#Cyber attacks In the real world, you only have to worry about the criminals in your city. But in the online world, you have to worry about criminals who may be located anywhere on the planet. Many hotbeds of online criminal activity are located in cities whose police forces are overextended already fighting eal-worldcrimes and who lack the resources and expertise to investigate online activity. And in the past decade, the criminals themselves have changed. In 2003, all the malware was still being written for fun by hobbyists, but now it being produced by professional criminals, hacktivists, and governments who can invest big money to craft attacks that deliver massive payoffs. What are the biggest threats? Bitcoins Bitcoins only have value when the transactions are confirmed by at least six members of the peer-to-peer network. Users who participate in transaction confirmations are rewarded with Bitcoins, a process that is called mining. As the value of a Bitcoin has increased, mining has become harder, because more people want to do it. Today, to make real money at mining Bitcoins, you need powerful computers but those computers don necessarily have to be yours. Some of the largest botnets run by online criminals today are monetized by mining. So an infected home computer of a grandmother in Barcelona for example, may be mining Bitcoins worth tens of thousands of dollars a day for a Russian cybercrime gang. Cyber-spies Companies and governments spend money on espionage. Cyber-spies use rojansand ack doorsto access data on their targetscomputer networks, remotely monitor them, and perform actions on them, such as keylogging to collect passwords or eavesdropping through the infected computer microphone. The most effective method to protect data against cyber-spying is to process confidential information on dedicated computers that are connected not to the Internet. Critical infrastructure should be isolated from public networks. Exploits Cyber attacks rely on exploitation of ulnerabilitiesbugs in the source code of commonly used software to infect target computers. When professional criminals and governments got into the cyber attack game demand for new xploitsgreatly increased, and boutique companies sprang up to find and sell these exploitable bugs. Some U s.-based defense contractors are openly advertising positions for people with Top Secret/SCI clearance to create offensive exploits targeting iphones, ipads, and Android devices. As the U s. has engaged in offensive cyber attacks on other countries, other countries have followed suit, creating a cyber arms race that will continue to increase demand for exploits. Government surveillance The two most important inventions of our time, the Internet and the mobile phone, changed the world but they also have turned out to be perfect tools for the surveillance state. And in a surveillance state everybody is assumed guilty. PRISM, one of the governmental surveillance programs unveiled by Edward Snowden, monitors people known to be innocent and builds dossiers on everyone based on their Internet activity. Because the U s. is home to the most ubiquitous Internet services, search engines, webmail sites, browsers, and mobile operating systems, it can basically spy on the whole world at a level no other country can. However, the same advancements in computing power and data storage that have made wholesale surveillance possible have made also leaking possible. Leaking has become so easy that that it will keep organizations worrying about getting caught in any wrongdoing and maybe even force them to avoid unethical practices. The governments that watch over us know that we are also watching over them a
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011