I. Info


Being rugged is…

1. Understanding that you are inextricably tied to the digital information about you online.  It is an increasingly important concept that digital information is an asset like material things are assets and information must be protected like other assets.

2. Being aware of the variety of digital information that can now affect us.

Businesses used to rely on a human being’s knowledge to manage the business.   Individuals were repositories of otherwise unavailable information (data).

In the digital age that is changing.  The quantity of knowledge has exploded which is changing the relationship between data and people.   The quantities of data are so huge that the best way to make use of much of it is by computer analysis.  Businesses now depend on employee’s ability to research and manipulate data rather than just rely on what they know.   Tim Berners-Lee is the inventor of the World Wide Web.   (If you don’t have the most current version of Flash player the below video won’t show. Please use this link instead:  http://www.ted.com/talks/lang/eng/tim_berners_lee_on_the_next_web.html )

“Information” is the first topic covered because digital “security” is 100% about information, personally or in business.  “Information” is data with meaning added.  It covers a variety of types of data, all of which are part of an increasingly important concept on the cyber frontier: a business’s information, and each individual’s information is an asset, it has value, it is worth money!   A computer is just a doorstop if it doesn’t have information stored on it (“data at rest”) or moving in and out of it (“data in transit”).  A business or organization’s information is an asset, it has value, it is worth money!  Digital information is worth protecting, like one would protect money in a bank account or valuables in the home. You are represented by the information about you.  A business is dependent on the information about it!  There are unscrupulous people who will take information without regard for the inconvenience, trouble, monetary loss, heartbreak, loss of reputation or emotional turmoil stealing it will cause.  Just as cyber criminals are remote, hazy, anonymous abstractions to us we are merely pennies in a database to them.  But the cost, time, aggravation, and potential legal trouble that loss of personal or other types of information can cause, can be significant.

