How is Covid 19 Related to Cyber Security?

http://173.198.71.102:82

covid 19 relates to cyber security

The Coronavirus is hitting hard on the world’s economy, creating a high volume of uncertainty within organizations.
-people need money and will resort to criminal acts if they need to.

Cynet identifies two main trends – attacks that aim to steal remote user credentials, and weaponized email attacks:
-in the bout of corona, they're 2 trends of attacks. and with all the people working from home, on the computer because of quarintine, or just everyday users introduces more easy prey.]

Remote User Credential Theft-
Companies allow worers to work from home, causing many vulnerabilities. One way attackers are abusing this vulnerability is by getting ahold of employee credentials without being detected, by targeting the employee's personal computers.

There have also been a phishing attack increase. Phishing attacks in Italy have increased to 150%. In addition to this, there is also a 150% increase in malicious log in events, meaning attackers are logging into accounts from a suspicious program, machine, part of the world.

Finally, email attacks. there is a 200% increase in email based attacks(3k to 9k). people using their personal computer are suseptible to maliccious malware or adware.

0 comments

Capstone Email and Meeting Notes

Misc.
An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
I have already completed most of my note collection/organization and able to start working on my media immediately.

CyberGhost was always a solid VPN choice. It's strict no-logging policy and Romanian jurisdiction keep your information safe and secure. If provides all of the essential functions of a VPN with a great user experience. Plus, it's a leak-free system that works with Netflix, TOR, and torrenting services. Cyber Ghost is founded and located in Bucharest, Romania, a non-member of the 14-eyes jurisdiction, meaning your data (if they had any) wouldn’t be shared with intelligence agencies from other countries around the world.


Some obscure methods of third party taking advantage of your information are: Buying and selling Credit/Debit Card info. People who buy those credit card information can then put your info a dummy card(fake card) and use that card to buy things.

Information privacy law or data protection laws prohibit the disclosure or misuse of information about private individuals. Over 80 countries and independent territories, including nearly every country in Europe and many in Latin America and the Caribbean, Asia, and Africa, have now adopted comprehensive data protection laws.[1] The European Union has the General Data Protection Regulation[2], in force since May 25, 2018. The United States is notable for not having adopted a comprehensive information privacy law, but rather having adopted limited sectoral laws in some areas[citation needed].

These laws are based on Fair Information Practice guidelines developed by the U.S. Department for Health, Education and Welfare (HEW), by a Special Advisory Committee on Automated Personal Data Systems, under the chairmanship of computer pioneer and privacy pioneer Willis H. Ware. The report submitted by the Chair to the HHS Secretary titled "Records, Computers and Rights of Citizens (07/01/1973)"[3][4], proposes universal principles for the privacy and protection of consumer and citizen data:

For all data collected there should be a stated purpose.
Information collected from an individual cannot be disclosed to other organizations or individuals unless specifically authorized by law or by consent of the individual
Records kept on an individual should be accurate and up to date
There should be mechanisms for individuals to review data about them, to ensure accuracy. This may include periodic reporting
Data should be deleted when it is no longer needed for the stated purpose
Transmission of personal information to locations where "equivalent" personal data protection cannot be assured is prohibited
Some data is too sensitive to be collected, unless there are extreme circumstances (e.g., sexual orientation, religion)

-----------------------------------------------------------------------------

1. What is the cause and effect?
2. What is driving this situation? Money? Something else?
3. Wherever possible create a case study to contrast your topic

Anson
who is the target of your PSA and article?
can you come up with three case studies around privacy: someone who does not care, someone who cares but is clueless, and someone who cares and takes steps to secure their work (e.g. using Signal for IM, and a trusted corporate VPN?)

https://www.researchgate.net/publication/329116150_Privacy_Issues_and_Data_Protection_in_Big_Data_A_Case_Study_Analysis_under_GDPR - A big case study goes over the current state of the legal regulations and analyze different data protection and privacy-preserving techniques in the context of big data analysis by organizations. In addition, presenting and analyze two real-life research projects as case studies dealing with sensitive data and actions for complying with the data regulation laws.


----------------------------------------------------------------------


Capstone Mentors: Protocols and Communication

Guidelines For Internal and External Mentors


HOW TO FIND POSSIBLE MENTORS

The best approach is to cast a very wide net and tap all of your resources at once rather than

exploring one possible lead at a time. Here are some ideas about where to look:

● Ask family members, teachers, classmates, and friends if they know anyone who might

help you.

○ If you can get a referral or introduction to someone through a mutual friend or

acquaintance, it’s often much easier to “get your foot in the door” than if you cold

call or “cold email” them.

○ You sometimes need to follow a “bread crumb trail”, in which one possible

contact leads you to another and then to another.


● Reach out to professionals and experts whose work has inspired you.

● Post what you’re looking for on social media, Reddit, web boards devoted to the topic,

local Meetup groups, etc.

● Visit local businesses and organizations related to your topic.

EMAIL PROTOCOLS AND TEMPLATE

● First a student must share who they want to connect with and the goals and purpose of

the connection with Capstone Teacher and in turn Capstone Coordinator

○ This information will go into a spreadsheet for updating and ensuring that mentor

burnout does not occur

○ The purpose is to determine if the student has done enough research, project

management, and understanding of the area they are working in. This can be a

mentor specific, meaning different mentors could be brought in at different

stages.


● After receiving a go-ahead from the teacher the student crafts an email to the mentor

ccing Capstone teacher and Capstone Coordinator. Student responds within two

business days of return email clarifying next steps (ccing Capstone teacher and

Capstone Coordinator).

○ Intro Email format:

■ Subject: Captures the what and who of the Capstone and student

■ First section: Purpose


● A sentence or two (max) on who the student is and what they are

working on in the context of their senior Capstone, and most

importantly their why behind the Capstone (Heart, Head, Hustle)


■ Second section: Clear Ask

● A sentence that asks the mentor for a meeting or further email

exchange,

○ Set possible times, length, and reinforce the purpose of the

conversation

■ Closing Sentence

● Thanking the mentor for their time and consideration and ending

with a sign off (Mahalo; Warm regards; Cheers; etc.


■ Example:

● [Subject] Insight Around Retail Fashion In Hawai’i For an HPA

High School Senior

● First section:

Aloha e Ane,

My name is Aaron Schorn and for my high school senior Capstone

at HPA I am creating a line of handbags inspired by youth art

[hyperlink to slide deck, website, and/or social media]. As an artist

and budding entrepreneur who is passionate about my home in

Hawai'i, storytelling through fashion and the evolution of Kealopiko

has been a major inspiration for my own Capstone work this year.

● It would be wonderful to connect over the phone in the upcoming

weeks and discuss how you created your brand and design

library. I am free Mondays’ at 8:30 am, Tuesdays’ between 1-3

pm, and Fridays’ between 9-11 am.

● Closing Sentence:

Mahalo for inspiring me and others around the world, and for your

possible time.

Warm regards,

Aaron Schorn

HPA Student


LIABILITY AND PARENT WAIVER FORMS

● Had been working with Erin Morgan, but have now transitioned into working with Mark

Noetzel on a few blanket forms for work with mentors and off campus Capstone work.

Should have documents by February 15.


°Snap chat, facebook, instagram, we chat


Focus on 4 age groups, older people, middle age, millennials, gen x and younger


Explain beginning of capstone, shocking examples, explain how organizations use this info, personal info and demographic, then illegal


Look for quote “If CIA asked for the same information from people that volunteered information to facebook, there would be a mass revolt”


0 comments

Captstone Questions

1. What is the cause and effect?
2. What is driving this situation? Money? Something else?
3. Wherever possible create a case study to contrast your topic

Anson
who is the target of your PSA and article?
can you come up with three case studies around privacy: someone who does not care, someone who cares but is clueless, and someone who cares and takes steps to secure their work (e.g. using Signal for IM, and a trusted corporate VPN?)

https://www.researchgate.net/publication/329116150_Privacy_Issues_and_Data_Protection_in_Big_Data_A_Case_Study_Analysis_under_GDPR - A big case study goes over the current state of the legal regulations and analyze different data protection and privacy-preserving techniques in the context of big data analysis by organizations. In addition, presenting and analyze two real-life research projects as case studies dealing with sensitive data and actions for complying with the data regulation laws.


0 comments

More in depth notes

1/21/20

Misc.
An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
I have already completed most of my note collection/organization and able to start working on my media immediately.

CyberGhost was always a solid VPN choice. It's strict no-logging policy and Romanian jurisdiction keep your information safe and secure. If provides all of the essential functions of a VPN with a great user experience. Plus, it's a leak-free system that works with Netflix, TOR, and torrenting services. Cyber Ghost is founded and located in Bucharest, Romania, a non-member of the 14-eyes jurisdiction, meaning your data (if they had any) wouldn’t be shared with intelligence agencies from other countries around the world.



New*
Some obscure methods of third party taking advantage of your information are: Buying and selling Credit/Debit Card info. People who buy those credit card information can then put your info a dummy card(fake card) and use that card to buy things.

Information privacy law or data protection laws prohibit the disclosure or misuse of information about private individuals. Over 80 countries and independent territories, including nearly every country in Europe and many in Latin America and the Caribbean, Asia, and Africa, have now adopted comprehensive data protection laws.[1] The European Union has the General Data Protection Regulation[2], in force since May 25, 2018. The United States is notable for not having adopted a comprehensive information privacy law, but rather having adopted limited sectoral laws in some areas[citation needed].

These laws are based on Fair Information Practice guidelines developed by the U.S. Department for Health, Education and Welfare (HEW), by a Special Advisory Committee on Automated Personal Data Systems, under the chairmanship of computer pioneer and privacy pioneer Willis H. Ware. The report submitted by the Chair to the HHS Secretary titled "Records, Computers and Rights of Citizens (07/01/1973)"[3][4], proposes universal principles for the privacy and protection of consumer and citizen data:

For all data collected there should be a stated purpose.
Information collected from an individual cannot be disclosed to other organizations or individuals unless specifically authorized by law or by consent of the individual
Records kept on an individual should be accurate and up to date
There should be mechanisms for individuals to review data about them, to ensure accuracy. This may include periodic reporting
Data should be deleted when it is no longer needed for the stated purpose
Transmission of personal information to locations where "equivalent" personal data protection cannot be assured is prohibited
Some data is too sensitive to be collected, unless there are extreme circumstances (e.g., sexual orientation, religion)

0 comments

One Pager

Jan 20, 2020

1. What have I accomplished over the past three months?
Over the past three months, I have concluded on what my final project should look like, what it should include, and a clear view of the final product. My project should look like a professional & educational paper/video. It should include a general knowledge of data collection and effects of data consumption. My final project will be an article, PSA, and a video skit.
2. What is going well? What could be going better? Product vs Process?
Everything is going well. I think I should add more details and content into my project. My product(articles and video) is being improved and will be starting after I finalize the process (my written info: skit/video script, and article outline.)
3. What are/what have been blockers? What can your instructor do to facilitate your work / remove these blockers?
Some of my "blockers" is getting detailed information for my project. Another blocker I also have is writing my video script. All these challenges are being worked on and can be solved by myself.
4. What are you excited about for the next phase of the project?
I am excited in making the final product of my project, filming my videos, and spreading my article.
Goals & Next Steps
Product
● What concrete results / product do I want to produce in the next month?
Concrete results I want to produce in the next month is to create my videos and article/blog.
● What will my Capstone culminate in, what will my outcome/product be?
The outcome of my capstone will be multiple educational medias about data security and privacy that can easily be understood.
Process
● How can I adjust my approach/time management?
I can allocate more time for my project by taking time from my free time to work on this.
● What types of work am I doing during class? Outside of class?
I am gathering information of my subject and creating and improving my outline for my final product outside of class.
● Categorize/classify where time and effort is going
I am putting my time and effort in brainstorming new ideas and extra details to go into my medias.
● How do I tweak these to best achieve my product goals?
I can work around some of my challenges by focusing on my final project first, then adding extra details and improving it later.

Project Progress Interview Guide: Adjusting Scope and Progress
(10 Minutes)
Student shows up with Product Progress One-Pager, Formal Proposal, and Plan of
Implementation. Have the students record the conversation.
● These documents become the focal point of the conversation, and will help the student
to answer: Where am I relative to my plan of implementation?
Next go into the following question:
● What did you propose to do?
I proposed to educate people of data privacy and data security.
● How did you plan to do it?
I plan to create multiple medias that can be easily understood and relevant with the majority of my audience.
● Where are you at?
I am finalizing my outlines for my medias. Creating my product will be the next and final step of my capstone.
Discuss the current scope of the Capstone

0 comments

Project Captsone Media

Written on Jan. 14, 2020
PSA, Video, Articles
To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.
PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Recording and finalizing my PSA.
Video
The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.
I came up with an Idea of a short skit of an exaggerated way companies take your data.
My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.
I will record my skit.

Article
I will combine all my work into an easy to understand article.
I could add selectable sections in my article to that are straightforward and to the point
Revise my draft and polish it

Sharing my project
I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:
Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)
Advertise my PSA on local media platforms (HPA assembly, local programing)
At the end of my PSA and Skit video, I could link my article/blog for extra information.

Misc.
An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
I have already completed most of my note collection/organization and able to start working on my media immediately.
PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
PSA should be professional, and should have a clean presentation. A serious mindset, tell people the problem, address the effects of the cause, and where to start looking towards for improvement.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Situation -
Recording and finalizing my PSA.

Script - *open to

PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Recording and finalizing my PSA.








Video
The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.
I came up with an Idea of a short skit of an exaggerated way companies take your data.
My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.
I will record my skit.






Misc.
An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
I have already completed most of my note collection/organization and able to start working on my media immediately.

CyberGhost was always a solid VPN choice. It's strict no-logging policy and Romanian jurisdiction keep your information safe and secure. If provides all of the essential functions of a VPN with a great user experience. Plus, it's a leak-free system that works with Netflix, TOR, and torrenting services. Cyber Ghost is founded and located in Bucharest, Romania, a non-member of the 14-eyes jurisdiction, meaning your data (if they had any) wouldn’t be shared with intelligence agencies from other countries around the world.

0 comments

Captsone Media details

This will be used to direct and explain the media skits.

  • PSA, Video, Articles

To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.

  1. PSA

To create a PSA, I will need to

  • Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.

  • Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.

  • Recording and finalizing my PSA.

  1. Video

The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.

  • I came up with an Idea of a short skit of an exaggerated way companies take your data.

  • My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.

  • I will record my skit.


  1. Article

  • I will combine all my work into an easy to understand article.

  • I could add selectable sections in my article to that are straightforward and to the point

  • Revise my draft and polish it


  • Sharing my project

I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:

  1. Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)

  2. Advertise my PSA on local media platforms (HPA assembly, local programing)

  3. At the end of my PSA and Skit video, I could link my article/blog for extra information.


Misc.

  • An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.

  • I have already completed most of my note collection/organization and able to start working on my media immediately.

  • PSA

To create a PSA, I will need to

  • Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.

PSA should be professional, and should have a clean presentation. A serious mindset, tell people the problem, address the effects of the cause, and where to start looking towards for improvement.

  • Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.

Situation -

  • Recording and finalizing my PSA.


Script - *open to


  1. PSA

To create a PSA, I will need to

  • Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.

  • Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.

  • Recording and finalizing my PSA.









  1. Video

The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.

  • I came up with an Idea of a short skit of an exaggerated way companies take your data.

  • My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.

  • I will record my skit.







Misc.

  • An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.

  • I have already completed most of my note collection/organization and able to start working on my media immediately.


CyberGhost was always a solid VPN choice. It's strict no-logging policy and Romanian jurisdiction keep your information safe and secure. If provides all of the essential functions of a VPN with a great user experience. Plus, it's a leak-free system that works with Netflix, TOR, and torrenting services. Cyber Ghost is founded and located in Bucharest, Romania, a non-member of the 14-eyes jurisdiction, meaning your data (if they had any) wouldn’t be shared with intelligence agencies from other countries around the world.


https://www.amazon.com/50-4GB-Flash-Drive-Swivel/dp/B00H7IXA3C 50 usb 90$ + shipping


0 comments

Formal Presentation

Slide 1
Title: Data Privacy
intro

Slide 2
Title: what is personal data, why/how do companies gather it, and what they do with it?

1.What is personal data?
• Personal data is any and all information that relates to you. E.X. e-mail, relationships, financial status, where you live, how you act/talk/write, age/gender/interests, etc. Think of it as your online fingerprint.
2. why do companies gather it?
•Data is knowledge, knowledge is power, and power = money. Companies gather, analyze, and extract crucial information from personal data to turn it into cash. Almost every action you take online will be logged and stored somewhere.
3.what do they do with it?
•Companies use that data to improve their customer services, refine their marketing strategy, find their audience. Once they have everything they needed, they sell off your data to other third party companies.

Slide 3
Title: What are the dangers of personal data gathering/trading?
•In my perspective, the four most frightening consequences of data collection are:
How company gather data
The amount of data gathered about you
Unknown use of personal data
Sharing/trading data to third party companies/consumers

Slide 4
Title: Prevention
1.learn gathering methods
•Phishing , surveys, sign ups, website cookies, opt out data mining, wi-fi, or just plain asking.
2.use a premium vpn
Use a trusted paid vpn. Free vpns store and sell your data to make money.
3.fill out as little info needed
When required to fill out information, fill out as little as you can.
4.be wise about where to store info
Store your most private or valuable information somewhere safe. This can be documents printed out stored in a safe or not pressing "save credit card info" when buying things online.

Slide 5
Title: Solutions?
1.Paid VPNS
2.Tor browser
Browser, redirects traffic to worldwide overlay networks, 7k relays
3.Search Engines
4.Location Services
5.“The Amnesiac Incognito Live System (TAILS)”
6.keep private credentials offline or encrypt them
7.Be unexpected
8.if all else fails, cut your internet access

Slide 6
Title: My impact.
Articles, blog, PSA, video skit

0 comments

Model Project + Implementation ideas/outline

Anson Huang

11/14/19

Capstone: Cyber Security

Dr. Bill


Data Security

Intro/Briefing

Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy. My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online.


Phases

My project will have 4 phases, the first phase would be to gather information of data collection and the effects of data sharing, My second phase would be to clean up my notes and compile them into general areas. Thirdly, I will compile my notes and create 3 formats that I could share my information(PSA, Video, and Articles.) The final step is to find a reliable platforms to distribute my information.


Phases & Milestones

  • Gathering Information

My information will revolve around types of data being gathered and how, what companies do with your data, effects/risks of data sharing, cold hard facts, and methods to protect your data. The links below are where I gathered my information.


  1. What type of data is gathered

https://www.forbes.com/sites/forbestechcouncil/2019/05/20/15-things-consumer-data-can-do-for-a-company/#496425a54943 Explains the uses for consumer data.

  1. Data gathering methods

https://www.businessnewsdaily.com/10625-businesses-collecting-data.html Data gathering methods

  1. Effects/risks of data sharing

https://www.forbes.com/sites/quora/2017/03/21/why-data-collecting-can-be-dangerous-for-personal-freedom/#514ce5b27ecc A brief article talking about how our private data can be used against us.

  1. Facts

https://www.beautiful.ai/player/-Ltg14mWlXAAeuf_fmW7 My slideshow for examples and facts

  1. Methods of protection

https://en.wikipedia.org/wiki/Information_privacy Explains challenges and solutions to data protection.


  • Organized notes

These are general information of each group that are easy to understand and provide the most impact to my goal(scare people with the dangers of the internet).


  1. Why gather and What type of data is gathered?

Data is knowledge, knowledge is power, and power = money. Companies gather, analyze, and extract crucial information from personal data to turn it into cash. The most crucial information big corporations look for are data that can:

•1. Develop and Uncover Relationships

•2. Explain And Improve Your NPS

•3. Be Invaluable For Customer Service

•4. Generate New Ideas

•5. Predict Consumer Behaviors

•6. Be Currency

•7. Improve Physical Spaces

•8. Help You Infer What You Don’t Know

•9. Be A Great Predictor

•10.Help Consumers

•11. Highlight Consumer Pain

•12. Be A Reflection Of The Company

•13. Be The True Voice Of The Customer

•14. Know Customers Better Than They Know Themselves


  1. Data gathering methods

companies use gathering techniques such as data mining, phishing, emails, website cookies, signing up, surveys, and plain out just asking. Some companies will even dig further into their own customer service records to see how customers interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale. Almost every action you take online will be logged and stored somewhere. Every click, keyboard press, and website you visit is logged somewhere.


  1. Effects/risks of data sharing

Once companies gained enough information, they can then turn that information into knowledge, self data protection, or into cash flow by selling/trading data to third parties. The companies’ active sharing in data allows for many more third-party organizations to access to your personal information, and can result in consumers getting unwanted attention, marketing, scams, and even getting their identity stolen. Some companies have faulty security and can lead to consumer data leaks


  1. Facts and examples


  1. Methods of protection

  • Learn information extraction methods (Phishing links, Public Wi-Fi, Surveys, Signing up)

  • Corporations will also use sneaky ways to gathering data without your knowledge such as cookies that track the websites you visit, even after closing their page; email tracking, which tells them when you opened it, where, and what device you used; tracking your mouse movements, typing, clicks, and social media likes/retweets/shares.

  • Some actions you can take to stop your information being gathered are: Using temporary emails, filling as little as you can during sign ups, refusing to share your personal info(credit card, social security #,) use a premium vpn that states “no log,” and keeping your passwords/antimalware up to date.


  • PSA, Video, Articles

To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.

  1. PSA

To create a PSA, I will need to

  • Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.

  • Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.

  • Recording and finalizing my PSA.

  1. Video

The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.

