessed to that one account.  In other words, do not reuse passwords.  Keep any data hack isolated to that one event.  If you do reuse passwords and one of the sites with that password is hacked, change the password on all the sites that used that password.  
The breeched accounts are already being used for phishing scams.  http://bits.blogs.nytimes.com/2012/06/06/that-was-fast-criminals-exploit-linkedin-breach-for-phishing-attacks/
Purdue University has a fairly good paper on the topic of password security. http://www.purdue.edu/securepurdue/pswdManager.cfm    Automated password keepers are often recommended by computer security experts.  But these are useless if you use the same passwords for multiple accounts.   http://www.purdue.edu/securepurdue/pswdManager.cfm
Most compromised data, logins, passwords, and the like are not personally motivated attacks.  I have had clients who thought that because they had nothing of “value” on their accounts that no one would want to hack them.  This is a dangerous misconception for two reasons.  
The first is that you may have more of value than you realize.  You can be individually targeted, although such personal attack is unlikely.  
The more likely scenario is for your information to be a few bits of data in a large scale theft of information in a database.  The database may contain information that can can be sold such as credit card numbers, links to other databases with financial information or pathways to that information.  
There is also the cyberwar that our governments are waging against each other, and we must presume that the massive accumulation, filtering, and storage of our personal data, by our governments in the name of national security can also be targets of attack by opposing governments.   
I’m sure I have oversimplified a very complex situation. I have covered some under-covered aspects of  hacking that can be confusing to people who have no need to know about databases or the backends of social media programs, but who can be impacted by abuse of those social media platforms that they use.  

Categories: Blogging & Writing

Support Independent Bookstores - Visit IndieBound.org
Previous Post: « My "Jump" Post
Next Post: Stream of Consciousness Notes from the Ron Barber GOTV Concert »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CommentLuv badgeShow more posts

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Footer

Recent Posts

  • Ending, and Beginning
  • For Our Daughters
  • Stand and Write
  • Context and Little Things
  • A Month is Just a Month… as Time Goes By
  • Processing Two Very Different Deaths
  • A Dehydrated and Delusional Friend Found Wandering in 100° Heat
  • About Women’s Legacy & Hill Research
  • Privacy Policy and Terms of Use

Archives

Powered by
  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter
View my Flipboard Magazine.

© 2023, Nancy Hill, Women's Legacy Project of Hill Research Services, LLC

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Reject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT