UK Government Suggests Cyber-security Strategies for Daily Consumers
The Government of United Kingdom just released its strategy-based report titled "Cyber Security Strategy," which highlights the real and increasing dangers from malware along with Internet-crime, as well as the resultant inferences relevant for the activities of agencies of law-enforcement, published Virtual Strategy dated February 24, 2012. At the end though, the report outlines essential suggestions so the Government may establish one trustworthy body, which will provide the latest and complete information to everyone in general, along with recommendations for the maintenance of cyber-security standards, which will remedy too much technical details and any form of confusion within the existing circumstance.
Moreover, the research paper states that the earlier online assault bombarded e-mails, which masqueraded as a bank soliciting Internet banking credentials. Consequently, at least some less savvy e-mail users got fooled into divulging their login details, which the cyber-criminals sold to other crooks. Further information extracted in this manner included credit card details alternatively additional sensitive data, also sold for others to exploit. Currently, "Advanced Persistent Threats" (APT) is what sophisticated cyber-criminals prefer, wherein after choosing a high-profile target they employ different methods for penetrating its networks.
Commenting on this report, Security Consultant Briony Williams at Commissum stated that it was intriguing, as it didn't fundamentally suggest the utilization of more firewall/anti-virus programs rather it emphasized on human solutions over those that were technical. Virtual Strategy published this.
Also, erstwhile Director of CIA, Hayden commented that it was necessary to constantly recall the way challenges to cyber-security emerged as truly fresh and varied. According to him, the rules hadn't been formulated regarding all that was desired alternatively which would let the government operate in cyber-space because of security involved. Libn.com published this on February 24, 2012.
Eventually, to make the above lucid, the paper mentions the well-known assaults of 2011. First, a hack into the PlayStation Network of Sony that leaked out 77m credit card details, including their expiration dates, accounting for $171m-or-more in overall expense and a maximum of $1.25bn in business foregone. Second, the breach against RSA Security that enabled the hackers to access databases of 20% of Fortune-100 organizations.
Related article: US Passes Baton to Asia in Spam Relay
» SPAMfighter News - 02-03-2012