  • I came up with an Idea of a short skit of an exaggerated way companies take your data.

  • My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.

  • I will record my skit.


  1. Article

  • I will combine all my work into an easy to understand article.

  • I could add selectable sections in my article to that are straightforward and to the point

  • Revise my draft and polish it


  • Sharing my project

I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:

  1. Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)

  2. Advertise my PSA on local media platforms (HPA assembly, local programing)

  3. At the end of my PSA and Skit video, I could link my article/blog for extra information.


Misc.

  • An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.

  • I have already completed most of my note collection/organization and able to start working on my media immediately.


------------------------------------------------------------------------------------------------------------

project implementations -

  • PSA, Video, Articles

To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.

  1. PSA

To create a PSA, I will need to

  • Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.


  • Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.

-Starting out with widely used Social Medias, and other; The information they collect and usage. (Youtube collect children's information: https://www.theguardian.com/technology/2019/sep/04/youtube-kids-fine-personal-data-collection-children-) (Instagram keeping your photos, videos, followers/following, tags, transactional data, facial recognition, geolocational data.) (Facebook & Twitter are the same as Instagram, but many people's information are given out freely to third party sources.)
  • Recording and finalizing my PSA.

  1. Video

The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.

  • I came up with an Idea of a short skit of an exaggerated way companies take your data.

I will start my video with myself casually on phone. Other actors are social medias and will "popup" and keep asking for my data, and not allowing me to use their apps until i give them permission. New scams, identity theft, and other malicious events will come up as soon as i give permission to social media.
  • My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.

I'll add irl examples of the effects of information sharing.
  • I will record my skit.


  1. Article

  • I will combine all my work into an easy to understand article.

  • I could add selectable sections in my article to that are straightforward and to the point

  • Revise my draft and polish it


  • Sharing my project

I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:

  1. Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)

  2. Advertise my PSA on local media platforms (HPA assembly, local programing)

  3. At the end of my PSA and Skit video, I could link my article/blog for extra information.

0 comments

Model Project Draft 2 - Huang

Anson Huang

11/14/19

Capstone: Cyber Security

Dr. Bill


Data Security

Intro/Briefing

Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy. My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online.


Phases

My project will have 4 phases, the first phase would be to gather information of data collection and the effects of data sharing, My second phase would be to clean up my notes and compile them into general areas. Thirdly, I will compile my notes and create 3 formats that I could share my information(PSA, Video, and Articles.) The final step is to find a reliable platforms to distribute my information.


Phases & Milestones

  • Gathering Information

My information will revolve around types of data being gathered and how, what companies do with your data, effects/risks of data sharing, cold hard facts, and methods to protect your data. The links below are where I gathered my information.


  1. What type of data is gathered

https://www.forbes.com/sites/forbestechcouncil/2019/05/20/15-things-consumer-data-can-do-for-a-company/#496425a54943 Explains the uses for consumer data.

  1. Data gathering methods

https://www.businessnewsdaily.com/10625-businesses-collecting-data.html Data gathering methods

  1. Effects/risks of data sharing

https://www.forbes.com/sites/quora/2017/03/21/why-data-collecting-can-be-dangerous-for-personal-freedom/#514ce5b27ecc A brief article talking about how our private data can be used against us.

  1. Facts

https://www.beautiful.ai/player/-Ltg14mWlXAAeuf_fmW7 My slideshow for examples and facts

  1. Methods of protection

https://en.wikipedia.org/wiki/Information_privacy Explains challenges and solutions to data protection.


  • Organized notes

These are general information of each group that are easy to understand and provide the most impact to my goal(scare people with the dangers of the internet).


  1. Why gather and What type of data is gathered?

Data is knowledge, knowledge is power, and power = money. Companies gather, analyze, and extract crucial information from personal data to turn it into cash. The most crucial information big corporations look for are data that can:

•1. Develop and Uncover Relationships

•2. Explain And Improve Your NPS

•3. Be Invaluable For Customer Service

•4. Generate New Ideas

•5. Predict Consumer Behaviors

•6. Be Currency

•7. Improve Physical Spaces

•8. Help You Infer What You Don’t Know

•9. Be A Great Predictor

•10.Help Consumers

•11. Highlight Consumer Pain

•12. Be A Reflection Of The Company

•13. Be The True Voice Of The Customer

•14. Know Customers Better Than They Know Themselves


  1. Data gathering methods

companies use gathering techniques such as data mining, phishing, emails, website cookies, signing up, surveys, and plain out just asking. Some companies will even dig further into their own customer service records to see how customers interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale. Almost every action you take online will be logged and stored somewhere. Every click, keyboard press, and website you visit is logged somewhere.


  1. Effects/risks of data sharing

Once companies gained enough information, they can then turn that information into knowledge, self data protection, or into cash flow by selling/trading data to third parties. The companies’ active sharing in data allows for many more third-party organizations to access to your personal information, and can result in consumers getting unwanted attention, marketing, scams, and even getting their identity stolen. Some companies have faulty security and can lead to consumer data leaks


  1. Facts and examples


  1. Methods of protection

  • Learn information extraction methods (Phishing links, Public Wi-Fi, Surveys, Signing up)

  • Corporations will also use sneaky ways to gathering data without your knowledge such as cookies that track the websites you visit, even after closing their page; email tracking, which tells them when you opened it, where, and what device you used; tracking your mouse movements, typing, clicks, and social media likes/retweets/shares.

  • Some actions you can take to stop your information being gathered are: Using temporary emails, filling as little as you can during sign ups, refusing to share your personal info(credit card, social security #,) use a premium vpn that states “no log,” and keeping your passwords/antimalware up to date.


  • PSA, Video, Articles

To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.

  1. PSA

To create a PSA, I will need to

  • Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.

  • Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.

  • Recording and finalizing my PSA.

  1. Video

The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.

  • I came up with an Idea of a short skit of an exaggerated way companies take your data.

  • My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.

  • I will record my skit.


  1. Article

  • I will combine all my work into an easy to understand article.

  • I could add selectable sections in my article to that are straightforward and to the point

  • Revise my draft and polish it


  • Sharing my project

I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:

  1. Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)

  2. Advertise my PSA on local media platforms (HPA assembly, local programing)

  3. At the end of my PSA and Skit video, I could link my article/blog for extra information.


Misc.

  • An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.

  • I have already completed most of my note collection/organization and able to start working on my media immediately.

0 comments

Model project - draft

Abstract: I hope to study about how companies gather and use data.

Title: Data exchange.

Background: Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy.

Purpose: My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online(stay anonymous).

What will you measure, research or learn? I will research how companies gather data, use data, and how to protect ourselves online

How will you measure it, what will success look like?: Success will look like a paper teaching us about the dangers of online data collection, how it affects us, how it affects our self freedom, and how we can stay protected online.

Tools/resources needed: people, stuff, places to work, local resources, collaboration resources: google, internet, my room, laptop, power source, snacks

What you used/need?: I will use news websites

Why is it credible or needed?

How are you going to use it/was it used?

Impact and legacy (HPA, local, global): what legacy will this leave? how will this impact HPA, our community and the world?: This research will teach all our generations how to stay safe, protect our privacy, and stay anonymous online.


-Research what/how data, is being collected by companies.

•customer data on metrics, from demographic data to behavioral data

•"Customer data can be collected in three ways – by directly asking customers, by indirectly tracking customers, and by appending other sources of customer data to your own,"

•Companies will also dig deep into their own customer service records to see how customers have interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale.

