{"id":11002,"date":"2019-06-05T11:45:50","date_gmt":"2019-06-05T18:45:50","guid":{"rendered":"https:\/\/www.rentecdirect.com\/blog\/?page_id=11002"},"modified":"2019-06-05T13:54:13","modified_gmt":"2019-06-05T20:54:13","slug":"cyber-security-and-humans","status":"publish","type":"page","link":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/","title":{"rendered":"Open the Pod Bay Doors HAL | Luis Soto"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11004\" src=\"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans.jpg\" alt=\"cyber security and humans\" width=\"900\" height=\"506\" srcset=\"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans.jpg 900w, https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans-300x169.jpg 300w, https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans-768x432.jpg 768w, https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans-600x337.jpg 600w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Isn\u2019t it easier to have one password for every account you have online? It prevents filling your room with sticky notes for every new account you make. But this means that when the security of one of these websites is compromised, every account you have is at risk of getting hacked. Even then, people choose not to change their password, because they believe it&#8217;s unlikely anything will compromise their security. However, just about anyone can be the victim of an online attack. Many people&#8217;s passwords also are on the simpler side to be easier to remember. Nobody can remember a string of letters, numbers, and symbols. But a loved one&#8217;s birthday or the name of your favorite movie is much simpler to remember. These passwords are the easiest to crack, with the rise of guessing algorithms powered by faster and faster computers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If people aren\u2019t practicing online safety guidelines while surfing the web, then the industry will have to take responsibility. This is a huge burden on many companies because no wall is without cracks. Exceedingly, it has been shown that even the tech giant Apple can&#8217;t prevent exploits such as the Jailbreak in their phones. Every time they patch the way in, hackers\/developers find a new way in. The future of security will be no different the cat-and-mouse game that is already happening today. Constantly, we find unintended ways in and developers have to patch them. The job of a programmer, like myself, is to find and patch bugs laboriously, especially with security risks but no individual, group, or the corporation will find make a program 100% exploit free.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With both human behavior and developers being fallible what solution is there in sight? We have gone great leaps to avoid the need to rely on just a string of letters to gain access. Google was one of the pioneers of two-factor authentication. This technology alone allowed for people to know just who is trying to get access to their accounts by requiring one&#8217;s phone to alert the user and allow access. Other forms as passcodes such as FaceID and TouchID also increased security alongside with convenience. One&#8217;s own face is hard to replicate to a camera that measures depth which means unless hackers use 3D printers, we&#8217;re safer using it. It is also faster than typing out a password for convenience&#8217;s sake. More innovations that require active participation from the user is the future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But how much safer can we get than 3D modeling our face? Are we comfortable with taking a blood sample every time we need to unlock our phone? Ignoring the logistics of taking blood samples every few minutes and its toll on the body, this question shows how authentication is a struggle between security and trust. Even FaceID struggles with this dilemma. We probably wouldn\u2019t trust our phone to collect blood samples and we barely trust that our phones aren\u2019t uploading our face to a database that Apple sells access to. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yet we take that risk. Because the effects of having your identity stolen online are much more tangible than the effects of companies collecting more and more information on us. We fear what we can see but what we can\u2019t only lurks in the shadows of the unconscious. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlock my iPhone Siri.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019m afraid I can\u2019t do that user\u2026<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\u2026your face is too far from the camera.<\/span><\/p>\n<hr \/>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11003 size-thumbnail\" src=\"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Luis-Soto-e1559760048286-150x150.jpg\" alt=\"Luis Soto\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Luis-Soto-e1559760048286-150x150.jpg 150w, https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Luis-Soto-e1559760048286-440x440.jpg 440w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<h3>About the Author<\/h3>\n<p>Luis Soto is a part of Northeastern University&#8217;s 122nd entering class, where he studies Computer Science and Computer Engineer.\u00a0 \u00a0Luis hopes to one day\u00a0own a company that finds applications for machine learning algorithms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Isn\u2019t it easier to have one password for every account you have online? It prevents filling your room with sticky notes for every new account you make. But this means that when the security of one of these websites is compromised, every account you have is at risk of getting hacked. Even then, people choose [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":11004,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"iawp_total_views":0,"footnotes":""},"class_list":["post-11002","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Open the Pod Bay Doors HAL | Luis Soto<\/title>\n<meta name=\"description\" content=\"Expore cyber security and the relationship users and developers have in maintaining security as technology advances in our modern world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open the Pod Bay Doors HAL | Luis Soto\" \/>\n<meta property=\"og:description\" content=\"Expore