The Windows 7 Action Center
Information Security and Sanctification
James Gheen
Liberty University
Lynchburg, Virginia
Abstract The increase of technology has given us luxuries beyond our ancestor’s imagination. Yet, with the growing technological advances information security among the cyber world is also a growing concern. Hackers and cyber criminals are lurking to and fro seeking security vulnerabilities to devour personal computers and computer systems alike. Their methods run into malicious behavior in the form of developing malware that includes several types; viruses, worms, botnets, Trojan horses and logic bombs. Moreover, to the Christian our very own sanctification has hindrances as well. In
…show more content…
Table of Contents
Abstract……………………………………………………………………………………. 2
Introduction……………………………………………………………………………….. 4
Action Center……………………………………………………………………………… 4-5
Maliciousness…………………………………………………………………………….. 5
Malicious Software……………………………………………………………………….. 6
Malicious Sin……………………………………………………………………………… 7-8
Anti-Maliciousness……………………………………………………………………….. 8-9
Conclusion………………………………………………………………………………… 9
References…………………………………………………………………………………. 10
Introduction As the world becomes more engrained with technology. The growing threats and security vulnerabilities propose a great concern to keep our digital information private and out of the hands of thieves, hackers, and abusers. According to David Donahoo quoted in the Liberty Journal, “The more information that is available in the cyber world, the larger the pie becomes as far as a cyber criminal is concerned.” (Menard, 2015) In other words, information security is becoming a vital intrinsic absolute when we consider the luxury our technology has brought us on a daily basis. More so, in the spiritual sense the biblical doctrine of sanctification also plays a vital role in the health of our own spiritual lives. Sanctification as defined by Wayne Grudem, “is a progressive work of God and man that makes us more and more free from sin and like Christ in our actual lives.” (Grudem, 1994) With that said,
“The task is simple to explain but harder to achieve. If we do not incorporate adequate security measures in our computer and communications infrastructure, we risk being overwhelmed by external enemies. If we put an externally focused view of security ahead of all other concerns, we risk being overwhelmed by their misuse. We must find a set of rules and a mechanism for overseeing those rules that allows society to defend itself from its genuine enemies while keeping communication surveillance from stifling dissent, enforcing morality and invading privacy. If we do not, the right to use privacy –enhancing technology that was won in the 1990s will be lost again.”
Computers have become part of our daily complex lives; we depend heavily on computers to help break our complicated lives down. Most people now prefer to do things the digital way and so does companies. Most of trading (buying and selling) is now online which requires computers. In order to satisfy our hunger for digital living, there is a need for technology called the operating system to carry out the activities we require our computers to do. Computers and technology come in different forms and sizes and due to the capitalistic nature of our economy everyone is allowed to come up with their own form of computer and even the technology to run it. In recent years’ companies have gained interest doing business digitally and since software have become easier to write or code, it is also vulnerable- easy for programmers to access and exploit called hacking. Hackers are unapproved clients who break into a technological framework, change or decimate data, frequently by introducing hazardous malware without the insight and assent of the host company. Companies are now at risk of losing much more than money by doing business the digital way. It is in this view that the Security Exchange
Over the past seven weeks I was giving the opportunity to learn an excessive amount of information on the relationship between technology and society. Technology is rapidly evolving today making our daily operations easier than before. Although technology can be the best thing ever it does come with it drawbacks in certain situations. In today’s age technology plays an important role in our career life. It is used to help us get the job done in a more efficiently and at a faster pace. However, using technology for data storage and businesses purposes can be at risk of being hacked or stolen. Businesses and employees have to make sure they have the best security protection in order to keep their information save. Overall, technology is beneficial
Sanctification does not happen without a deep motivation and drive from an outside source. There are several areas in a Christian’s life that can provide that motivation, for instance, Bible reading, the Holy Spirit, and prayer. All of these are a great means of motivation but perhaps the greatest motivation is the anticipation of the Lords return.
The term and concept of “entire sanctification” is taught through the Wesleyan movement and comes from 1 Thessalonians, “Now may the God of peace Himself sanctify you completely; and may your whole spirit, soul, and body be preserved blameless at the coming of our Lord Jesus Christ” (1 Thessalonians 5:23, NKJV). One way to pursue entire sanctification is described in Leviticus and called the “Holiness Code”. It is a list of rules to follow to remain “whole” or “untarnished” in God’s eyes.
We are sanctified by the blood of God. We are made right in His eyes by the work of His Son on the cross. 1 Corinthians 1:30, states my belief in the work of Christ, and allows us to be sanctified in our Lord and made right before God.
