DIGITAL IDENTITIES AND DIGITAL SECURITIES

Visual summation: Week 2, DIGITAL IDENTITIES AND DIGITAL SECURITIES

digital-identity

Image 2

Explore the week 2 topic on “digital identities and digital securities” in the Prezi included below (click on the link provided below)

https://prezi.com/view/vSiK6iSIug40dEoJIQj2/

Written entry of the prezi link provided:

A digital identity is an identity you carry in real life but an internet equivalent. This identification is used for transactions and connections within the digital world. “Our digital identity is the permanent collection of data about us that is available online” (adapted, The Web, & Design, 2015). It includes everything we do on a digital platform from searches, to social media, online purchase and emails. We are a part of the digital world, therefore, our digital identity is becoming more crucial and detailed.

“More than 75% of employers actively research candidates online” (Fertik, 2012). It has become increasingly important to have a positive online identity as “70% of these employers has decided not to hire a candidate based on what they have found” (Fertik 2012). It is important to choose a professional and well-known platform i.e: LinkED to show information you wish the world to see, whilst keeping other information private.

Retrieved from: https://www.youtube.com/watch?v=uJzuDcyR0WM

We are faced with vulnerability online for example online banking:

  • Weak passwords
  • Sharing passwords
  • Using the same passwords
  • Easily answerable security questions

    passwordblog-300x125

    Image 3

ThreatMetrix is introduced as “The Digital Identity Graph maps the ever-changing associations between people and their devices, locations, account credentials, and behavior to form an adaptive, global framework of anonymized user identities used for fighting cybercrime—without compromising privacy” (ThreatMetrix, 2017).

Retrieved from: https://www.youtube.com/watch?v=qwSAree_vOU&t=67s

We should all understand that the information we portray on the internet forms our digital identity can be easily found and accessed by others depending on the privacy settings. Therefore we must make sure our information is digitally secure. Digitally secure “is the protection of your digital identity… digital security includes the tools you use to secure your identity” (“What is digital security? ” N.D). We sometimes unintentionally give out information that may put our digital security into risk. This includes the pictures we put up, information such as where we work, live or study. All these information may compromise our safety.

As we are all part of a digital world, it has its pros and cons. We are more digitally active therefore our lives become intertwined with digital world and identities. Protecting our private information and identities on the web is important for our digital security.

References 

Adapted, U.-D., Web, T. W., & Design, G. (2015). How are you defining YOUR digital identity? Retrieved from http://www.binarytattoo.com/about-us/

Fertik, M. (2012, April 3). Your future employer is watching you online. You should be, too. Retrieved from: https://hbr.org/2012/04/your-future-employer-is-watchi

Image 2. (2016). digital identity. Retrieved from: http://www.binarytattoo.com/about-us/

Image 3. (2015). Retrieved from https://www.securestate.com/blog/2015/02/06/weak-passwords-leave-you-open-for-attack
ThreatMetrix. (2017). Digital Identity Graph. Retrieved from https://www.threatmetrix.com/cyber-security-software/digital-identity-graph/
What is digital security? (N.D) Retrieved from:
https://www.justaskgemalto.com/us/what-digital-security/
Prezi References

Image 1. (2017). Retrieved from https://hayleyinadigitalworld.wordpress.com

Image 2. (2017). Retrieved from http://www.journalofaccountancy.com/issues/2015/jun/cpa-firm-digital-marketing.html

Image 3. (2017). Retrieved from http://www.cbronline.com/what-is/what-is-linkedin-4923555/

Image 4. (2017). Retrieved from https://betanews.com/2014/09/30/weak-passwords-are-still-a-major-problem-for-business-security/

Image 5. (2017). Retrieved from https://www.securestate.com/blog/2015/02/06/weak-passwords-leave-you-open-for-attack

Image 6. (2017). Retrieved from https://blog.lastpass.com/2016/05/infographic-is-your-company-just-1-weak-password-away-from-a-security-breach.html/

Image 7. (2017). Retrieved from https://www.howtogeek.com/185354/security-questions-are-insecure-how-to-protect-your-accounts/

Leave a comment