Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

INTERNET SECURITY HOLES?

Emergence of Cyber Crime

Sorry to say, not all of you are using the Internet in an optimistic way. The Internet has not only permitted you to communicate around the world, it has also opened up the doors for electronic offense. The Computer Security Institute's (CSI's) 2002 Computer Crime and Security Survey raised the level of awareness and aided in formative the scope of cyber crime. This survey of huge corporations revealed that 73 percent of the respondents detected the illegal use of their computer systems in the last year.

Throughout the past few years, the most severe financial losses due to attacks have occurred through financial fraud and theft of proprietary information, according to CSI. Sixty-nine respondents in CSI's 2002 Computer Crime and Security Survey reported a total loss of

$99,019,000 in theft of proprietary information while 87 respondents reported a total loss of $88,229,000 in financial fraud. These 2002 totals were higher than the combined totals of the previous six years! The review also established that the following trends have evolved over the past few years:

  • Cyber attacks are hitting organizations from the outside and inside.
  • Enormous financial losses are reported due to cyber attacks.
  • A broad spectrum of attacks has been spotted.
  • Information security technologies are not the sole solution to stop these attacks

Outside Attacks

Internet users are starting to realize the ruthlessness of these attacks. In the past eight years, the CSI has established that people are more aware of attacks occurrence, rather than being in rejection. The following types of attacks have been accepted in the wide spectrum of cyber crime.

Unauthorized Intrusion

  • Networks that are not 100 percent confined are prime targets for external intrusion. Between 380 and 500 Web page hacks occur every week at small Web sites; while on larger sites, the amount is greater. The New York Times Web site was recently brought down for 12 hours and then vandalized. Information that is tampered with leads to financial losses, service disruptions for a company's site, and potentially irreparable damage to the corporate variety.

Service Denial

Similar to illegal intrusion, malicious denial of service also results in the loss of reputation and revenue. Big name Internet companies, such as Yahoo!, Hotmail, and Amazon.com, recently experienced denial-of-service (DoS) attacks. Hotmail's site shut down for six consecutive days, not only preventing seven million users from accessing it, but also scarring the status of Hotmail.

Malicious Downloads

The "Email Bomb," as well as the I LOVE YOU and Melissa viruses, have plagued e-Mail addresses. More newly, Microsoft's computer system was hacked by a Trojan horse called QAZ, due to a few machines being insecure. Security experts confirm that "this is all it takes" and are hopeful for this to be a lesson for other companies to keep their antivirus software updated and educate their employees on good security practices

Inside Attacks

Newly, more media concentration has been placed on the "sexy cyber attacks" before cited, rather than insider attacks. But, in reality, more of the common attacks are now coming from insiders. CSI established this when it reported that the majority of the attacks in the past year have been from insider unauthorized and abuse access. And, insiders are not just trustworthy employees. Business subsidiaries, partners, and third-party suppliers have the similar access as traditional employees of a company.

Threats Due to Lack of Security

According to the SANS Institute, the answer to the previous question is "Yes!" SAN's have developed the following three lists of mistakes people make that make possible attackers.

End Users: The Five Worst Security Mistakes

1.   Downloading games and screen savers from unreliable sources.

2.   Not testing or creating backups.

3.   Opening unwanted e-mail attachments from unpredictable sources

4.   forgetting to install security patches, including ones for Microsoft Office, Microsoft Internet Explorer and Netscape

5.   Using a modem while connected via a local area network

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M9511188

Have any Question?


Related Questions in Homework Help/Study Tips

Question origins of psychology and research methods

Question: Origins of Psychology and Research Methods Worksheet Part I: Origins of Psychology Within psychology, there are several perspectives used to describe, predict, and explain human behavior. The seven major perspe ...

Question show graphically that for any tariff there is an

Question: Show graphically that for any tariff, there is an equivalent quota that would give the same result. What would be the difference, then, between the two types of trade barriers? The response must be typed, singl ...

Question smart lab lessonsbackground the smartlab is a

Question: Smart Lab Lessons Background: The SMARTLab is a self-paced, online basic statistics course designed to prepare you for your graduate courses and graduate research. You will use the online primer in addition to ...

Assignmentan individual who has been using a drug for an

Assignment An individual who has been using a drug for an extended period of time suddenly finds he is unable to secure more of the drug. He acts nervous and irritable and is hyperactive. He seems almost desperate to fin ...

Discussion psychological aspects of aging explain key life

Discussion : Psychological Aspects of Aging Explain key life events that have influenced Sara's relationships. Be sure to substantiate what makes them key in your perspective. Explain how you, as Sara's social worker, mi ...

Travis workthe market and your decision to go to collegethe

Travis' Work "The Market and Your Decision to Go to College" The market for higher education is determining the key questions of what gets produced, how it is produced, how much is produced, and who gets how much. Start ...

Project - covariance estimation and performance of the gmv

Project - Covariance Estimation and Performance of the GMV Portfolio Suppose you wish to construct a benchmark portfolio with minimum variance, i.e., the Global Minimum Variance (GMV) portfolio. You plan to choose at lea ...

Science-based health care take action to assert yourself in

Science-Based Health Care: Take action to assert yourself in some manner about a health product that you feel was poor in quality or misrepresented or a health service in which a bill was unreasonable or in which you wer ...

Provide a short explanation concerning how response

Provide a short explanation concerning how response selection (in the information process model) might be influenced by attentional capacity.

Question we favor equal employment opportunities and

Question: We favor equal employment opportunities and affirmative action not just because of their legality, but also because of the importance of having diversity among service providers. If you were manager of an agenc ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As