Showing posts with label Internet Security. Show all posts
Cyber Crime & How to Protect Yourself From Them
Cyber Crime and How to
Protect Yourself from Them
As Internet usage is growing daily the world
is coming closer. The World Wide Web sounds like a vast phenomenon but
surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create
another problem for people who spend long hours browsing the Cyber World –
which is cyber crimes.
While law enforcement agencies are trying to tackle this
problem, it is growing steadily and many people have become victims of hacking,
theft, identity theft and malicious software. One of the best ways to avoid
being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and
hardware to authenticate any information that is sent or accessed over the
Internet. However, before you can understand more about this system, let us
find out more about cyber crimes.
Types of Cyber Crimes
When any crime is committed over the Internet
it is referred to as a cyber crime. There are many types of cyber crimes and
the most common ones are explained below:
Hacking: This is a type of crime wherein a person’s computer is
broken into so that his personal or sensitive information can be accessed. In
the United States, hacking is classified as a felony and punishable as such.
This is different from ethical hacking, which many organizations use to check
their Internet security protection. In hacking, the criminal uses a variety of
software to enter a person’s computer and the person may not be aware that his
computer is being accessed from a remote location.
Theft: This crime occurs when a person violates copyrights and
downloads music, movies, games and software. There are even peer sharing
websites which encourage software piracy and many of these websites are now
being targeted by the FBI. Today, the justice system is addressing this cyber
crime and there are laws that prevent people from illegal downloading.
Cyber Stalking: This is a kind of online harassment
wherein the victim is subjected to a barrage of online messages and emails.
Typically, these stalkers know their victims and instead of resorting to
offline stalking, they use the Internet to stalk. However, if they notice that
cyber stalking is not having the desired effect, they begin offline stalking
along with cyber stalking to make the victims’ lives more miserable.
Identity Theft: This has become a major problem with
people using the Internet for cash transactions and banking services. In this
cyber crime, a criminal accesses data about a person’s bank account, credit
cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major
financial losses for the victim and even spoil the victim’s credit history.
Malicious Software: These are Internet-based software or
programs that are used to disrupt a network. The software is used to gain
access to a system to steal sensitive information or data or causing damage to
software present in the system.
Child soliciting and Abuse: This is also a type of cyber crime
wherein criminals solicit minors via chat rooms for the purpose of child
pornography. The FBI has been spending a lot of time monitoring chat rooms
frequented by children with the hopes of reducing and preventing child abuse
and soliciting.
Causes of Cyber Crime
Wherever the rate of return on investment is
high and the risk is low, you are bound to find people willing to take
advantage of the situation. This is exactly what happens in cyber crime.
Accessing sensitive information and data and using it means a rich harvest of
returns and catching such criminals is difficult. Hence, this has led to a rise
in cyber crime across the world.
History of Cyber Crime
When computers and networks came into being in
the 1990s, hacking was done basically to get more information about the
systems. Hackers even competed against one another to win the tag of the best
hacker. As a result, many networks were affected; right from the military to
commercial organizations. Initially, these hacking attempts were brushed off as
mere nuisance as they did not pose a long-term threat. However, with malicious
software becoming ubiquitous during the same period, hacking started making
networks and systems slow. As hackers became more skillful, they started using
their knowledge and expertise to gain benefit by exploiting and victimizing
others.
Cyber Crime in Modern Society
Today, criminals that indulge in cyber crimes
are not driven by ego or expertise. Instead, they want to use their knowledge
to gain benefits quickly. They are using their expertise to steal, deceive and
exploit people as they find it easy to earn money without having to do an
honest day’s work.
Cyber crimes have become a real threat today
and are quite different from old-school crimes, such as robbing, mugging or
stealing. Unlike these crimes, cyber crimes can be committed single handedly
and does not require the physical presence of the criminals. The crimes can be
committed from a remote location and the criminals need not worry about the law
enforcement agencies in the country where they are committing crimes. The same
systems that have made it easier for people to conduct e-commerce and online
transactions are now being exploited by cyber criminals.
Categories of Cyber Crime
Cyber crimes are broadly categorized into
three categories, namely crime against
1. Individual
2. Property
3. Government
Each category can use a variety of methods and
the methods used vary from one criminal to another.
Individual: This type of cyber crime can be in the form of cyber
stalking, distributing pornography, trafficking and “grooming”. Today, law
enforcement agencies are taking this category of cyber crime very seriously and
are joining forces internationally to reach and arrest the perpetrators.
Property: Just like in the real world where a criminal can steal and
rob, even in the cyber world criminals resort to stealing and robbing. In this
case, they can steal a person’s bank details and siphon off money; misuse the
credit card to make numerous purchases online; run a scam to get naïve people
to part with their hard earned money; use malicious software to gain access to
an organization’s website or disrupt the systems of the organization. The
malicious software can also damage software and hardware, just like vandals
damage property in the offline world.
