Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about hackers, cybercriminals, profile crackers, cyberwarriors, cyberspies and organized criminal groups.
Signe Lundblad |
Privacy vs. security will remain a hot topic. Why? Because your information will likely pop up in more and more places. Your world is getting more connected, not less, and your information has value. People will try to profit from it in legal and illegal ways. The best advice about privacy vs. security: Take care of both. |
|
Posted 5 years ago | ||
Lalita Demetriou |
In response to János Pataky
This is especially true when it comes to VoIP. Every communication made over IP – including voice - is potentially valuable to hackers and open to attack. This isn’t something organizations tend to consider when using Skype, for example, but voice and video should be treated with the same attention as any other security and data risk. |
|
Posted 5 years ago | ||
Stojan Mikhailov |
In response to Michael Dunst
As both public and private clouds are essentially centralized systems with just one point of vulnerability, it is relatively easy for someone to ‘leave the door open’ either through incompetence or maliciously. |
|
Posted 5 years ago | ||
János Pataky |
Many organizations also fail to consider how telecoms, and increasingly, video factor into their overarching cyber-security strategy. Of course, it is essential for any business to have effective communications, from informal conversations between colleagues, to confidential client discussions. However, voice and video are just as susceptible to hacks as other systems. |
|
Posted 5 years ago | Last updated 5 years ago | ||
Michael Dunst |
Cloud computing is convenient, increasingly popular, and is generally considered to be secure. However, this is not always the case. In a public cloud, all data is stored within the provider’s network, and, as such, is open to attack. Even a private cloud, which is not open to the world, with data stored in a private network, is still not infallible. |
|
Posted 5 years ago | ||
Fabricio Ruiz |
The way people work is rapidly evolving, enabled in large part by advances in technology. In many ways, this is a hugely positive thing as employees are able to work anytime, anywhere. However, the use of personal smartphones, tablets and laptops to carry out business does increase the risk of data loss – either through human error or by providing a way in for cyber criminals. |
|
Posted 5 years ago | ||
Teresa Guerrero |
Common methods attackers use to control computers or networks include viruses, worms, spyware, Trojans, and ransomware. Viruses and worms can self-replicate and damage files or systems, while spyware and Trojans are often used for surreptitious data collection. Ransomware waits for an opportunity to encrypt all the user’s information and demands payment to return access to the user. Malicious code often spreads via an unsolicited email attachment or a legitimate-looking download that actually carries a malware payload. |
|
Posted 5 years ago | ||
Kaan Buğra Kundakçı |
Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources. |
|
Posted 5 years ago | ||
Zoe Miller |
In response to tobias sorensen
There is no way to stay safe in the internet, the only ones that know how to say safe are the same people that give up trouble in the internet and steal our data. Imagine you are a hacker but not the real sense, you are a person that has to pass a wall, not to do cyber robberies. How many way of passing through the wall can you think of in the first minute? Now imagine you are a cyber security expect again not in the real sense and you protect what is behind this wall. This time you have to think what might occur to me to use in order to pass through the wall. |
|
Posted 6 years ago | ||
Igor Konoplyanka |
With the ever increasing demand of internet, everyone is connected through internet like never before. Internet is responsible for our easy bill payments and error-free bank transactions. But, with the increase in cyber crimes, how can we completely rely on the connections? Security is our primary concern. So, hiring the security professionals is not only important but is difficult as well. |
|
Posted 6 years ago | ||
Gaetano Albertini |
Cross-site scripting is the nightmare of Javascript. Because Javascript can run pages locally on the client system as opposed to running everything on the server side, this can cause headaches for a programmer if variables can be changed directly on the client’s webpage. There are a number of ways to protect against this, the easiest of which is input validation. |
|
Posted 6 years ago | ||
Анета Владимирова |
WEP cracking is the method of exploiting security vulnerabilities in wireless networks and gaining unauthorized access. There are basically two types of cracks. Active cracking: Until the WEP security has been cracked this type of cracking has no effect on the network traffic. Passive cracking: It is easy to detect compared to passive cracking. This type of attack has increased load effect on the network traffic. |
|
Posted 6 years ago | ||
George Waters |
