Skip to main content

Home/ Internetni praktikum/ Group items tagged attacks

Rss Feed Group items tagged

Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
petra funtek

After Leveson: the internet needs regulation to halt 'information terrorism' | Media | ... - 1 views

  • After Leveson: the internet needs regulation to halt 'information terrorism'
  • We are heading into a future of no regulation with the internet where its monoliths will have plenty of clout, pretty well unfettered by democratic national governments (but not totalitarian ones, like China).
  • How does information terrorism work?What's coming in the future could be far more deadly, involving widespread smears, character assassinations and the destruction of companies and maybe even institutions. And by then we may not have a vigorous press to hold it to account.
  • ...4 more annotations...
  • it is no longer reasonable for the big players - the Googles, Facebooks, YouTubes and Twitters - to say: "Nothing to do with us, guv, we only provide the pipes. What goes through them, that's up to the folk who put it there."
  • To illustrate an example of information misuse, it's worth recounting the alarming experience of a work colleague at the hands of Facebook. Someone he did not know took his name and set up a Facebook page purporting to be his, along with a photo and several intimate details, some true, some false.
  • Citing "freedom of expression", which like motherhood and apple pie is impossible to attack, they will host their anonymous contributors' bullying, lies, smears, breathtaking invasions of privacy
  • An entirely new information world is rising in which each of us can be readers and editors, contributors and subscribers, and maybe even proprietors, at the same time.
Miha Naprudnik

Controlling the web - Fault Lines - Al Jazeera English - 0 views

  • SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were drafted on request of the content industry, Hollywood studios and major record labels. 
  • The US government says it must be able to fight against piracy and cyber attacks. And that means imposing more restrictions online. But proposed legislation could seriously curb freedom of speech and privacy, threatening the internet as we know it.
  • Can and should the internet be controlled? Who gets that power? How far will the US government go to gain power over the web? And will this mean the end of a free and global internet?
Nuša Gregoršanec

BBC News - Child safety measures to protect against internet threats - 0 views

  • Child safety measures to protect against internet threats
  • In a poll of over 19,000 parents and children conducted by security firm Norton, 7% of UK parents said they had absolutely no idea what their kids were up to on their computers and phones.
  • Even more worryingly, 30% (39% worldwide) said they had suffered a "serious" negative experience. This included, among other things, invitations to meet online "friends" in real life and exposure to indecent pictures of someone they did not know.
  • ...7 more annotations...
  • The ever-growing adoption of social networks, instant messages and mobile communication leaves the door open to more subtle attacks - both of a technological and psychological nature.
  • "Parents must realise that technology alone can't keep children safe online," Deborah Preston, the company's internet security advocate.
  • "To be truly safe it requires not only technology, but also a combination of open and ongoing dialogue and education between parents and children."
  • On social networks, account hijacking - where a child's account is accessed for a practical joke or more sinister purposes - can cause considerable distress.
  • A poll by Virgin Media suggests that 38% of parents whose children have suffered from cyberbullying feel unable to protect them due to a lack of knowledge and understanding of how the online world works.
  • This, Mr Abdul argued, could only be solved through greater education and a more honest understanding from parents about how real and damaging the effects of online bullying could be.
  • Mr Abdul added, the correct software, education and parental supervision means children can also be protected both at home and away.
donnamariee

Better Policy Through Better Information | John O. McGinnis | Cato Unbound - 0 views

  • Can Internet activism work?
  • is importantly correct that the Internet can help redress the balance between special and more encompassing interests by reducing the cost of accessing information. Such reduction redounds to the advantage of diffuse groups more than concentrated groups because reduced costs can temper the former groups’ larger problems of coordination.
  • earing that more information may enable citizens to better organize to attack their privileges, they have tried to restrict emerging technologies of free communication as long as these technologies have been around.
  • ...4 more annotations...
  • In a democratic state like ours, the primary interest groups are not authoritarian cliques, but private actors, like public sector unions and trade associations, which have the leverage to pressure politicians to use public power on their behalf. And, like authoritarian leaders, such groups are desperate to avoid transparency to retain their benefits. A case in point is the opposition of teachers' unions to publishing evaluations of schools and teachers on the Internet. And many interest groups have tried to prevent laws requiring Internet disclosure of campaign contributions.
  • Yet the results of policies are contestable. And it is often hard for citizens who are distracted by many enterprises more interesting than politics to find good information about policies' likely outcomes. Most people also have a better intuitive sense of how policies will affect their short-term interests than the long-term interests of society, even if the long-term effects may be of great personal as well as social benefit.
  • The Internet provides an important mechanism of such social discovery. Because of the greater space and interconnections that the Internet makes available, web-based media, like blogs, can be dispersed and specialized and yet connected with the wider world. As a result of this more decentralized and competitive media, the web generates both more innovative policy ideas and better explanations of policy than were available when mainstream media dominated the flow of political discussion.
  • In short, over time the Internet and allied aspects of the computational revolution can create more focused and more accurate knowledge about the consequences of social policies. This knowledge in turn can help more citizens focus more on what they have in common—their shared goals and policies that may achieve them—rather than on the unsupported intuitions or personal circumstances that may divide them. Of course, some citizens will remain ideologues, impervious to updating on the facts. But democracy moves by changing the middle, not the extremes. Like other mechanisms that increase common knowledge, the Internet can give wing to the better angels of our nature.
  •  
    essaytheme 
1 - 6 of 6
Showing 20 items per page