  • Personally Identifiable Information (PII) – any combination of data that can uniquely identify you.  Did you know you can be identified with 90-95% accuracy with just 3 pieces of information about you?  (Hint: DoB, 90210  and  M/F.  Guess what information marketers always ask for?)    Legal definitions of PII change from state to state.  A social security number is supposed to uniquely identify a person and is used in many financial transactions so it is the key to identity theft.  However, any combination of information that can be used to pinpoint one individual should be protected (e. g. name plus phone number plus address plus bank account #).  It is best not to send combinations of information via email since email is usually not encrypted and is easily intercepted and readable.
  • Medical Information – many doctors offices are moving storage of medical records into “The Cloud” (more on the cloud in “V. Internet”).  Doctors are not computer security people and often do not understand the complex technical issues involved with securing a patient’s medical records. They may be inclined to accept a sales person’s assurance that “the data are safe” without knowing what questions to ask to be sure patient records really are adequately protected.  Are laws protecting medical privacy adequate? FTC Information on Medical Identity Theft (More about that in section X. Legal)
  • Privacy – from physical location to Internet browsing habits, to purchasing habits, to movie viewing habits, to search engine habits there is an unprecedented amount of information being collected on each one of us daily.  Check the privacy policies of “free” websites, coupon offers, discounts, and “free” applications downloaded onto smartphones.  Very often the cost of the “free” application is the very valuable marketing information or your contacts list, that they now have permission to collect, when “I Agree” is clicked.   Virtually nothing on the Internet is free.   The cost is the privacy of self, friends and family.   (Scroogle Scraper  http://www.scroogle.org uses the Google search engine but strips information Google collects and saves for two years, about searches and surfing habits ).   Time Magazine (3/7/11)http://www.time.com/time/business/article/0,8599,2058114,00.html had an interesting article about how much about us is being tracked.  Their conclusion was “So what?”   What are the implications for the future?  An article 4/22/11 tells about iPhones/iPads tracking the owner’s location .  What do you think?  Is all this a serious and frightening invasion of privacy or doesn’t it really matter?   (Post a comment below).
  • Identity Theft – Almost all financial transactions now have a digital component to them whether it’s banking online or credit card purchases.  New technology allows payment via codes on smartphones.  Identity theft is used to steal financial information.  Key findings from a recent article  (4/12/2011) in which 42,000 US child ID’s were surveyed and they found that over 10% had someone else using their Social Security number.   The average rate for identity theft for adults is 0.2% (but growing) so childrens’ identity is being stolen at a rate 51 times that of adults.   The website DataLossDB is a voluntary compilation of  known and reported databreaches since 1986, including the latest incidents, the top 10 largest incidents, and information on how the data were lost.  Here’s a graphic comparing the recent Sony databreaches with the 10 largest databreaches of all time.
  • Personally Meaningful Information – photographs, family videos, stories, recipes, may not be of interest to criminals, but they are increasingly being stored digitally on CDs, DVDs, and computers.  Loss of such memorables may cause as much heartache as being the victim of a digital crime.  Consider how to protect digital-emotional valuables to preserve them for future generations.  Think about the future; did you save any photographs to 5.25 inch floppy disks 15 years ago?  Would you be able to view them now?  What are your digital photos stored on now?  Will you be able to view them in 15 years?
  • Intellectual Property – is often in digital form now (downloaded songs, books, photographs, artwork, movies, computer programs) are all protected by copyright laws and illegal copies subject to criminal prosecution if they are found on your computer.  When you buy a CD or video  of music or movies, you own that physical media and it is yours to give or sell as you wish.  But when you download songs, videos and other digital media onto an iPhone, Android, Wii, Xbox or other player, do you still have the right to give it to someone or sell it? (More about that in section X. Legal).  Other forms of intellectual property like architectural plans, engineering plans, trade secrets, specific to industry are being stolen in massive quantities and we don’t even know it until they appear in other foreign countries and in other venues.  As a society we do not completely understand the depth of the concept that information is an asset.
  • Child Pornography – posession of digital pictures of inappropriately clothed minors is a felony crime with mandatory prison time, even if they are pictures of themselves or friends and only stored on the smartphone of your son or daughter.
  • Businesses — in addition to protecting employee information, customer lists, processes, suppliers, proprietary data, intellectual property (patents, processes etc) all fall into the type data that is highly critical to a business’ bottom line.  The profit motive is motivation to calculate the cost of lost time, lost information, or lack of sales making it easier to estimate how much money should (or shouldn’t) be spent on securing data.  Good cyber security is good business.
  • Government — The defense and intelligence agencies deal more with espionage and Advance Persistent Threat (APT=China) than civilian government.   Civilian agencies, federal, state and local, have (like all employers)  an obligation to protect employee data as well as any mission related proprietary or sensitive data .   Without a profit motive, civilian government lacks one of the motivating factors to monetize digital assets which causes problems in determining risk to their data.  Too often in government IT security is regarded as the function of the IT department and not as the critical business function it is.  The time is past when “we can go back to doing it without computers”.  IT and IT security people need to find ways to communicate how much of the business is now integrally dependent on IT functions.  IT and IT security need to work hand in hand for the benefit of the organization’s mission. The business doesn’t differentiate between IT and IT security.  If there is a data compromise, IT gets the blame, not just IT security.  It is in our best interest to work together, constructively.   Good IT security is good business. 

To quote the current CISO of the US Navy:  “It’s about the data, stupid!”


93 Responses to I. Info

  1. 52812 says:

    Having been the victim of identy theft twice – once following the VA data breach and again just recently evidently via the use of a scanner, definitely changed my view of the importance of safeguarding PII

    • Lydia says:

      Can you explain more of what happened (without giving away any personal information) and what you did to recover from it? It’s very hard for people who haven’t been victims to understand how real the threat is and the exhausting years long process of recovering from identity theft.

  2. 01407 says:

    People actually steal other’s information? Not in America…..

  3. dicipulus says:

    Being informed and knowing what to do to be secure is a good feeling – the paranoia that comes with it is a little un-nerving.

  4. DJB says:

    Good points were raised about personally meaningful information, especially maintaining digital photos over the decades as technology continues to evolve.

  5. GTM says:

    I think the IT security people are borrowing phrases from the politicians…. “… it’s about the economy stupid.” A family friend had her identity stolen in 2008 and recently found out when she had a bank credit check done….

  6. 8342 says:

    From the movie Sneakers (1992):

    “There’s a war out there, old friend. A world war. And it’s not about who’s got the most bullets. It’s about who controls the information. What we see and hear, how we work, what we think… it’s all about the information!”

    “The world isn’t run by weapons anymore, or energy, or money, it’s run by little ones and zeroes, little bits of data. It’s all just electrons.”

  7. Mr. D says:

    Anyone who has been the victim of identity theft will know the pain of getting the credit gods to remove faulty info from a credit report. Forget justice… the victim is assumed guilty until proven otherwise.

  8. Ryker Abel says:

    Has anyone else actually watched the video? Does anyone comprehend the shear scope of Linked Data? I just wonder how corporations and government will manage their Linked Data’s proprietary value versus universal benefit?

    • BOEMRE-HERN says:

      I’m watching the video now, and what intrigues me are the question–that no one has bothered to pose yet– and that we may start to answer because of Linked Data. (TBL used the example of scientists studying cancer and coming up with new questions to ask.)

  9. EKW says:

    As a person who loves photography, it’s imperative that I make backups. With 250 GB of data and 12 years of digital images to account for, I would be crushed if the data was ever lost. Using external and cloud backups to safe guard against loss is a must for me. It makes me wonder how much data is lost every day because the average person is not aware.

    • CyberRugged says:

      More info on cloud storage on the Technology page. I just added a number of links exploring cloud storage for personal use…..Have you read the EULA for your cloud provider? Who owns what you store in the cloud? Several of the “free” ones state that by using their service they have all rights over whatever you store with them. Read the EULA carefully!! You may have taken those photographs, but they may now own the rights to them. Can you sell those photos now or will you have to pay the cloud provider a royalty for your photos? If they lose your files, get hacked, go down, or go out of business how do you get your photos back? Nobody really knows the answers yet.

      • 3261 says:

        I do not trust cloud computing because of ownership and security issues, I have backed up my photos myself, have at least two copies and keep them separately, and I have to pro-actively make sure the hardware and software I am using does not become obsolete.

  10. Jose H says:

    Is it really worth the effort to protect our Social Security Number, so much data has been hacked and stolen, that I imagine my SSN is all over the internet. Especially after the VA fiasco.
    But I guess we can prevent the next generation of hackers from getting at it, but I doubt it, they are pretty clever.
    Can our IT Security people keep up with them?

    • A Suggestion... says:

      Perhaps it would be helpful to have a new law that will require that the Social Security Administration to change everyone’s Social Security numbers every 30 days to something with a minimum of 15 characters, including at least one upper-case, one lower-case, one letter, one number, and one special character.

  11. michael says:

    The theft of digital information is so pervasive. Just this year, I had two credit cards compromised and a game site had their information stolen (mine). All the companies involved were very responsive. The game site was down for about a month to determine how their security was bypassed before bringing it back up. I like the idea of using two factor authentication to protect credentials. But the attack seem to be on the databases themselves and this concerns me greatly.

    Anyway, good introduction.

  12. Jean says:

    Very impressive and concise layout of lack of security on the internet. If you are using it and who isn’t, we need to be made aware of it’s pitfalls. Too many users are unaware of these issues.

  13. Always Learning says:

    Interesting statistics.

  14. Alexander says:

    I found the article very interesting, informative and relevant to building awareness. Paradoxically the linked data initiative has great promise and also huge implications for privacy 7 security in our digital lives. If my spending data, medical records, tax information can be linked with some of my PII for example all kinds of inferences could be drawn that could effect an individuals employability, insurability, etc.

  15. KJB says:

    Good points were raised about information, especially how technology continues to evolve.

  16. TJC says:

    It is like anything in life you have to have common sense. Make sure you know who your a communicating with and keep your financial information sacred and look at your reports often.

  17. HM says:

    Knowing that someone can track where we are from our iphone is a bit scary.

  18. headshot says:

    Backing up your personal files shouldn’t be rocket science in this day and age. A 3TB USB drives cost $150.00 ….ten years ago we paid 6 figures for that kind of storage!
    Cloud storage is fine for public information….anything beyond that, and it must be kept in-house…..unless, you’re just looking for someone to point the finger of blame at…. in that case, go ahead and stick your proprietary data in the cloud, I’m sure it’ll be fine.

    • xyzzy says:

      additionally, there is less 4th admendment protection applied to your files stored in the cloud vs. on your personal computer’s hard drive. Getting to your PC in your home still requires a warrant, but at the moment, access to your cloud-stored data does not.

      • Mr. E says:

        I have used several different cloud-based backup providers. The ones I have used allow you to encrypt with your own private key. The data can’t be decrypted by the provider.

  19. Elastic Man says:

    I think the cloud is the way to go. I want my data to be available from anywhere and any time! Besides, A team of university researchers examined more than 100 “popular” Websites and found three-quarters of the sites leaked private information or users’ identifying data to third-party tracking sites. So, you’re probably hosed already….

  20. 87251 says:

    I have an issue with linked data… the problem is that you rely on the input from others which may or may not be accurate and true. Kind of like re-writting Wikipedia to make your political candidate appear to have a brain.

  21. Danho says:

    The genie appears to be out of the bottle. The amount of personal data gathered, and for that matter, the number of times one is caught on video during a week, is almost too great to comprehend. For example, I have three “customer rewards” cards on my keyring, how many do you have? That is little more than a self-imposed marketing survey tracking what you spend, where you spend it, and what you buy.
    Whatever PII is not out there is worth protecting vigorously.

  22. IT Guy says:

    In this day and age you would there is more common sense and awareness that would minimize the security risk. Unfortunately, too many people have become comfortable or maybe it’s ignorance that has put so much data at risk.

  23. W says:

    remember the adage
    once on the internet, forever on the internet

  24. ALillian says:

    More education and material is needed up front for users to really understand security issues when using digital technology. Most of us do not read up front the lengthy material on how an app, internet, links, etc. run on our devices — only after issues are raised to higher levels through news media or other do we realize the threat or harm.

  25. 51484 says:

    Since dumpster diving is one methods identity thieves use to gain access to PII, I try to protect my personal information by using a cross-cutting paper/credit card shredder.

  26. Evolution thru growth says:

    Wouldn’t it be great if the technology was not so rapidly changing until the idea of standardization is rushed to production without having the time to formulate an adequate baseline from which we grow…. The details are in the data, however, verifying, recompiling and revamping the data into a format that is acceptable to all is somewhat counterproductive. We need to be able to articulate more clearly what the end game is up front.

  27. Chris says:

    Over the past few months, 3 of the services I use, two credit card and one entertainment, were hacked and information stolen. How much data theft must occur before companies pull data back from the edge of the internet and protect it? Obviously, it takes more than Citibank, Sony and other really big names being hacked before these companies begin to get the message, but how many of us will suffer identity theft and our lives ruined while we wait?

  28. Monique says:

    Identity theft is very serious. I’ve had one family member who’s identity was stolen twice in past 2 months from the same institution. Although the money was returned, it really made me realize how easy it is for everything to be taken from you quickly. Yes everyones information should protected, but at what cost? Nothing is 100%.

  29. OctalMan says:

    World Cyber War I is nigh – Anonymous, LulzSec, etc vs. Governments and Corporations of the World. The difference between a Freedom Fighter and a Terrorist is moot for the average victim of cybercrime or the reactions to cybercrime. We are like the town’s people of Europe and Asia in WWII.

    And what if WordPress gets cracked?

    • tcm says:


      You almost have the rub of it. The fact is; what you so colloquially termed “World Cyber War 1” is already long upon us.

      To momentarily discuss the most obvious example, the official stance of the Chinese government is that global cyber-warfare is not only already being waged, but more importantly originated with (and is being perpetuated by) the United States. The battles that you envision occurring at some point in the future are being waged today. I would point you to several online articles for reference, specifically:


      On this topic, Mr. Richard Bejtlich (Chief Security Officer; Mandiant, former USAF Captain, member and leader of AFCERT) recently stated:

      “China’s view is more important than yours, because China is acting on its view while too many in the West and the US in particular argue about whether or not a cyberwar is happening. The Chinese believe cyberwar is ongoing, and that the US started it. From what I can tell, the Chinese intend to win it.”

      As a somewhat anecdotal ending point; WordPress was hacked approximately 24 hours after it was released. I’m afraid you’ll find no refuge here.

  30. Terry says:

    At least one thing that becomes clearer as technology forges ahead is that it creates a lot of jobs for the IT security folks.
    If history serves us right, the only deterrent to the security breach is the stipulation of federal laws to protect the public from invasion of privacy and illegal use use, sale and misrepresentaion of one;s information.
    Unfrtunately legal stipulations are way behind the curve and do not keep up with the pace of tech advances.
    One has to be cautious as to what information he/ she puts out there. But is caution enough? There is already so much information out there about every indivdual and you might as well say the damage has already been done if laws are not put out there in vigorous and robust ways keeping up with new technology to deter those that are criminally minded or would strive to make money at the expense of the destruction of another’s life

  31. Tilmon says:

    I was very suprised to read that child identity theft is so high.

    • Still Learning says:

      My guess is these companies are not validating the ss# and other information gathered with the Social Security Adminiatration. Just checking the date of birth associated with the ss# would be a red flag, and a quick denial, followed by a call to the police.