Historically, organizations and governments have taken a reactive, “point product” approach to combating cyberthreats, cobbling together individual security technologies – one on top of another – to protect their networks and the valuable data within them. Not only is this method expensive and complex, but news of devastating cyber breaches continues to dominate headlines, rendering this method ineffective. In fact, given the pervasiveness of data breaches, the topic of cybersecurity has catapulted to the top of the priority list for boards of directors, which are seeking a far less risky way. |
|
Posted 6 years ago | ||
Jacquette Ionas Tennfjord |
Cyber security is the practice of protecting information and data from outside sources on the Internet. Cybersecurity professionals provide protection for networks, servers, intranets and computer systems. It also ensures that only authorized people have access to that information. In an office setting, one individual might go to another’s computer, install a flash drive and copy confidential information. This falls more under the category of information security. If someone halfway across world manages to hack into another company’s network and breach their system, this company is in need of better cyber security. |
|
Posted 6 years ago | ||
Moses Mcgowen |
In response to Magdalena Novak
Many actors affect cybersecurity, including boards of directors, shareholders, regulators, standards bodies, citizens, nongovernmental organizations, manufacturers, and researchers. As a result, there are often conflicting views and interests. |
|
Posted 6 years ago | ||
Jamison Shields |
Companies face an ever-shifting threat to their digital assets, whether as a result of malicious attacks, structural failures, human errors, or natural disasters, that can lead to a compromise of confidential information. Robust cybersecurity and data privacy policies and procedures work hand-in-glove to protect companies and their data, customers, and shareholders from the risks and ramifications posed by these data breaches. |
|
Posted 6 years ago | ||
Yasmine Loewen |
In response to Baldur Helgason
Both “cyber security” and “cyber crime” are terms widely used but often poorly understood. Worse, they often get included in the same discussions, with many governments approaching policy making from a misguided perspective. |
|
Posted 6 years ago | ||
Christin Bustamante |
The recent headline-grabbing outbreaks of WannaCry and NotPetya ransomware were a very public reminder of just how much the criminal hacking of corporate networks has evolved in recent years. Here you can read more about what happened. |
|
Posted 6 years ago | ||
Aisha Kamila Kuhn |
In response to Baldur Helgason
As the cyberthreat landscape continues to grow and emerging threats, such as the internet of things, require hardware and software skills, it is estimated that there are 1 million unfilled cybersecurity jobs worldwide. IT professionals and other computer specialists are needed in security jobs. |
|
Posted 6 years ago | ||
Baldur Helgason |
In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity. |
|
Posted 6 years ago | ||
Timaios Blazh Abdulrashid |
Cybersecurity itself has been and will always be, quite literally, an arms race; nation states, organized crime syndicates, disgruntled individuals attacking nation states, enterprises, high profile organizations with the mass populous, both human and device, ready for weaponization at any time. |
|
Posted 6 years ago | ||
inesa sokoll |
Rather than being purpose built, security will become more organic and autonomous like your own immune system. Security will continually evolve in an ever-changing cyber-environment. Continual training and adaptation will allow systems to not only recognize new threats but respond to them. Anomaly detection in particular will become more pervasive and IoT ecosystems will rely on this as a line of defense for trusting data from peers. |
|
Posted 6 years ago | ||
Milburn Phillips |
Cybercriminals are going to create jobs for security professionals over the next few years. And they’re going to do it at a remarkable rate. Sadly, there seems to be no end to hackers who want to access your business and customer data and then use that information to their own malicious ends. Each year brings with it savvier hackers. Which means that each year also brings new defense mechanisms as well. |
|
Posted 6 years ago | ||
Nicolao Barros |
In response to Magdalena Novak
Magdalena, I am glad you bring up privacy. With every connected device comes some vulnerability. IoT-related cyber incidents can put business, employee, and client information at risk of being destroyed, altered, stolen and exposed, or even held for ransom. Another concern with IoT data collection is over the confidentiality, privacy and integrity of business data. It is important to understand the data collection and privacy policies of IoT devices, before you buy or download them. |
|
Posted 6 years ago | ||
Baldur Helgason |
A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system. Here is a pretty comprehensive list of the different types of cyberattacks. |
|
Posted 6 years ago | ||
Magdalena Novak |
