You need to go through the blog and give answer to the following question: Do yo
ID: 3582523 • Letter: Y
Question
You need to go through the blog and give answer to the following question:
Do you think privacy of users in ensured when Facebook is using private data to design customized ads?
the blog is :
Facebook has taken the privacy of their customers seriously, as their Chief Security Officer (CSO) Alex Stamos has stated that the company has engaged in black market purchases of leaked or hacked databases that contain Facebook account credentials.
A PREFACE TO THE FACEBOOK BLACK MARKET TRADE
Facebook has publicly disclosed that it has bought leaked databases that contain Facebook credentials of their customers. (Note that I don’t say users.) Everything posted on Facebook by a user of the social network is used to build a profile around the person. This information is then used to create personalized ads that deliver sponsored content to them.
To this date, the mechanism has been one of the most successful revenue streams that we have witnessed thus far. Facebook’s Q3 2016 report shows that the company is also stepping on the shoes of video sharing services, which will also boost the community.
The fact that the social network has gone to such lengths to protect the privacy of their users means that they are very serious about withholding and preserving their user base. Nowadays, there is hardly any living active Internet user who has not interacted with Facebook. Essentially, the Facebook security team or whoever is handling these issues must have learned of the recent large database leaks that include mainly adult dating sites.
The news reports state that one of the most popular sites Adult Friend Finder has not even encrypted the compromised user data. This is deeply disturbing as such sensitive information should be handled with extreme care. Unfortunately, it seems that many online services do not take the security of their users seriously.
In this day and age, its very difficult not to imagine that you might get hacked as criminals continue to develop exploits and dangerous viruses, such as ransomware to wreak havoc on their targets. In many cases, the victims are blackmailed by the hackers to deliver large sums of money to prevent data leakage and exposure of their corporate secrets.
FACEBOOK HAS STEPPED IN BY BUYING FROM THE UNDERGROUND MARKETS
Facebook has taken an alternative and proactive approach when it comes to defending the security of their users. The social network has taken the controversial step to pay the hackers for the compromised databases that have been leaked.
The Facebook security team has then cross-referenced the contained account credentials (usernames, emails and passwords) to the encrypted ones its platform uses. When a match is found, the team issues a mandatory password reset for that affected user.
While this has a positive side, paying hackers for providing the data can have serious consequences. Several security experts and technology analysts have stated that this only reinforces their criminal business model. We have witnessed that there is a sharp rise of hacker attacks, ransomware virus development and coordinated large-scale DDOS attacks. Add to that the growing security vulnerabilities in IoT devices which have been used in actual campaigns against various targets.
The security experts are worried that Facebook’s decision to engage the hackers might “inspire” more criminals to attack large sites that may contain lucrative account credentials.
It would be good to create a proactive solution that can deal with consequences of a hacker attack when it comes to data, much like the bug bounty programs, which are used to fight off exploits of software vulnerabilities. However, paying the criminals is probably not the best idea.
What the online services need is a clear understanding that when they are in possession of high-risk and sensitive information about their users, such as their passwords, they must protect it with all means necessary. That is something that everyone should strive to do to the best of their ability. However, the problem is that not every security expert can think from the user’s perspective.
A lot of users don’t change their passwords, and one user’s password stolen from one service could probably work on another site that they use.
The other fact is that it’s relatively easy to guess most passwords. Every year, we receive reports that users use dictionary words and simple strings like “1234,” “password,” “secret” and even “god” to protect their accounts.
It would be interesting to see if another company will disclose if it has embraced such a strategy as part of its security practice in protecting the data of its users.
Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.
Explanation / Answer
Dear Student,
Here is the answer,
After reading the blog, I do not think that the privacy of the user is ensured because everything posted on Facebook by a the user of the social network is used to build a profile around the person. This information is then used to create personalized ads that deliver sponsored content to them.
So how can a user's privacy ensured? Here A Facebook customer knows everything about the user and then facebook is delivering sponsered content to them. So One side facebook is purchasing the leaked and hacked database from the hackers that contain facebook credentials an another side it talks about the that we are very serious about protecting and preserving our user data base.
It is paying the hackers for the data that has been hacked, by doing this it is motivating the hackers to do more hackings and this only reinforces their criminal business model.So result is that there is a sharp rise of hacker attacks, ransomware virus development and coordinated large-scale DDOS attacks.
So i would say that the above is not the right approch to ensured the privacy of the users, Instead of inspiring the hackers, It would be good to create a proactive solution that can deal with consequences of a hacker attack when it comes to data, much like the bug bounty programs, which are used to fight off exploits of software vulnerabilities.
Thanks...!!!
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.