Discussion 5: Security in the Modern Age & Keeping Safe Online

Topic Choice:

The two topics that I chose to discuss from Module 7 are Security in the Modern Age and Keeping Safe Online. The reason I chose these two topics is because they are both comparable to one another. If we do not have the proper security protocols in place we are more vulnerable to hackers. First I will define both the topics individually to explain what I know and have researched, next I will show how both relate to one another by contrasting both topics and showing commonalities.

Security in the Modern Age

It has become increasingly difficult for people to have the right security in place to avoid being attacked online and remaining safe. With websites having access to our information directly or by unknowingly getting our permission to it, our simple security measures are simply not cutting it. Hackers are finding new ways to access our information through our accounts, passwords, and social media sites. Anti-virus software's are not enough in order to be secure online. Some statistics from the info graphic from module 7 that stood out to me was that8.1 million people fall victim to identity theft ever year.(Compliance, 2012) This statistic just goes to show how easily hackers are able to gain complete access to someone`s life. Another statistic from the same info graphic was how it explained that it takes 2 hours to crack a password with 8 lowercase letters, as opposed to it taking 200 years when you add in a single capital letter. (Compliance, 2012) This shows that with not much added effort at all we are able to have sufficient security in place to protect our information.

Keeping Safe Online

The info graphic OMG 2 Much Info from the module really showed me that it is very easy to become unsafe online and be vulnerable to cyber-attacks. “58% of consumers have shared details social media that put them at risk for fraud and identity theft.” (Fischer, 2013) At first I thought this statistic was a little high but then I read the report Serial Burglars used Facebook to find victims. The report goes on to talk about a couple who would follow fairly affluent people on social media and would rob them after they would post status updates about being on vacation. (Cook & Hanrahan, 2013) This really shows us that even though we think that a status or picture is innocent, it can actually put you at risk. In order to stay safe online you must be sure to limit the information you post to the web. “And remember if you share it, your friends can share it and so on and so on. And that is just the beginning.” (Fischer, 2013) Everything that goes on to the web will forever remain on the web, and although you might feel secure by posting your picture to your close circle of friends the picture actually has a much farther reach. In order to stay safe, think smart before acting online.

How Do They Relate?

The two topics relate because they both explain how we can stay secure, stay safe, limit personal information online and restrict access to hackers. In order to showcase both topics I found a list of simple security tips that should be followed to stay safe online by being secure.

  1. Have a Strong Password: Passwords should not be the same for every account and should be changed every 6 months. The password should be fairly complex so hackers are unable to guess it but not so much that you will forget it.
  2. Install Anti-Virus and Malware Protection: Computers should be enforced with reliable and strong protection software. Computers should be updated to ensure soft wares are up to date and operational.
  3. Use A Firewall: Firewalls are used to protect you from potential hackers and secure your computer`s network.
  4. Secure Wi-Fi Networks: Wi-Fi network should be secure, encrypted and hidden.
  5. Secure ALL Networks & Devices: It only takes one wrong move or mistake to allow hackers access to the entire network.
  6. Limit Personal Info on Social Media: This includes your phone number, address, and employer, it also includes limiting personal status/location updates.
  7. Back-Up: All files, pictures, contacts, etc should be backed up on a continuing basis.                                                                                                                                  (Kehrer, 2013)


In conclusion I chose these two topics because when I was determining how I personally stay safe online and thought of all the security measures that I have put in place to ensure it. Also even with anti-virus software and companies increasing security protocols, at the end of the day to ensure our personal safety we must think smart and secure every possible opening available to hackers. I think Derrick summed it up perfectly in the module: “If you want security, convenience must go down. If you want convenience, then security goes down. It is an old fashion scale. You have to find the right balance of the two for you.” (Derrick Millard, Module 7)


Comment Stream