cyber security and the relationship users and developers have in maintaining security as technology advances in our modern world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/\" \/>\n<meta property=\"og:site_name\" content=\"Rentec Direct Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/rentecdirect\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-05T20:54:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@rentec\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/cyber-security-and-humans\\\/\",\"url\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/cyber-security-and-humans\\\/\",\"name\":\"Open the Pod Bay Doors HAL | Luis Soto\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/cyber-security-and-humans\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/cyber-security-and-humans\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Cyber-Security-and-humans.jpg\",\"datePublished\":\"2019-06-05T18:45:50+00:00\",\"dateModified\":\"2019-06-05T20:54:13+00:00\",\"description\":\"Expore cyber security and the relationship users and developers have in maintaining security as technology advances in our modern world.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/cyber-security-and-humans\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/cyber-security-and-humans\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/cyber-security-and-humans\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Cyber-Security-and-humans.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Cyber-Security-and-humans.jpg\",\"width\":900,\"height\":506,\"caption\":\"cyber security and humans\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/cyber-security-and-humans\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open the Pod Bay Doors HAL | Luis Soto\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rentecdirect.com\\\/\",\"name\":\"Rentec Direct Blog\",\"description\":\"Property Management Software News | Rentec Direct\u00ae\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/#organization\",\"name\":\"Rentec Direct\",\"url\":\"https:\\\/\\\/www.rentecdirect.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/rentec_icon_square.png\",\"contentUrl\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/rentec_icon_square.png\",\"width\":377,\"height\":377,\"caption\":\"Rentec Direct\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rentecdirect.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/rentecdirect\\\/\",\"https:\\\/\\\/x.com\\\/rentec\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rentec-direct\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/rentecdirect\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Open the Pod Bay Doors HAL | Luis Soto","description":"Expore cyber security and the relationship users and developers have in maintaining security as technology advances in our modern world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/","og_locale":"en_US","og_type":"article","og_title":"Open the Pod Bay Doors HAL | Luis Soto","og_description":"Expore cyber security and the relationship users and developers have in maintaining security as technology advances in our modern world.","og_url":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/","og_site_name":"Rentec Direct Blog","article_publisher":"https:\/\/www.facebook.com\/rentecdirect\/","article_modified_time":"2019-06-05T20:54:13+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@rentec","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/","url":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/","name":"Open the Pod Bay Doors HAL | Luis Soto","isPartOf":{"@id":"https:\/\/www.rentecdirect.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/#primaryimage"},"image":{"@id":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans.jpg","datePublished":"2019-06-05T18:45:50+00:00","dateModified":"2019-06-05T20:54:13+00:00","description":"Expore cyber security and the relationship users and developers have in maintaining security as technology advances in our modern world.","breadcrumb":{"@id":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/#primaryimage","url":"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans.jpg","contentUrl":"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2019\/06\/Cyber-Security-and-humans.jpg","width":900,"height":506,"caption":"cyber security and humans"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rentecdirect.com\/blog\/cyber-security-and-humans\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rentecdirect.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Open the Pod Bay Doors HAL | Luis Soto"}]},{"@type":"WebSite","@id":"https:\/\/www.rentecdirect.com\/#website","url":"https:\/\/www.rentecdirect.com\/","name":"Rentec Direct Blog","description":"Property Management Software News | Rentec Direct\u00ae","publisher":{"@id":"https:\/\/www.rentecdirect.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rentecdirect.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rentecdirect.com\/#organization","name":"Rentec Direct","url":"https:\/\/www.rentecdirect.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rentecdirect.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2022\/05\/rentec_icon_square.png","contentUrl":"https:\/\/www.rentecdirect.com\/blog\/wp-content\/uploads\/2022\/05\/rentec_icon_square.png","width":377,"height":377,"caption":"Rentec Direct"},"image":{"@id":"https:\/\/www.rentecdirect.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/rentecdirect\/","https:\/\/x.com\/rentec","https:\/\/www.linkedin.com\/company\/rentec-direct","https:\/\/www.youtube.com\/user\/rentecdirect"]}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P5jt1p-2Rs","_links":{"self":[{"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/pages\/11002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/comments?post=11002"}],"version-history":[{"count":3,"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/pages\/11002\/revisions"}],"predecessor-version":[{"id":11011,"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/pages\/11002\/revisions\/11011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/media\/11004"}],"wp:attachment":[{"href":"https:\/\/www.rentecdirect.com\/blog\/wp-json\/wp\/v2\/media?parent=11002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}