Partner Perspectives  Connecting marketers to our tech communities.
11/1/2016
01:40 PM
David O'Berry
David O'Berry
Partner Perspectives
50%
50%

We Must Become Good Digital Citizens

Digital citizenship carries many capabilities and benefits, but there also have to be some rules and responsibilities.

Many would say that being a good citizen includes respecting the rights and property of others, following the rules, taking responsibility for your actions, and generally working to maintain and improve the people and places around you. Our society has grown gradually over generations, with a mixture of property and personal rights, written and unwritten rules, and a variety of culture and traditions.

Our digital environment has grown quickly and haphazardly, with new things grafted on top of the old, few codified rights, existing rules and laws bent and mutated to try to fit the digital realm, and a very different set of cultures and traditions. How can we broaden the concept of good citizenship to our rapidly changing digital world?

As a security professional, I’m going to look at the subset of this question that applies to protecting rights and property.

In the physical world, we take responsibility for protecting our own property, both from nature’s actions and human ones. If we build a home in a hurricane zone, we add shutters to the windows, build the house on stilts to keep it above floodwaters, and take other recommended precautions. To protect against human threats, we use fences, motion sensors, and burglar alarms. Since the only safe digital neighborhood is one with absolutely no Internet connection, we need to take similar responsibility for protecting our digital assets. This is not a recent development, yet we still see far too many security breaches and data thefts. So how can we help people become better digital citizens who are able to protect themselves and others?

As a society, we have addressed various emerging threats to physical health and property in the past through nagging public reminders, overt education, and increased consequences. Sometimes, we require proof of ability with licenses and certifications, to assure us that we are in safe hands. Is it time to apply similar techniques to digital security?

Digital Healthcare

We may have a few unhealthy habits, but we generally try to follow guidelines for better health and have a range of services available to help with emergencies, acute problems, and chronic issues. We often go for annual checkups and will frequently look up symptoms on the Internet to help determine if we need to see a professional.

What could digital healthcare look like? There are vendors that provide emergency and acute-care services for digital devices, and many offer checkups and other preventative measures. But few of us take advantage of such services, whether because of the cost, complexity, lack of awareness, or inconsistent quality. Many large organizations have internal programs for their own equipment and employees, but they do not extend beyond the corporate walls into the home.

Educate The Children

When we try to make a significant change in our society, sometimes we educate our younger generation and rely on the generational shift to affect change. We teach children in schools about citizenship and health. We have sports organizations to improve fitness and help them protect themselves. We have other groups that offer badges and certificates for learning specific skills. Is it time for digital scout badges, cyber martial-arts belts, or credits for Internet citizenship?

There are a lot of gaps that need to be addressed as our society and cultures adapt to the digital age. This will be a lifelong activity for many, as we learn more about our digital interactions and people continue to invent new devices and applications. Digital citizenship carries many capabilities and benefits, but there also have to be some rules and responsibilities. Whether we go the explicit route with licenses and badges, or the tacit route with expectations and peer pressure, it is time to take our membership in this digital nation seriously.

David O'Berry is a reformed CxO/CIO currently working for the "Dark Side" in Worldwide Strategic Technologies within Intel Security Group's Office of the CTO. He spent 19 years on the enterprise side as a network manager, director of information technology systems and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11232
PUBLISHED: 2018-05-18
The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.
CVE-2017-15855
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, the camera application triggers "user-memory-access" issue as the Camera CPP module Linux driver directly accesses the application provided buffer, which resides in u...
CVE-2018-3567
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing the HTT_T2H_MSG_TYPE_PEER_MAP or HTT_T2H_MSG_TYPE_PEER_UNMAP messages.
CVE-2018-3568
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, in __wlan_hdd_cfg80211_vendor_scan(), a buffer overwrite can potentially occur.
CVE-2018-5827
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing an extscan hotlist event.