Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged cyber security

Rss Feed Group items tagged

Sarah Manson

Google Attacks Highlight Growing Problem of Cyber Security Threats | Science and Techno... - 0 views

  •  
    This article is dealing with the recent disclosure by Google that it had fallen victim to a cyber attack. It renews the growing sentiment that a global response to the issue of cybersecurity is needed with particular emphasis on the cooperation between the government and business sectors.
  •  
    Interesting comparison was made in this article regarding President Obama's priorities. It stated that "Obama has made cyber security a top priority for his administration, and has listed the threat from cyber weapons along with other weapons of mass destruction - such as nuclear, chemical and biological weapons." Is it fair to make a comparison between the threat of nuclear weapons and threats which exist within the world of computers?
Stephen Murphy

BBC NEWS | Americas | US launches cyber security plan - 0 views

  •  
    A short and sweet introduction in to the developing cyber security threat and the vision behind Barack Obamas Cyber security plan launched in May 2009.
Elizabeth Gan

Check the Hype - There's No Such Thing As 'Cyber' - 0 views

  •  
    This article discusses the terminology "cyber" versus "online" as a method to frighten people. The manner in which we speak on the Internet has changed greatly, and as a result, this article ponders the legitimacy of the use of this word, for example, "cyberbully," "cyberwar," are terms or tactics to instill some sense of fear into the masses regarding the security on the Internet. "When that kind of fear-mongering is needed to loosen the purse strings for computer security, only one word will do...Cyber."
Elizabeth Gan

Hackers: not just geeks, but activists - 0 views

  •  
    It's quite interesting that the term "hackers" was often deemed negative. However, in this following article, the discussion of "White hat" hackers vs. "Black hat" introduces the idea that cyber security/cyber espionage in the online world can also be saved by the same breed that seek to do criminal activies. These white hat hackers were able to uncover a Chinese-based espionage ring that had been gleaning sensitive information: visa applications. People no longer simply hold posters chanting and marching against the "man," rather, they stick it to them, by strengthening the masses in the online world.
Gina Spithakis

Cyber virus targets online banking log-ins - 0 views

  •  
    Banks were the target of the clampi cyber virus which basically stole the online banking details of those using infected computers
Search and More

Network security( Penetration testing) : cyber-crime is costing the UK's small businesses - 0 views

  •  
    It's a well-known fact that small businesses are more susceptible to cyber-crime than many of their larger counterparts. A lack of funding and resources means that few small to medium-sized businesses can afford to pay for vulnerability assessments or penetration testing of their network security.
Elizabeth Gan

War game reveals U.S. lacks cyber-crisis skills - 0 views

  •  
    This article discusses how a simulated war game called "Cyber ShockWave" can turn any electronic item, for example, cell phone or computer can be "weapons" used to shut down the Internet during terrorist attack. The notion of privacy and civil liberties, should expect to be ceased for Americans during a crisis of that level. During this mock scenario, it was revealed that "[The United States] don't have the authority in this nation as a government to quarantine people's cellphones." Which during a state of emergency brings to question if Internet carriers should allow their networks to be monitored. How secure is online security, and who is the enemy, becomes difficult to discern, as any threat to national security arises.
Sarah Manson

Cyber mafia out to steal your identity - dnaindia.com - 1 views

  •  
    The cybersecurity threat in India is demonstrated in Symantec's Internet Security Threat Report that outlined the latest threat for computers which involves the Trojan viruses sending confidential data to a host server. This information is then used by cyber mafia to carry out financial transactions in various countries resulting in identity theft.
M M

Govt to develop own operating system - Infrastucture - Enterprise IT - Tech - The Times... - 0 views

  •  
    India's government is planning to develop its own OS due to security reasons. They do not want to rely on foreign operating systems as they believe this makes them more susceptible to cyber attacks. 
Gina Spithakis

Cyber crime made easy; A burgeoning service industry is springing up around the creatio... - 0 views

  •  
    With technology making it easier to for computer novices to steal user ids and data, now anyone can become a cybercriminal. This article showcases how easy it is to buy Zeus online, malware software which is used to steal information including online banking user ids and passwords and even security plans of US airports. Does accessibility turn you into a criminal? I still think if you're going to be a criminal you will find a way. Technology is certainly making it easier but you will only search for ways to hack into user info if you intend to steal in the first place.
Gina Spithakis

Cyber crooks target banks, social networks: report - 1 views

  •  
    Social networks become the prime target for cybercrime, according to a Cisco report. Malicious code is masked as an online game on a social networking site, that once clicked, infects the user's computer without them knowing
Rachael Bolton

Cybersecurity meet ends with calls for global cooperation - 0 views

  •  
    Government and industry leaders in the US call for international cooperation on internet security. The three-day conference discussed issues ranging from cyberterrorism to organised cybercrime. Measures suggested included "cyber defense exercises" and enlisting the support of the private sector.
Tom Berzins

There's more to security risk management than just patching - 0 views

  •  
    With an increasing number of critical systems being placed within virtual environments, security is now understandably a prime concern. Systems can be attacked, and valuable information and assets can be compromised. maybe looking at a Vulnerability management system?
Amit Kelkar

US urged to step up efforts to secure internet - 1 views

  •  
    The US government is being encouraged by various committees and "experts" to increase regulation of the Internet. The Internet is compared industry to the car industry before regulation was introduced to make cars safer. Apparently the "Internet Wild West" is over!
Gina Spithakis

Verizon security expert optimistic about progress on cybersecurity - 1 views

  •  
    According to Peter Tippett, Vice President, Verizon, we will see far fewer cyber attacks by 2020, with the majority of them becoming targetted attacks instead. This will be aided by increased use of reputation systems and automation that will help users avoid sites and emails with malicious content.
Gina Spithakis

A Key Weapon to Thwart Cybercrime - 0 views

  •  
    The FBI cracks down on online crime as part of Operation Cyber Sweep in 2003. Although some would argue, that protecting users in the first place would be far more useful
Elizabeth Gan

Cyberwar Hype Intended to Destroy the Open Internet - 0 views

  •  
    This article discusses how Michael McConnell (former director of national intelligence), has suggessted that "we need to re-engineer the Internet to make attribution, geo-location, intelligence analysis and impact assessment - who did it, from where, why and what was the result - more manageable." Under the guise of protecting the state, it deems the "netizens," as possible enemies of the state.
Jaeun Yun

Survey of Government Internet Filtering Practices Indicates Increasing Internet Censorship - 2 views

  •  
    Online censorship is growing in scale, scope, and sophistication around the world," said John Palfrey, Executive Director of the Berkman Center for Internet and Society and Clinical Professor of Law at Harvard Law School. South Korea's filtering efforts are very narrow in scope, but heavily censor one topic, North Korea;
  •  
    This is 5 years of global survey on political, social and national security filtering conducted May 18, 2007
1 - 18 of 18
Showing 20 items per page