•In addition to collecting data, companies can also purchase it from or sell it to third-party sources.

-Research what companies are doing to collect our information

•Data is turned into knowledge for those companies. they run the data through an algorithm or ai which sorts out personalized profiles of consumers, observing what their interests and behaviors are.

•Companies use data to:

Improve constumer service

refine/polish their marketing strategy

buy/sell data

secure their data with your data

-Research ways we can protect our data and selves online

•The European Union's General Data Protection Requirements (GDPR) lays out the rules of data capture, storage, usage, and sharing for companies, and stiff penalties for those that fail to comply. Companies that fail to abide by the rules set out within the GDPR face 20 million Euro fines or up to 4 percent of annual revenue, whichever is higher.


why do companies want data?

•1. Data Can Develop and Uncover Relationships

•2. Data Can Explain And Improve Your NPS

•3. Data Can Be Invaluable For Customer Service

•4. Data Can Generate New Ideas

•5. Data Can Predict Consumer Behaviors

•6. Data Can Be Currency

•7. Data Can Improve Physical Spaces

•8. Data Can Help You Infer What You Don’t Know

•9. Data Can Be A Great Predictor

•10. Data Can Help Consumers

•11. Data Can Highlight Consumer Pain

•12. Data Can Be A Reflection Of The Company

•13. Data Can Be The True Voice Of The Customer

•14. Data Can Know Customers Better Than They Know Themselves

•15. Data Can Be Overwhelming—Collect Carefully


-cookies.

Cookies are created when you visit a website. They are used to store bits of information about your interactions with the website, which the web server can use later when processing your sessions. They can also be used to track websites you visit, even after closing the original website.


Email tracking is another method. With this, companies don’t just learn that a recipient has opened an email, but also where it was opened and on what device. Over 40% of emails sent around the world are tracked,


Logging in sites using your email may alow them to see your persoanl data, like your email, name, dob, etc.


Another way data companies obtain your data is through website registrations. More and more websites now expect you to register to access the website’s content. Some websites appear to have been created largely for the purposes of obtaining data.


Another major source of data for data companies are surveys – this was at the heart of the 2018 Cambridge Analytica scandal. This includes things such as personality quizzes, online games and tests, and more. When a company asks you to rate a product, your opinion may benefit many other companies.


-data mining

data mining - the practice of examining large databases in order to generate new information.

•Data mining is a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs. Data mining depends on effective data collection, warehousing, and computer processing.

•Data mining involves exploring and analyzing large blocks of information to glean meaningful patterns and trends. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users.

•Warehousing is an important aspect of data mining. Warehousing is when companies centralize their data into one database or program. With a data warehouse, an organization may spin off segments of the data for specific users to analyze and use.

•However, in other cases, analysts may start with the data they want and create a data warehouse based on those specs. Regardless of how businesses and other entities organize their data, they use it to support management's decision-making processes


Introduction & Goals

Many companies are collecting large amounts of consumer data, but the majority of us don’t even know what they do with it. To start off, let me ask you a question: What is consumer data, and what do companies do with it? Consumer data is personal, behavioral, and/or demographic information collected by marketing/department companies from their customer base. A few examples of consumer data, companies are trying to collect may be your credit card number, your phone number, email address, where you live, where you shop, what websites you visit, and how you act. To some extent, data collection from customers intrudes into customer privacy. Companies gather this type of data in order to improve customer service, refine/polish their marketing strategy, buy/sell data, and to secure their data with your data. My goals are to show what these consumers are giving to companies, how companies share/sell/trade data, and ways we can protect our privacy.


Implementation & Challenge

How do companies gather data? What do they do with the data? How does it affect the consumers? What are some ways I can protect our privacy? So far in my project, I’ve learned that companies use gathering techniques such as data mining, phishing, emails, website cookies, signing up, surveys, and plain out just asking. Some companies will even dig further into their own customer service records to see how customers interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale. Once companies gained enough information, they can then turn that information into knowledge, self data protection, or into cash flow by selling/trading data to third parties. The companies’ actions allow many more companies access to our information and can lead to consumers getting unwanted attention, marketing, and scams. Some companies have faulty security and can lead to consumer data leaks. Some challenges I face are researching topics, as informative articles do not go in too deep about data gathering/usage.

  • Learn the companies’ information grabbing methods
  • Phishing - random links that can be sent by anyone. Unless you know the website is not a phishing website ,ex. “Google.com” or “yahoo.com”, don’t click on them. Always verify that the link has the correct spelling, ex. Of phishing link “goog.ol”, before clicking on them.
  • Be wise about public wi-fi connections. Certain companies will track and store websites visited by you and can identify you by your MAC address.


HOW TO AVOID THEM

  • use throw away email/temporary email addresses like: guerrilla mail, 10minute mail, etc.
  • Fill out as little information as you can online.
  • Don’t share your social security number, even the last 4 numbers.
  • Use premium security/anti-malware software like “Norton Internet Security” & “Kasper Sky Anti-Virus”
  • Use encrypting software to store your valuable information, “CryptoExpert8” is a good choice, because it uses multiple encryption methods and is not cloud-based.
  • Use strong passwords. Examples can be found on https://passwordsgenerator.net/but you should create your own. And don’t use the same password for all your accounts.
  • Use your credit card/Debit card online sparingly. Use cash whenever possible.



Impact & Legacy

The opportunity to go research into something that I’ve been wondering about for a long time is a blessing. I’ve learned many things about privacy and what people can view in our personal lives. A few things I’ve learned so far are the consumers are viewed as the product, and the data buying parties are the consumers. I have also learned that everything you put or type online will be saved by a company or another. I wish to educate many people that many of their actions on the web will be permanently saved and stored somewhere, unknowingly without their knowledge. A logical backup project would be about the dangers of information leaks. It could affect you online and irl. People can sell your information to insurance companies to charge you more for health insurance or to robbers, telling them wear you hide your valuables.


Extreme measures -

Always use a premium vpn service with no-track (does not track your websites nor collect your data) when connecting to the internet. Examples of great non-track vpns are ExpressVPN, NordVPN, and CyberGhost. Use Tor Browser. Tor browser is a web proxy. It hides your IP address by redirecting your ip through over seven-thousand relays to protect your location and internet usage from anyone.

Use anonymous search engines like “DuckDuckGo.”

Use a Virtual-Machine. A program that acts like a computer, inside your pre-existing computer.

Before opening any browsers, you should close everything app and unnecessary programs running in your computer background. This reduces the opportunities people can pinpoint you. They can match the running programs of your “protected” computer to your “unprotected” computer whenever you turn your protection programs off.

Use “The Amnesiac Incognito Live System (TAILS)” as a vm operating system. TAILS eaves no trace of any user activity nor the operating system itself on your computer. TAILS cannot save cookies or file to your hard-drive without directly asking it to do so. If the operating system detects any non-anonymous connections, it will automatically block them. TAILS can be loaded and accessed on a usb drive.

Keep all your personal information securely offline, either on a different computer offline or on hardcopy.

Typing “$ sudo apt-get remove zeitgeist zeitgeist-core zeitgeist-datahub python-zeitgeist rhythmbox-plugin-zeitgeist geoclue geoclue-ubuntu-geoip geoip-database whoopsie” into the command prompt will stop all geolocation services.