According to Lorin L. Cranford, sanctification is the process of being made holy resulting in a changed lifestyle for the believer (Bible Dictionary, 2003:1444). It is through the work of the Holy Spirit in which a child of God is separated from sin and love God with his whole heart, soul and mind. Entire sanctification is when a believer is being set apart from the world, sin and self, it is the process by which he becomes Christlike. This process should practically continue as long as the believer is still on the
Throughout time, privacy and security have been two heavily debated topics. There has always been a struggle to find middle ground between a private environment and a secure environment, but the dawn of technology and the Internet has made this struggle even more difficult. The Internet has drastically decreased the expectation of privacy of any and all individuals that have ever used it. Technology in general can pose a threat to an individual’s physical and virtual security. The Internet has also brought forth a sense of anonymity to those looking to conceal their true identities, some of which plan to commit horrific crimes. Privacy and security go hand in hand, however security is by far the most important.
Society today is plagued with crime that is difficult to combat, constantly changing, and has no borders; this type of crime is called cybercrime. The United States of America is attacked on a daily basis by cyber criminals both foreign and domestic. The crimes committed involve fraud, identity theft, theft of proprietary trade secrets, and even theft of national secrets. The 2009 Internet Crime Report indicates there were 336,655 received cybercrime complaints in 2009 and a total monetary loss of $559.7 million (“2009 Internet Crime Report,” 2009). Cybercrime affects everyone; therefore, individuals, corporations, and government entities are responsible for safeguarding information against these attacks. Clearly, a unified front must
When studying sanctification, certain presuppositions are required for the theologian to understand the doctrine. First, one must believe the Bible to be God inspired and completely inerrant. The Bible is the highest authority and one must believe what it says about sanctification. Second, one must have assurance of their salvation. Sanctification is a process exclusively to believers and if one knows they are saved, they can sincerely apply this to their lives. Third, one must already be familiar with the stages of salvation before sanctification. These steps
Sanctification is defined to be the act or process by which people are cleansed and set apart from others to do God’s will. Some synonyms used in the “New Interpreter’s Dictionary of the Bible” are: to be set apart, to dedicate, to purify, to make sacred, and to manifest holiness. The Dictionary states that to be sanctified is to be graciously taken up and set apart for participation in the saving or reconciling purposes of God. For Christians, this happens when they become and remain part of the community of God’s people, who are shaped by the Holy Spirit in the image of God. This is where God makes us Holy. It is done by
By the year of 2016, investments in online security are expected to reach $86bn (Contu et al, 2012). Although this might seem a large sum of money, it is considered necessary since there is an increase in online risks from all over the world. Professional hackers develop malware on a global scale and on a 24/7 basis. Hackers have five objectives when spreading malware over the Internet: to infect/distribute, to steal, to persist, to control and for intelligence (Morris, 2010).
Just like a biological virus, a computer virus is able to infect and ruin lives. This malicious software constitutes more than just simple viruses but also includes other types of software including worms, Trojan horses, and ransomware. Malware has been around since the late 1980’s. Originally, people became hackers to gain notoriety online, but today, it has become more of a business. Cyber attacks originate from all around the world, and it is not just individual people that benefit from it. In two decades, numerous cyber crime syndicates have been created, and states all over the world sponsor hacker groups. Over the past twenty-five years, malware has become less about checking the integrity of computer security and gaining notoriety in the underground cyber society, and it has become more of a chaos creating, money making business that many people and institutions take part in.
Security threats have not only grown and matured quickly, but the people behind these threats have become more creative in disguising and hiding their work. These criminals have become more adept at eluding their identification and are now relying on cryptography. Some of the more frequent used threats were listed in the Security Threat Report 2014 such as botnets, android malware, attacks on Linux platforms and Mac OS X, web-based malware, targeted threats to your financial accounts, unpatched windows systems and re-invented spam (Sophos, 2014). These items are dangerous and can destroy companies and their employees. The more complex these threats get, the harder it is to protect or prepare to defend against them. A botnet is a network of private computers infected with malicious software and controlled as a group without the owner’s knowledge. Criminals distribute malicious software that can turn your computer into a “bot”. When this occurs, your computer can perform automated tasked over the Internet without your knowledge. This type of malware is typically used to infect large numbers of computers.
Cybercrime has become a fast growing concern for the 21st century as businesses, institutions and individuals grow into an interconnected web of computer networks. Online business transactions, along with the sharing of personal information, are vulnerable to a host of disasters that can reap economic and social havoc. Some sources say that today, cybercrime costs more than $1.0 trillion to society--Global Industry Analysts, Inc. forecasted the world cyber security market to reach $80 billion by 2017 (Gale, 2011).