cybercrime reality threat to security

The security analytics, Log rhythm website would be useful to persons trying to explain or understand the reality of cybercrime and digital evidence. This website belongs to this category because it talks about the following issues under its data protection application that concern cybercrime: Security applications, Social engineering, Network Security, IT Audit, Social networking security, PCI and Compliance, Mobile and wireless security, Data privacy, as well as Cybercrime and Malware. Apart from data application, the website contains issues on Security leadership, Security jobs, Physical security as well as business continuity.

Analysis of the Website

The security and risk part of the website contains information on the application of security to businesses. There are several accounts of real experiences of how security negligence by companies has led cybercrime operators to compromise their systems. The story of how Google flagged for breaching their server is also documented here. This occurred a few hours after Google’s safe browsing initiative flagged their website for malware. Two of servers were compromised and later employed in attacking some of their visitors.

Issues of global security are also dealt with under security/leadership where one of the latest techniques to combat cybercrime is elucidated. The technology christened the Cyber kill chain has been touted as one of the most effective ways of dealing with security issues in today’s businesses. The technology uses the US army’s strategy for combat; kill chain, which entails finding, fixing, tracking and targeting, engaging, as well as assessing malware. Through using this approach companies are able to thwart attackers from craftily entering their networks. It enables a company’s security system to know if there is any anomaly in its settings before any security breach occurs. It is efficient in nature because it enables a company to act swiftly and in time to stop an attack. This stems from the fact that if an attack can be stopped very close to the beginning of the chain the more inexpensive and less time consuming a cleanup can be done (Web).

According to the website’s social engineering part, even the tech-savvy are prone to a security compromise. It is estimated that one out of four tech-savvy individuals always experiences a breach in their security systems. This could be through phishing tactics and social engineering. There is an almost complete adoption of mobile devices in work places, as well as BYOD programs and cloud computing. This means that the business enterprise is increasingly facing risks (Web).

As far as wireless and mobile security devices are concerned, it has been perceived by analysts that any employee who has access to a company’s sensitive data is a possible threat. This is regardless of whether the perceived employees are aware of this fact or not. As much as they may not have wicked intentions, the intrinsic nature of this privilege is the most dangerous part of it all (Web).

Regarding data protection, it is perceived that the internet IoT presents wide-ranging security threats that are likely to cripple a system. This is because the IoT is projected to have important infrastructural components. It will provide a better target for both state and global espionage while at the same time disallow services and other threats. A critical concern for IT experts is the amount of personal data that is likely to reside on networks. This is because this is likely to be targeted by cybercriminals. The major IoT security considerations entail that an object regardless of whether it is a medicine bottle, a truck or a brush will join the global networked infrastructure. Consequently, the virtual presence of these objects will make decisions founded on their contextual devices. This in the end is likely to result to physical threats both in people’s homes and on national infrastructure. For instance, food, power, and water supply could be curtailed at the touch of a button (Web).

The data protection option underscore Network security has a story about Lack of data protection that led a number of companies to lose $300 million. Five men were implicated in the scheme that targeted critical corporate networks. They were involved in a global hacking scheme, which compromised over 150 credit card numbers. The five who comprised of one Ukrainian and four Russians were convicted in a New Jersey court for conspiring to commit cybercrime. The men are said to have allegedly compromised the systems of several companies, which include Hannaford, NASDAQ, Dow Jones, 7-eleven and JCP (Web).

The five accomplices are believed to have compromised the networks in a period spanning five years from 2005 to 2012. According to Paul Fishman, the District of New Jersey US attorney, the kind of crime committed by the one Ukrainian and the four Russians was one that employed cutting edge technology. He pointed out that those who have the inclination and expertise of breaking into private computer systems should be given a tough punishment. This is because they are not only a threat to national security but also a threat to the economic well-being and the privacy of individuals. In the attorneys own words, the case was an indication that there was an actual practical cost to cybercrime (Web).




Works Cited





order custom essay paper
Still stressed from student homework?
Get quality assistance from academic writers!

Order your paper today and save 15% with the discount code HITHERE

error: Content is protected !!
You can contact our live agent via WhatsApp! Via +1 718 717 2861

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 30% with the discount code HITHERE