You can force change your ip by unplugging your modem and replugging it.

Finally, don’t talk to anyone online, change your speech pattern, and never give any information to anyone.

If all else fails, cut off electronics from your life.


--------


Project Implementation Guideline
The purpose of the Project Plan is to take your proposed idea and build out a plan for how you will make that idea a reality. Whereas the Formal Proposal serves to introduce and describe your project to an uninformed reader (an external audience), the Project Plan is an internal document that lays out the major phases and milestones for how you will achieve your goals.
Write your Plan of Implementation first, then on paper or digitally (you can use Google sheets or Doc, or use free project management software like Trello, Basecamp, or Asana) to build your sections and copy the milestones into those sections as tasks. Copy the descriptions written in the plan (into a document or project management software) as the descriptions for the sections and tasks as you create them.
Rubric and Guideline
Basic Expectations & Formatting
? Turned in digitally as a PDF through the Haiku dropbox and posted to your ISR blog (also as a PDF)
? File name should follow the format: “Project Plan - Your Last Name” For example: “Project Plan - Schorn”
? Written component is 300 - 800 words in length
? Text should be single-spaced, 11 pt font (Choose a clean, professional font such as Times New Roman, Arial, Helvetica, or Georgia)
? Consistent font and text formatting throughout document
? Include your name, course name, instructor name, and project/product title at the top of the document
Plan of Implementation
? In 2-3 sentences describe the different phases of your project and how they relate to one another. You must break down your project into at least four phases. These phases can be chronological, or tied to distinct elements of your product.
? In a bulleted scaffold, lay out your project phases and the major milestones of each phase. You must have at least three milestones for each phase. Each phase and milestone should have a short (1-2 sentence) description.
? This is a formal/professional document. Your writing should meet the basic standards of clean english prose: no spelling errors, no major grammatical issues, correct punctuation, etc.
Project Management Build-out
? Create sections in the style of the model project. You should have a section for each phase described in your Plan of Implementation, as well as Deliverables, Research, and Miscellaneous sections.
? Create tasks for all known deliverables and milestones, with deadlines and descriptions per your teachers Guidelines (approximate deadlines are acceptable for this initial build-out)

0 comments

pre model project

Abstract: I hope to study about how companies gather and use data.

Title: Data exchange.

Background: Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy.

Purpose: My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online(stay anonymous).

What will you measure, research or learn? I will research how companies gather data, use data, and how to protect ourselves online

How will you measure it, what will success look like?: Success will look like a paper teaching us about the dangers of online data collection, how it affects us, how it affects our self freedom, and how we can stay protected online.

Tools/resources needed: people, stuff, places to work, local resources, collaboration resources: google, internet, my room, laptop, power source, snacks

What you used/need?: I will use news websites

Why is it credible or needed?

How are you going to use it/was it used?

Impact and legacy (HPA, local, global): what legacy will this leave? how will this impact HPA, our community and the world?: This research will teach all our generations how to stay safe, protect our privacy, and stay anonymous online.


-Research what/how data, is being collected by companies.

•customer data on metrics, from demographic data to behavioral data

•"Customer data can be collected in three ways – by directly asking customers, by indirectly tracking customers, and by appending other sources of customer data to your own,"

•Companies will also dig deep into their own customer service records to see how customers have interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale.

•In addition to collecting data, companies can also purchase it from or sell it to third-party sources.

-Research what companies are doing to collect our information

•Data is turned into knowledge for those companies. they run the data through an algorithm or ai which sorts out personalized profiles of consumers, observing what their interests and behaviors are.

•Companies use data to:

Improve constumer service

refine/polish their marketing strategy

buy/sell data

secure their data with your data

-Research ways we can protect our data and selves online

•The European Union's General Data Protection Requirements (GDPR) lays out the rules of data capture, storage, usage, and sharing for companies, and stiff penalties for those that fail to comply. Companies that fail to abide by the rules set out within the GDPR face 20 million Euro fines or up to 4 percent of annual revenue, whichever is higher.


why do companies want data?

•1. Data Can Develop and Uncover Relationships

•2. Data Can Explain And Improve Your NPS

•3. Data Can Be Invaluable For Customer Service

•4. Data Can Generate New Ideas

•5. Data Can Predict Consumer Behaviors

•6. Data Can Be Currency

•7. Data Can Improve Physical Spaces

•8. Data Can Help You Infer What You Don’t Know

•9. Data Can Be A Great Predictor

•10. Data Can Help Consumers

•11. Data Can Highlight Consumer Pain

•12. Data Can Be A Reflection Of The Company

•13. Data Can Be The True Voice Of The Customer

•14. Data Can Know Customers Better Than They Know Themselves

•15. Data Can Be Overwhelming—Collect Carefully


-cookies.

Cookies are created when you visit a website. They are used to store bits of information about your interactions with the website, which the web server can use later when processing your sessions. They can also be used to track websites you visit, even after closing the original website.


Email tracking is another method. With this, companies don’t just learn that a recipient has opened an email, but also where it was opened and on what device. Over 40% of emails sent around the world are tracked,


Logging in sites using your email may alow them to see your persoanl data, like your email, name, dob, etc.


Another way data companies obtain your data is through website registrations. More and more websites now expect you to register to access the website’s content. Some websites appear to have been created largely for the purposes of obtaining data.


Another major source of data for data companies are surveys – this was at the heart of the 2018 Cambridge Analytica scandal. This includes things such as personality quizzes, online games and tests, and more. When a company asks you to rate a product, your opinion may benefit many other companies.


-data mining

data mining - the practice of examining large databases in order to generate new information.

•Data mining is a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs. Data mining depends on effective data collection, warehousing, and computer processing.

•Data mining involves exploring and analyzing large blocks of information to glean meaningful patterns and trends. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users.

•Warehousing is an important aspect of data mining. Warehousing is when companies centralize their data into one database or program. With a data warehouse, an organization may spin off segments of the data for specific users to analyze and use.

•However, in other cases, analysts may start with the data they want and create a data warehouse based on those specs. Regardless of how businesses and other entities organize their data, they use it to support management's decision-making processes


Introduction & Goals

Many companies are collecting large amounts of consumer data, but the majority of us don’t even know what they do with it. To start off, let me ask you a question: What is consumer data, and what do companies do with it? Consumer data is personal, behavioral, and/or demographic information collected by marketing/department companies from their customer base. A few examples of consumer data, companies are trying to collect may be your credit card number, your phone number, email address, where you live, where you shop, what websites you visit, and how you act. To some extent, data collection from customers intrudes into customer privacy. Companies gather this type of data in order to improve customer service, refine/polish their marketing strategy, buy/sell data, and to secure their data with your data. My goals are to show what these consumers are giving to companies, how companies share/sell/trade data, and ways we can protect our privacy.


Implementation & Challenge

How do companies gather data? What do they do with the data? How does it affect the consumers? What are some ways I can protect our privacy? So far in my project, I’ve learned that companies use gathering techniques such as data mining, phishing, emails, website cookies, signing up, surveys, and plain out just asking. Some companies will even dig further into their own customer service records to see how customers interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale. Once companies gained enough information, they can then turn that information into knowledge, self data protection, or into cash flow by selling/trading data to third parties. The companies’ actions allow many more companies access to our information and can lead to consumers getting unwanted attention, marketing, and scams. Some companies have faulty security and can lead to consumer data leaks. Some challenges I face are researching topics, as informative articles do not go in too deep about data gathering/usage.