  32. Charlie says:

    Password protection is becoming a problem. Most people use the same password for many of their online accounts. When a site with weaker security gets hacked, sites with stronger security become compromised for that person. Also, faster computers are requiring longer passwords, which makes it harder for someone to be able to remember multiple passwords for multiple sites.

  33. fred says:

    It is amazing how often we are asked for PII, and often times it is a result of the company abusing its customers rather than a necessary business practice.

  34. bl says:

    So, Tim Berners-Lee was the creator the World Wide Web. And who claims to have created the Internet? I guess the idea was posted on the Cloud where it was up for grabs where intellectual property is not protected.

  35. jdk says:

    The information people dump on social sites and photo storage is no different than the crap they spewed years before when BBs were a gateway. Even before that I could guess people would spew their personal information, just face to face instead of the now standard social plugin.

    Collection of data hasnt changed, just the method. If anyone feels like their sharing too much information, its because they have, and any average joe web surfer, either knowingly or unknowingly has dumped enough personal stats to be googled either by real name or some handle they used years ago. At this point, if youre living under a rock, you stand the best chance not to have youre information scraped together and made into a poster. Even then if you get mail youre still numbers and names floating on the interwebs.

    Good information, just old as hell…pass

  36. jdk says:

    Easy, make them the victim, and force them to get their own identity back.
    That cost zero dollars and itd be interesting as heck to see what they learn.

  37. TM says:

    I find that real photos last a lifetime and they can always be viewed. It is amazing to me to think that the technology has come so far; but not without ramifications

  38. G says:

    TED once again confirms that it was Tim Bernes-Lee not Al Gore that invented the World Wide Web.

    • Lydia says:

      The Internet and the Web are different animals. The Internet is the interconnected physical devices, infrastructure, protocols and software that store information and permit communication between any devices connected to it. The Web is the software used to search, organize and display the information stored somewhere on the Internet. The Internet, initially called “ARPANET” was “invented” on October 29, 1969 when a guy named Charlie Klein at UCLA successfully sent packets to a computer at the Stanford Research Institute. The transmission capability was designed and developed with funding from a military grant, to be a reliable communication method in the event of nuclear attack. The Internet was text based for 30 years from 1969 until 1999. In 1999, Tim Berners-Lee designed and wrote HTML which enabled graphical display of the simple text that had been the display option up until then. HTML allowed the creation of the World Wide Web (the Web) which specifically permits graphical display of pages, formatting, graphics, and all the other capabilities which are now so much a part of our lives, we forget they didn’t exist only 12 years ago!

  39. cxs says:

    Interesting about child identity theft.

  40. The Man says:

    With all the laws tht are on the books. Why aren’t they harsher for the criminial? They shoiuld do like the theives in other foreign counties and cut off a finger or hand. Then maybe the light will go on for others.

  41. AKBowhunter says:

    I have been the victim of fraud two times and I have lost count how many letters I have recieved telling me my info has been compromised. On each occassion it was a Federal or State enity that was the cause of my PII going out on the web. I think mandatory criminal charges and jailtime should be given to whoever does the posting and their supervisor and they should be held liable for any damge that their actions may have caused. I have gone as far as to stop all actions on the web except when forced to just so I can maintain some sort of sound mind. an electronic PTSD? I don’t even feel comfortable putting my work email out on the web

  42. Tobydog says:

    Wow, of the 10 largest data breaches, 3 turned out to be governments. Who knew even governments don’t protect our information

  43. The Eye says:

    I wonder–how do we impress the importance of protecting all PII upon the young and the elderly population..

  44. Dave says:

    I didn’t know he invented the web?!

  45. WWW_Gullible says:

    Does this mean I should’t believe that my good friend, that I don’t know, in Nigeria wants to give me money?

  46. drj2011 says:

    The children’s and elderly’s PII has to be monitored by their parents and/or children. The problem is finding out where to PII is being used, and then if you are checking on this, you might be exposing those PII by looking for its inappropriate use.