Government: Although not as common as the other two categories, crimes
against a government are referred to as cyber terrorism. If successful, this
category can wreak havoc and cause panic amongst the civilian population. In
this category, criminals hack government websites, military websites or
circulate propaganda. The perpetrators can be terrorist outfits or unfriendly
governments of other nations.
How to Tackle Cyber Crime
It has been seen that most cyber criminals
have a loose network wherein they collaborate and cooperate with one another.
Unlike the real world, these criminals do not fight one another for supremacy
or control. Instead they work together to improve their skills and even help
out each other with new opportunities. Hence, the usual methods of fighting
crime cannot be used against cyber criminals. While law enforcement agencies
are trying to keep pace with cyber criminals, it is proving to be a Herculean
task. This is primarily because the methods used by cyber criminals and
technology keeps changing too quickly for law enforcement agencies to be
effective. That is why commercial institutions and government organizations
need to look at other methods of safeguarding themselves.
Redback Cyber Security Council offers a way to
keep all information confidential by using safe and secure domains that cannot
be tracked or accessed. This security solution can be used by commercial and
governmental organization to ensure an impenetrable network while still making
sure that users can get access to the required information easily.
Wednesday, February 17, 2016
Posted by Sivapriya
The cyber warrior "Princess Parisa Tabriz" who guards 'Google'
“Parisa Tabriz-The Security Princess” is Google’s guardian who protects the tech giant from the ‘black hat’ attackers. She is Google’s biggest weapon against the outside hackers.
There is no such thing as unhackable. We know it, you know, and the hackers know it too. All we can do is take measures for our safety depending upon our prudence. Now, if you are the head of the world’s leading tech company, let’s say Google, then what would be your plan of action to protect yourself and your more than a billion daily users?
Well, let’s see, how about getting a knight in a shining white armour, a ‘white hat’ to combat the bad guys the ‘black hats’. Cool right? That’s what Google has. Knowing how big Google is, they need someone with special skills, someone who would think like the attackers, but only faster and warn them about any vulnerability before it gets exploited by the black hats.
“Parisa Tabriz- The Security Princess” is the someone that Google has relied on so heavily to guard its empire. Heading a team of 30 hackers in the US and Europe that manages security threats, all Parisa does throughout the day is to try and hack her own employer and she is pretty upbeat about that. Parisa is quite famous in the hacking world, just like a cool mysterious comic superhero who watches over the city with his skills and powers and adding to that, zero evil intentions.
Parisa was named in the 30 most important women under 30 in Tech by Forbes in 2012 and is among the 250 security engineers that Google has put faith in to protect user data and company’s online infrastructure.
Her job is to dig out bugs in Google Chrome, an Internet browser used by over a billion users and make sure that it gets fixed before catching the eye of other hackers. So, confident is Google of Parisa and her team that it has regularly put on the bounty for anyone to hack Chrome. And there is one in a thousand cases that an exploit has been found. But, this is a cat and a mouse game as we all know!!
At the age of 31, she is one of the most decorated employees of Google, which she joined in 2007. Google is a haven for geniuses and Parisa makes sure she hires only the best. Well, that we know. Google is quite famous for its rigorous and byzantine recruitment process. But, Google shows creativity in hiring as well.
As she tells, she not only looks for sheer brilliance, but also a person with a thirst for knowledge who can constantly upgrade himself much like the industry that they all are working in, and with rock-solid ethics (doesn’t take much time for the hackers to get lost in the good hacking-bad hacking dilemma).
Google is all about innovation, creativity and future. This can be seen as Google’s co-founder Sergey Brin met with Ahmed Mohamed at the Google Science fair. Ahmed was arrested as his indigenous clock was mistaken for a bomb.
Inspired by steganography, a form of cryptography which is an art of hiding a coded message in plain site, Tabriz learnt and gained as much knowledge as she could from the Internet and the geek club, that she joined while she was in college at the University of Illinois. Parisa is a role model for all the women out there who seem dull towards computer science and technology while relinquishing into the male chauvinism.
Google is a knowledge park for out of box thinking where the employees can be seen doing weirdest of things just to get it right. Parisa says, Google also offers incentives to outside hackers to detect the bugs which make things easy for her team. It is better to let these guys keep doing what they usually do under your watch rather than outside of the Google’s fort. It goes without saying that she believes in keeping her enemies closer.
After all the praises for the woman, most of you still might be wondering what’s with the Security Princess tag!! If that’s the case then the purpose of the name is fulfilled.
Security Princess is so much better than the dull and boring Information Security Engineer, don’t you think? Tell your views in the comments below.
Saturday, October 10, 2015
Posted by Sivapriya