Privacy interest in cybersecurity involves establishing protocols and effective oversight regarding when, why, and how government agencies may gain access to personal information that is collected, retained, used, or shared. Can anyone discuss the extent to which government spies on us in the EU and the USA? |
|
Posted 6 years ago | ||
Mārtiņš Gustavs Krūmiņš |
A world awash with data allows little privacy. Your mobile phone, even when turned off, can tell others where you are and whom you have been calling or texting. New television sets can record your conversation and send it away. Fibre optic cables underground can detect any movements without our knowledge. |
|
Posted 6 years ago | ||
Regina Jankauskas |
Who are the cybercriminals? For the most part, the largest demographic of members participating in underground communities are lone actors with a clean criminal record and without any ties to organized syndicates. These criminals tend to maintain a stable day job while partaking in illegal activities mostly on an occasional basis. Often these actors are introduced to the life of cybercrime during their early college years and remain active many years to follow. |
|
Posted 6 years ago | ||
George Waters |
In response to Prof. Dr.-Ing. Helga Breitner
Whaling uses deceptive email messages targeting high-level decision makers within an organization, such as CEOs, CFOs, and other executives. Such individuals have access to highly valuable information, including trade secrets and passwords to administrative company accounts. The attacker sends emails on issues of critical business importance, masquerading as an individual or organization with legitimate authority. For example, an attacker may send an email to a CEO requesting payment, pretending to be a client of the company. |
|
Posted 6 years ago | ||
Prof. Dr.-Ing. Helga Breitner |
Here are some the newest and most dangerous types of cyber attacks: state sponsored attacks, disinformation, ransomeware, IoT botnets, spearphishing and whaling attacks, business process compromise attacks, machine learning-enabled attacks. |
|
Posted 6 years ago | ||
Fujiko Nakayama |
Israel raises up a new cyber army, already at school. The Education Minister Naftali Bennett, as Israel Hayom reported, announced an innovative program for high school seniors interested in pursuing careers in software engineering. It will be closely coordinated with the Israel National Cyber Directorate in the prime minister’s office. In the 2018-2019 school year, it will train 100 seniors to become computer hackers and another 240 12th grade students to become cyber protectors. |
|
Posted 6 years ago | ||
Edward Wachter |
In response to Innocenzo Clarisse
Innocenzo, Dozens of cybercrime groups have reached the level of sophistication where their technical capabilities are on a par with those of a nation-state, it has been claimed. Gangs are capable of building complex systems aimed at stealing money and intellectual property on a grand scale, costing almost the same to the global economy as counterfeiting or the narcotics trade — more than $400bn a year. |
|
Posted 6 years ago | ||
Анета Владимирова |
Dorothea. Wow. It never occurred to me that was one way to rob a bank! |
|
Posted 6 years ago | ||
Dorothea Petrescu |
Cyber terrorism takes many forms. One of the more popular is to threaten a large bank. The terrorists hack into the system and then leave an encrypted message for senior directors, which threatens the bank. In essence, the message says that if they do not pay a set amount of money, then the terrorists will use anything from logic bombs to electromagnetic pulses and high-emission radio frequency guns to destroy the banks files. What adds to the difficulty to catch the criminals is that the criminals may be in another country. A second difficulty is that most banks would rather pay the money than have the public know how vulnerable they are. |
|
Posted 6 years ago | ||
YogaFan |
Innocenzo, it certainly does. Terrorism in cyberspace is often referred to as cyberterrorism. NATO defines cyberterrorism as "[a] cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal" (source Wikipedia). |
|
Posted 6 years ago | ||
PSJunkie |
It is my opinion that the European Union should invite private sector companies, civil companies, as well as security experts to cybersecurity discussions in order to achieve a balanced approach when discussing new legislation. |
|
Posted 6 years ago | ||
Slobodan Pavlicic |
Before watching this video it did not occur to me that there exist multiple cybercriminal profiles. I actually thought all cyber criminals were very much alike. |
|
Posted 6 years ago | ||
Innocenzo Clarisse |
Hi there.I am wondering does the organized crime exist in cyber space and how popular is it among terrorist groups at all? Regards.
|
|
Posted 6 years ago | ||
tobias sorensen |
I think it is impossible to attaining 100% security while still staying connected. It is like all other thing that we do, you'll naver have the totaly security, it is a part of our life, and since these systems are complex and made by many different companies, there will always be someone able to sneak into someone's computer or phone and cause damage, steal data and all the rest.
|
|
Posted 6 years ago |
Please login to leave a response.