  47. vieuxdeux says:

    I love the www and I am very grateful that someone let Tim “play around” to make his ideas a reality. I wish he was less of an idealist. I learned while living in IT central, silicon valley during the 90s, that all the utopian things that brilliant IT folks dream up don’t necessarily work for businesses. I remember explaining why the web was not a panacea to a room of IT students who were starry-eyed about the next big www announcement. The next big announcement was that the dot com bubble had burst and the stock market plummeted. I still have my USA Today that I took to class the next day with the crashing chart and a picture of a man holding his head in his hands. Lots of techies lost their jobs. Most of those internet startups went out of business and the lucky few are just now entering the black 10 years later! Consider carefully before leaping to embrace new technology…

  48. Arctic says:

    Interesting piece, but I wish they would do away with trying to distriguich between military and civilian agencies. Some civilian agencies are managing assest (dams, energy, minerals, etc) which are every bit as valuable as military resources.

  49. QR says:

    I am very concern about internet users private information getting into the wrong hands. It makes me very uncomfortable.

  50. Patricia Thaggard says:

    I’ve been a victim. My bank account compromised. Be very vigilant.

  51. Juice says:

    I wonder if network engineers or people who work on the server can check patient’s medical records.

  52. Joe says:

    I’d be curious to see the differences between PII definitions from state to state, or even other countries.

    • Lydia says:

      Very interesting question! Massachusetts has the strictest law in the US, effective 1/1/2011, followed by California. Here are some descriptions (search on “state privacy laws” for more): http://www.ncsl.org/default.aspx?tabid=13463

      Germany, and Europe in general, has the strictest privacy laws in the world–they are 10 years ahead of the US, likely because of the severe privacy abuses leading up to World War II. Argentina also has strict privacy laws, perhaps because of large numbers of post WWII immigrants from Europe? For cloud computing it’s an enormous issue. Cloud providers store our data where it’s cheapest — not necessarily the same places as whre it’s most secure! Here’s an interesting map of privacy law strength, worldwide. http://www.forrester.com/cloudprivacyheatmap

  53. concerned says:

    the more I read on this subject the more I believe are freedom is at risk

  54. leewelch32 says:

    It is ALL about the data, linked data is scary stuff in the wrong hands…users!!! (myself included)

  55. Longshot9 says:

    I enjoy the fact that the entire web concept was created outside normal development channels. It’s particulalry ironic given the nature of the security training in this course. Compartmentalizing your data with paranoid layers of security is counter to the very innovation environment that might create something useful. Data is valuable unless the people who need it never see it. Then it’s an expensive set of ones and zeroes.

  56. protectmydata says:

    If you don’t want your data hacked, keep it off the WEB.

  57. rpl3 says:

    Interesting way to force people to worry about data loss. Good job.

  58. ukI says:

    Very interesting thoughts here regarding privacy. Sometimes it seems like it is impossible to have any concept of privacy in the online world with private information being collected in so many different ways that is difficult to keep track of.

  59. Elaine says:

    Is the government ultimately capable of fully protecting its information and is it investing sufficiently into cyber security? The case with WikiLeaks brought the dialogue about protection of government data to a whole new level.

  60. AC says:

    The training offers up a great deal of practical information which has applicability both at work and at home. The emphasis on due care and protection of the most valuable asset, information, should translate to a more secure environment in the workplace and at home. The average user would be shocked to discover the amount of personal information they “voluntarily” give up when they forgo reading the lengthy EULA and click Accept.

  61. Mike says:

    It is amazing to me how the media that we use to record and compile our data does not have a longer life cycle. With technology changing daily hopefully there will be a solution to long term storage.

  62. RS says:

    I feel extremely lucky that I am not a victim. Hopefully it isn’t a matter of time.

  63. CDPc says:

    “Virtually nothing on the Internet is free. The cost is the privacy of self, friends and family.” How true…

  64. Mark D. says:

    There’s some solid information here, but what I really appreciate are some of the links. Though I knew of one of the sites already, I’d lost the url years ago and had completely forgotten about it. But particularly handy are:


    These are now tools I’ll be using outside of work too.

    In regards to the Linked Data discussion, I do think Tim Bermers-Lee had some interesting things to say. He’s obviously very passionate about the concept, and it’s a good one too! But I found the part about everyone doing their bit–and then everyone else doing theirs to make it happen–particularly interesting.

    It’s a community too right? It’s all about being connected. It’s all about sharing data. It’s all about this data being an incredible resource once it’s shared. It was a sort of call to arms to database huggers–or maybe even the lazy–to get off their duff and do their part.

    I can get on board with that.