  • Learn the companies’ information grabbing methods
  • Phishing - random links that can be sent by anyone. Unless you know the website is not a phishing website ,ex. “Google.com” or “yahoo.com”, don’t click on them. Always verify that the link has the correct spelling, ex. Of phishing link “goog.ol”, before clicking on them.
  • Be wise about public wi-fi connections. Certain companies will track and store websites visited by you and can identify you by your MAC address.


HOW TO AVOID THEM

  • use throw away email/temporary email addresses like: guerrilla mail, 10minute mail, etc.
  • Fill out as little information as you can online.
  • Don’t share your social security number, even the last 4 numbers.
  • Use premium security/anti-malware software like “Norton Internet Security” & “Kasper Sky Anti-Virus”
  • Use encrypting software to store your valuable information, “CryptoExpert8” is a good choice, because it uses multiple encryption methods and is not cloud-based.
  • Use strong passwords. Examples can be found on https://passwordsgenerator.net/but you should create your own. And don’t use the same password for all your accounts.
  • Use your credit card/Debit card online sparingly. Use cash whenever possible.



Impact & Legacy

The opportunity to go research into something that I’ve been wondering about for a long time is a blessing. I’ve learned many things about privacy and what people can view in our personal lives. A few things I’ve learned so far are the consumers are viewed as the product, and the data buying parties are the consumers. I have also learned that everything you put or type online will be saved by a company or another. I wish to educate many people that many of their actions on the web will be permanently saved and stored somewhere, unknowingly without their knowledge. A logical backup project would be about the dangers of information leaks. It could affect you online and irl. People can sell your information to insurance companies to charge you more for health insurance or to robbers, telling them wear you hide your valuables.


Extreme measures -

Always use a premium vpn service with no-track (does not track your websites nor collect your data) when connecting to the internet. Examples of great non-track vpns are ExpressVPN, NordVPN, and CyberGhost. Use Tor Browser. Tor browser is a web proxy. It hides your IP address by redirecting your ip through over seven-thousand relays to protect your location and internet usage from anyone.

Use anonymous search engines like “DuckDuckGo.”

Use a Virtual-Machine. A program that acts like a computer, inside your pre-existing computer.

Before opening any browsers, you should close everything app and unnecessary programs running in your computer background. This reduces the opportunities people can pinpoint you. They can match the running programs of your “protected” computer to your “unprotected” computer whenever you turn your protection programs off.

Use “The Amnesiac Incognito Live System (TAILS)” as a vm operating system. TAILS eaves no trace of any user activity nor the operating system itself on your computer. TAILS cannot save cookies or file to your hard-drive without directly asking it to do so. If the operating system detects any non-anonymous connections, it will automatically block them. TAILS can be loaded and accessed on a usb drive.

Keep all your personal information securely offline, either on a different computer offline or on hardcopy.

Typing “$ sudo apt-get remove zeitgeist zeitgeist-core zeitgeist-datahub python-zeitgeist rhythmbox-plugin-zeitgeist geoclue geoclue-ubuntu-geoip geoip-database whoopsie” into the command prompt will stop all geolocation services.

You can force change your ip by unplugging your modem and replugging it.

Finally, don’t talk to anyone online, change your speech pattern, and never give any information to anyone.

If all else fails, cut off electronics from your life.

0 comments

September 9, 2019 by cap-ahuang Capstone CyberSecurity 4 - Anson

Abstract: I hope to study about how companies gather and use data.
Title: Data exchange.
Background: Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy.
Purpose: My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online(stay anonymous).
What will you measure, research or learn? I will research how companies gather data, use data, and how to protect ourselves online
How will you measure it, what will success look like?: Success will look like a paper teaching us about the dangers of online data collection, how it affects us, how it affects our self freedom, and how we can stay protected online.
Tools/resources needed: people, stuff, places to work, local resources, collaboration resources: google, internet, my room, laptop, power source, snacks
What you used/need?: I will use news websites
Why is it credible or needed?
How are you going to use it/was it used?
Impact and legacy (HPA, local, global): what legacy will this leave? how will this impact HPA, our community and the world?: This research will teach all our generations how to stay safe, protect our privacy, and stay anonymous online.

-Research what/how data, is being collected by companies.
•customer data on metrics, from demographic data to behavioral data
•"Customer data can be collected in three ways – by directly asking customers, by indirectly tracking customers, and by appending other sources of customer data to your own,"
•Companies will also dig deep into their own customer service records to see how customers have interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale.
•In addition to collecting data, companies can also purchase it from or sell it to third-party sources.
-Research what companies are doing to collect our information
•Data is turned into knowledge for those companies. they run the data through an algorithm or ai which sorts out personalized profiles of consumers, observing what their interests and behaviors are.
•Companies use data to:
Improve constumer service
refine/polish their marketing strategy
buy/sell data
secure their data with your data
-Research ways we can protect our data and selves online
•The European Union's General Data Protection Requirements (GDPR) lays out the rules of data capture, storage, usage, and sharing for companies, and stiff penalties for those that fail to comply. Companies that fail to abide by the rules set out within the GDPR face 20 million Euro fines or up to 4 percent of annual revenue, whichever is higher.

why do companies want data?
•1. Data Can Develop and Uncover Relationships
•2. Data Can Explain And Improve Your NPS
•3. Data Can Be Invaluable For Customer Service
•4. Data Can Generate New Ideas
•5. Data Can Predict Consumer Behaviors
•6. Data Can Be Currency
•7. Data Can Improve Physical Spaces
•8. Data Can Help You Infer What You Don’t Know
•9. Data Can Be A Great Predictor
•10. Data Can Help Consumers
•11. Data Can Highlight Consumer Pain
•12. Data Can Be A Reflection Of The Company
•13. Data Can Be The True Voice Of The Customer
•14. Data Can Know Customers Better Than They Know Themselves
•15. Data Can Be Overwhelming—Collect Carefully

-cookies.
Cookies are created when you visit a website. They are used to store bits of information about your interactions with the website, which the web server can use later when processing your sessions. They can also be used to track websites you visit, even after closing the original website.

Email tracking is another method. With this, companies don’t just learn that a recipient has opened an email, but also where it was opened and on what device. Over 40% of emails sent around the world are tracked,

Logging in sites using your email may alow them to see your persoanl data, like your email, name, dob, etc.

Another way data companies obtain your data is through website registrations. More and more websites now expect you to register to access the website’s content. Some websites appear to have been created largely for the purposes of obtaining data.

Another major source of data for data companies are surveys – this was at the heart of the 2018 Cambridge Analytica scandal. This includes things such as personality quizzes, online games and tests, and more. When a company asks you to rate a product, your opinion may benefit many other companies.

-data mining
data mining - the practice of examining large databases in order to generate new information.
•Data mining is a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs. Data mining depends on effective data collection, warehousing, and computer processing.
•Data mining involves exploring and analyzing large blocks of information to glean meaningful patterns and trends. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users.
•Warehousing is an important aspect of data mining. Warehousing is when companies centralize their data into one database or program. With a data warehouse, an organization may spin off segments of the data for specific users to analyze and use.
•However, in other cases, analysts may start with the data they want and create a data warehouse based on those specs. Regardless of how businesses and other entities organize their data, they use it to support management's decision-making processes.


