Wednesday, December 4, 2019

The Effect of Cyber-Crime and One Way to Fight Back free essay sample

Also during this study it was discovered that there had been a huge Increase of cyber-attacks, approximately 48 percent, with around 102 of them being successful per week. The number of successful attacks per week in 2010 was only around 50. More than 78 percent of the annual cybercafà © can be labeled as denial of service, malicious code, malevolent insiders, and stolen or hijacked devices. Businesses have no choice but to spend an increasing amount of money, time, and energy In order to protect themselves against these cyber-attacks that seem to be reaching unsustainable levels.Even though some companies are finding ways to lower the cost of security measures, the cost of time and energy spent cannot be eased. No matter what the solution is, it will always take time to incorporate any security and energy to maintain those securities. Additional key findings include: * Information theft and business disruption continue to represent the highest external costs. On an annual basis, information theft accounts for 44 percent of total external costs, up 4 percent from 2011. Disruption to business or lost productivity accounted for 30 percent of external costs, up 1 percent from 2011. Deploying advanced security intelligence solutions can mitigate the impact of cyber-attacks. Organizations that deployed security information and event management (SEEM) solutions realized a cost savings of nearly $1. 6 million per year. As a result, these organizations experienced a substantially lower cost of recovery, detection and containment than organizations that had not deployed SEEM solutions. * Cyber- attacks can be costly If not resolved quickly. The average time to resolve a cyber- attack is 24 days, but it can take up to 50 days according to this years study.The average cost incurred during this 24-day period was $591 ,780, representing a 42 percent increase over last years estimated average cost of $41 5,748 during an 18-day average resolution period. * Recovery and detection remain the most costly internal activities associated with cybercafà ©. On an annual basis, these activities account for almost half of the total Internal cost, with operating expenses and labor representing reported that cybercafà © is costing its 200,000 members a combined 785 million euros which breaks down to about 3,750 euros for every small business.Often these raids are carried out by a customer, client, or so-called card not present situations. Insider Security Threats An insider security threat is a malicious attack by a trusted employee, former employee, business partner or any contractor who had or has access to the organizations system, data, or network and intentionally misuses or exceeds the access given by the organization, in order to harm and affect the integrity, confidentiality, or availability of the organizations information system.Cyber-crimes committed by malicious insiders are among the most significant threats to networked yester a nd data. When developing policies and procedures for responding to cyber security events, it is important to consider the insider threat. As increased information-sharing exposes sensitive information to more insiders, such attacks will become an increasingly serious threat. With the seriousness of this problem growing the Department of Defense, Department of Homeland Security, the U.S. Secret Service and other federal agencies came together to sponsor an advanced research project looking into insider security threats. These agencies put members of the Insider Threat Center at Carnegie Mellon University Software Engineering Institute (CERT.) in charge of conducting and reporting this research. The goal was to develop and transition socio-technical solutions to combat insider cyber threats. By using previous case files that were provided by the U. S. Secret Service, they were able to analyze actual events of insider fraud, from the beginning to the sentencing. The researchers were then able to compare the most common security controls used to help prevent future internal as well as external attacks. Their research will be able to help impasses with creating informed decisions towards risk management. This information also helps local law enforcement agencies in their cyber-crime investigations.The foundation of their work is their database of more than 700 insider threat cases. They are able to use system dynamics modeling to characterize the nature of the insider threat problem, explore dynamic indicators of insider threat risk, and identify and experiment with administrative and technical controls for insider threat mitigation. The CERT. insider threat lab provides a foundation to identify, tune, and package technical controls as an extension of the modeling efforts.We have developed an assessment framework based on the fraud, theft of intellectual property, and IT sabotage case data that we have used to help organizations identify their technical and unethical vulnerabilities to insider threats as well as executable countermeasures. The Insider Threat Security Reference Architecture (TSAR) provides an enterprise-wide solution to insider threat. The architecture consists of four security layers: Business, Information, Data, and Application. Organizations should deploy and enforce controls at each layer to address insider attacks.None of the layers function in isolation or independently of other layers. Rather, the correlation of indicators and application of controls across all four layers form the crux of this approach. Empirical data consisting of more than damage when an organization failed to implement adequate controls in any of three security principles: authorized access, acceptable use, and continuous monitoring. The TSAR draws from existing best practices and standards as well as from analysis of these cases to provide actionable guidance for organizations to improve their posture against the insider threat.The HP Insider Threat solution gives you visibility into potential insider threats from within by identifying users who deviate from behavior normal for their roles or engage in risky activity. It also enables you to automate the enforcement of security controls, quickly cutting off access to risky users. By detecting abuses and anomalies in the behavior of high-risk, high-profile, or high-privilege users and taking action quickly, you significantly reduce your risk of cyber espionage as well and damage caused from within. Biometrics Law Enforcement is not the only ones using fingerprints anymore. Today they are being used by more and more corporations in the battle against cyber-crimes, internal and external. With the advancements of biometric technology, the press or swipe recognizes an individuals unique fingerprint that allows that person to access only what they are cleared to access and keeping them from the information they should not be accessing. A Tampa-based company, Real-time North America, has begun to use this growing technological advancement to help business of all sizes and even helping government agencies tighten up their security.Some of Real-times linens include the Polk County School District and the Bread County government as well as national clients such as Marathon Oil and Purdue Pharmacy. Thomas Undergone, the companys chief operations officer, stated It generally turns their mindset upside down because we show them something they didnt think was possible, referring to the companys biometric-based system marketed under the brand name Bullock. Although this system costs around $100,000 installed, Kenneth D. Pete Gun, who also was the one to recommend this technology to the government of Bread County, said The benefit is that the computer administrator an assign by terminal who has access to the information, and they have a recorded database, which shows who has access to data, when they accessed it, for how long and for what purpose, Gun also said, If theres ever an investigation into who released information, they have a handle on it. Biometrics has even taken the U. S.Department of Defense by storm, both as a tool to fight war on the battlefield and as a way to make its business practices more efficient. The director of the Armys Biometrics Identity Management Agency, Myra Gray, stated that biometrics has come an integral part of a soldiers mission, allowing troops to identify potential threats and confirm the link between name and face. You can identify an individual and associate him with certain actions. In this case you are able to figure out the associates of an individual as well as what they may have been involved in together.For an example, it makes it possible to find a link between such events as an Improvised Explosive Device (DE) and a protest, even though they happen in two different places. It builds a picture of what has gone on. Biometrics, of course, is the behavioral characteristics. The military uses iris, facial, palm and voice characteristics in the field. Now the Pentagon has begun to exploit the use of biometrics at home. Just like in the combat zone, where biometrics are used to grant people access to secure facilities, the Defense department is using them in its own facilities as a type of universal access.Every member of the military, their families and civilian employees have a common access identification card that is embedded with their fingerprints. For example: * At Gelling Air Force Base, Flag. , the Air Force uses a device that scans hand prints to Lear veterans who are receiving treatment at the Veterans Affairs clinic for access to the base hospital. * At Fort Believe, Va. , the Army uses iris scanning technology to provide Kyles entry to sensitive areas. The Navy uses biometrics equipment to confirm identifies as they board foreign vessels. But biometric technology is becoming better, and the military is already experimenting with new uses, such as the ability to scan people on the fly without requiring them to touch anything or stop moving. With the continuing strides that are being made by biometrics to help secure ND protect companies information as well as your own information, the future begins to look a little brighter towards regaining control from hackers and other malicious attacks.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.