    But It has an inherent flaw–it requires a community’s participation to flourish. Let’s be honest here, that can be a hassle for most people. Have you ever edited a Wiki of any type? I think most people (not all) generally don’t want to sit down and edit Wikipedia.com or go to OpenStreetMaps.com and tag their local theater, and I think that’s human nature. So the idea of anyone–particularity a corporate Enterprise–sharing unaltered data before the front-end (website) is even built sounds a bit Utopian. Sure there are people out there who want to do this stuff, but a movement pf this sort is on a much larger scale.

    To be clear I’m not saying this isn’t a good idea –I like the idea A LOT and I think it’s a great philosophy–but unfortunately it just doesn’t sound feasible. That’s essentially because of human nature if nothing else.

    Then again I could be wrong because I’m in need of more coffee! 🙂

    Good info, thanks.

  65. Sherri says:

    Identity theft is a very scary thing. I know someone who spent thousands of dollars to get her name cleared after having her identity stolen.

  66. AID says:

    This information is very useful and informative. Every one should realize that digital information is an asset which needs to be protected by users.

  67. EJF says:

    Interesting statistic on the percentage of children’s indenty theft (at a rate 51 times that of adults). Security expert Dan Geer proposes “attitudes about privacy are generational and that current youth have grown up with a lower expectation of privacy.”

  68. DJM says:

    It’s amazing that the more we rely on technology to improve our lives the more we complicate our lives with concerns of identity theft, viruses, maleware, ect.

  69. Beelzebubba says:

    The guy is interesting and did a lot of good work while with CERN, but to say “I created the world wide web”, is pretty bold. In fact it’s down right misreprentative of what was going on with evolving standards and the internet. See the “Legacy” section of the Wikipedia entry for MacIntosh’s Hypercard software. http://en.wikipedia.org/wiki/HyperCard
    Mr Lee is a little full of himself…he basically put some existing concepts together and formed a better standard…still, very monumental stuff, but he should give more background and credit where credit is due and stop acting like the WWW was created in a vaccum by Sir Lee.

  70. Kevin says:

    Seriously, the information presented here is very helpful. I have a non-paid charge on my credit history since 2005 that I’ve tried to get removed and resolved to no avail so far.

  71. TP says:

    Tim Berners-Lee’s invention of the WorldWideWeb is the modern day equivalent of Gutenberg’s invention of the printing press in the dissemination of knowledge

  72. tsb says:

    Most people can really relate to physically losing personal items and affects that they have some emotional connection to – for example in a Hurricane- that are not replaceable. If we can think of these our personal data on the Internet as these personal items, we may be more aware of the threat and vigilant to protect it from Internet “hurricanes”.

  73. April says:

    Useful information here about avoiding certain combinations of personal data in emails.

  74. Some Dude says:

    Translucent Databases by Peter Wayner ISBN:0-9675844-1-8
    Secrets & Lies by Bruce Schneier ISBN: 0-471-45380-3

    • Freddie says:

      These days you can never be too safe. I hate it that when you get blood work done or some out-patient procedure you have to give your DOB and SSnumber.

  75. govamigo says:

    Learned some new facts about PII. I did not know that it only takes three pieces of infromation to identify a person. Its good to refreash everyone’s knowledge on computer security.

  76. durbin says:

    Doctors are more aware than you think. If they want to get paid by most insurers, they have to meet security requirements. If they don’t want to be fined heavily for violating HIPAA, they have to meet security requirements. But most importantly, the responsibility does not lie entirely in the doctor’s lap. YOU own your medical records, regardless of what format they are in. You share the responsibility in securing them.

  77. Corbyn says:

    Interesting stuff… particularly the Advance Persistent Threat. Not only is this information good to know for activities conducted at work, it is also resourceful to utilize in ones personal life too. I plan on sharing this with my children and making them aware of the hidden threats that are lurking in the cyber world. I think they’ll have a different approach when they read this.

  78. IT Manager says:

    Perhaps an individual could simply be “lost” in the vast magnitude of the data out there. At the end of the day, the information must have some value (i.e. could be sold our used to make money). Reducing your digital footprint seems in order, but you cannot totally erase yourself from the internet unless you unplug everything.

  79. BABA says:

    I thought Al Gore invented the internet. Good to know that Tim Berners-Lee is the inventor of the World Wide Web. Being that I have a young child growing up in the digital age, this information is more relevant and important than ever to realize it is always going to be part of our daily life from now on

  80. MT@BOEMRE says:

    I plan on sharing the link for cyberrugged with my entire office. Good information.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s