A major issue today in technology is cybersecurity and protection one’s information. Unfortunately as technology advances, more ways to invade and breach it is discovered. One of these ways is threat modeling. Threat modeling is one of the most important components of staying secure online as it is the process of identifying ways to stay secure on the Internet. Prevalent questions when protecting your information could include: What do you want to protect? Who do you want to protect it from? How likely is it that you need to protect it? How bad are the consequences if you fail? and How much trouble are you willing to go through in order to try to prevent those consequences? By answering these questions, people can figure out solutions to protect them and find a threat model that works. One great method to protect yourself online is Two-Factor Authorization (2FA), which would be an extra step to logging in such as an email or text message after typing in your password on a certain website. Another method gaining popularity today is using a VPN. A VPN, or Virtual Private Network, is a service that helps users stay private when browsing online. VPNs are great for protecting information when traveling to other networks outside of your home. Alan Turing was a computer scientist and helped crack the code for the Allies during WWII. His creation during WWII influenced the idea of the computer. The Turing Test, named after Turing, is the method of determining whether or not a machine, or AI can demonstrate human intelligence. If AI can engage in conversation with humans without being detected as AI, then it has demonstrated human intelligence.
Reader Interactions
Comments
Leave a Reply
You must be logged in to post a comment.
Yes, this would be helpful for me if I knew before. My social network account was hacked when I used a public Wi-Fi. If I modeled my digital ID security better, that wouldn’t happen.