Concept 3: You have to trust someone. This is true in both the physical and electronic world.
- You put letters in the mailbox trusting your neighbors and the USPS to do and not do what they are supposed to do.
- Ever get in a car and drive down the street with oncoming traffic? Those yellow lines actually protect you from those cars or are you trusting complete strangers?
- We all make phone calls communicating the most intimate details of our lives to others. Countless phone company employees have the ability to capture or monitor these calls illegally using the same functions legally used by law enforcement with warrants. Not that tough for someone to hack into calls from the phone boxes in your neighborhood.
- Got a bank account? A credit card account? Your funds are more electronic than anything else accessible to dozens if not hundreds of financial institution employees.
Phone companies, cable companies, health care organizations, financial institutions, internet service providers, etc. are all regulated and have dizzying arrays of security controls in place. Problem is that they are staffed by humans and humans are immoral, easily tempted beings, which is why the regulations and security controls are in place. Controls are just that. See Concept 1, above. The postman can easily steal your checks, a phone technician can easily bug your calls, a bank employee can easily transfer your funds elsewhere.
Review Concepts 1 and 2 below. Concept 4 on tomorrow!
Concept 1: Security is never perfect in either the physical or electronic world. This is the first concept to accept before you move forward. There's just a spectrum from less secure to more secure, but nowhere on the spectrum does "perfectly secure" exist.
- People lock their houses and have security systems and yet still get burglarized.
- Banks have more security than 90% of most enterprises and certainly individuals can afford, or in fact "need", but still they get robbed, both in the physical and virtual world.
- Both land-lines and mobile phones have security functions built in, but still calls get intercepted, recorded and exposed.
- PCs, mobile phones, routers, wi-fi, etc. all have security components, but as the news daily attests, data is constantly compromised. Banks, large corporations, governments, militaries and individuals data is successfully assaulted and security efforts thwarted.
Concept 2: Being insecure is easier than being more secure. The fact this page exists and that you are spending even a few seconds perusing it proves the fact. If it was easy, you'd already be as secure as you wished and this content would be of no interest. Being secure takes some thought, planning, ongoing diligence, time and money.
Electronic security is a hot topic and always will be. This is just as true in the physical world! While some do go to extremes in attempting to remove themselves from the bulk of the "real world", the fact is you can't opt-out of the physical world. We all accept various levels of personal risk every day. The electronic, virtual world is no different. Consider what it would really take to go "off the grid". Give up owning property of any kind, give up banking, never pay taxes, give up on insurance of any kind, drive untitled and unlicensed... you get the idea. You and your data is online somewhere. What's more dangerous for someone to know, your real world address or your email address?