----------------------------------------------------------------------------
•Research how companies gather data.(names, interests, where you live, where you travel, what you like to shop, etc.)
•Companies selling data to other companies
•Analyze how collected data is used
•research how companies observe data and what type of data they are searching for
•Research what data is being collected/stored/sold.
•How can we protect our data/personal information? (methods on protection online)
----------------------------------------------------------------------------

0 comments

Capstone CyberSecurity 3 - Anson

Abstract: I hope to study about how companies gather and use data.
Title: Data exchange.
Background: Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy.
Purpose: My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online(stay anonymous).
What will you measure, research or learn? I will research how companies gather data, use data, and how to protect ourselves online
How will you measure it, what will success look like?: Success will look like a paper teaching us about the dangers of online data collection, how it affects us, how it affects our self freedom, and how we can stay protected online.
Tools/resources needed: people, stuff, places to work, local resources, collaboration resources: google, internet, my room, laptop, power source, snacks
What you used/need?: I will use news websites
Why is it credible or needed?
How are you going to use it/was it used?
Impact and legacy (HPA, local, global): what legacy will this leave? how will this impact HPA, our community and the world?: This research will teach all our generations how to stay safe, protect our privacy, and stay anonymous online.

-Research what/how data, is being collected by companies.
•customer data on metrics, from demographic data to behavioral data
•"Customer data can be collected in three ways – by directly asking customers, by indirectly tracking customers, and by appending other sources of customer data to your own,"
•Companies will also dig deep into their own customer service records to see how customers have interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale.
•In addition to collecting data, companies can also purchase it from or sell it to third-party sources.
-Research what companies are doing to collect our information
•Data is turned into knowledge for those companies. they run the data through an algorithm or ai which sorts out personalized profiles of consumers, observing what their interests and behaviors are.
•Companies use data to:
Improve constumer service
refine/polish their marketing strategy
buy/sell data
secure their data with your data
-Research ways we can protect our data and selves online
•The European Union's General Data Protection Requirements (GDPR) lays out the rules of data capture, storage, usage, and sharing for companies, and stiff penalties for those that fail to comply. Companies that fail to abide by the rules set out within the GDPR face 20 million Euro fines or up to 4 percent of annual revenue, whichever is higher.

why do companies want data?
•1. Data Can Develop and Uncover Relationships
•2. Data Can Explain And Improve Your NPS
3. Data Can Be Invaluable For Customer Service
4. Data Can Generate New Ideas
5. Data Can Predict Consumer Behaviors
6. Data Can Be Currency
7. Data Can Improve Physical Spaces
8. Data Can Help You Infer What You Don’t Know
9. Data Can Be A Great Predictor
10. Data Can Help Consumers
11. Data Can Highlight Consumer Pain
12. Data Can Be A Reflection Of The Company
13. Data Can Be The True Voice Of The Customer
14. Data Can Know Customers Better Than They Know Themselves
15. Data Can Be Overwhelming—Collect Carefully


-data mining
data mining - the practice of examining large databases in order to generate new information.
•Data mining is a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs. Data mining depends on effective data collection, warehousing, and computer processing.
•Data mining involves exploring and analyzing large blocks of information to glean meaningful patterns and trends. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users.
•Warehousing is an important aspect of data mining. Warehousing is when companies centralize their data into one database or program. With a data warehouse, an organization may spin off segments of the data for specific users to analyze and use.
•However, in other cases, analysts may start with the data they want and create a data warehouse based on those specs. Regardless of how businesses and other entities organize their data, they use it to support management's decision-making processes.


----------------------------------------------------------------------------
•Research how companies gather data.(names, interests, where you live, where you travel, what you like to shop, etc.)
•Companies selling data to other companies
•Analyze how collected data is used
•research how companies observe data and what type of data they are searching for
•Research what data is being collected/stored/sold.
•How can we protect our data/personal information? (methods on protection online)
----------------------------------------------------------------------------

0 comments

Capstone CyberSecurity 2- Anson

Proposal-
-Research what/how data, is being collected by companies.
•customer data on metrics, from demographic data to behavioral data
•"Customer data can be collected in three ways – by directly asking customers, by indirectly tracking customers, and by appending other sources of customer data to your own,"
•Companies will also dig deep into their own customer service records to see how customers have interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale.
•In addition to collecting data, companies can also purchase it from or sell it to third-party sources.
-Research what companies are doing to collect our information
•Data is turned into knowledge for those companies. they run the data through an algorithm or ai which sorts out personalized profiles of consumers, observing what their interests and behaviors are.
•Companies use data to:
Improve constumer service
refine/polish their marketing strategy
buy/sell data
secure their data with your data
-Research ways we can protect our data and selves online
•The European Union's General Data Protection Requirements (GDPR) lays out the rules of data capture, storage, usage, and sharing for companies, and stiff penalties for those that fail to comply. Companies that fail to abide by the rules set out within the GDPR face 20 million Euro fines or up to 4 percent of annual revenue, whichever is higher.

-data mining
data mining - the practice of examining large databases in order to generate new information.
•Data mining is a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs. Data mining depends on effective data collection, warehousing, and computer processing.
•Data mining involves exploring and analyzing large blocks of information to glean meaningful patterns and trends. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users.
•Warehousing is an important aspect of data mining. Warehousing is when companies centralize their data into one database or program. With a data warehouse, an organization may spin off segments of the data for specific users to analyze and use.
•However, in other cases, analysts may start with the data they want and create a data warehouse based on those specs. Regardless of how businesses and other entities organize their data, they use it to support management's decision-making processes.


----------------------------------------------------------------------------
•Research how companies gather data.(names, interests, where you live, where you travel, what you like to shop, etc.)
•Companies selling data to other companies
•Analyze how collected data is used
•research how companies observe data and what type of data they are searching for
•Research what data is being collected/stored/sold.
•How can we protect our data/personal information? (methods on protection online)
----------------------------------------------------------------------------

0 comments

Capstone CyberSecurity - Anson

Proposal-
-Research what/how data, is being collected by companies.
•customer data on metrics, from demographic data to behavioral data
•"Customer data can be collected in three ways – by directly asking customers, by indirectly tracking customers, and by appending other sources of customer data to your own,"
•Companies will also dig deep into their own customer service records to see how customers have interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale.
•In addition to collecting data, companies can also purchase it from or sell it to third-party sources.
-Research what companies are doing to collect our information
•Data is turned into knowledge for those companies. they run the data through an algorithm or ai which sorts out personalized profiles of consumers, observing what their interests and behaviors are.
•Companies use data to:
Improve constumer service
refine/polish their marketing strategy
buy/sell data
secure their data with your data
-Research ways we can protect our data and selves online
•The European Union's General Data Protection Requirements (GDPR) lays out the rules of data capture, storage, usage, and sharing for companies, and stiff penalties for those that fail to comply. Companies that fail to abide by the rules set out within the GDPR face 20 million Euro fines or up to 4 percent of annual revenue, whichever is higher.


----------------------------------------------------------------------------
•Research how companies gather data.(names, interests, where you live, where you travel, what you like to shop, etc.)
•Companies selling data to other companies
•Analyze how collected data is used
•research how companies observe data and what type of data they are searching for
•Research what data is being collected/stored/sold.
•How can we protect our data/personal information? (methods on protection online)
----------------------------------------------------------------------------

0 comments