Friday, October 4, 2019

Cyber crime, Cyber Security and Cyber War


Cyber ​​Crime

Simply stated, cybercrime can be interpreted as any type of criminal activity that uses telematics technology as its medium. The forms of cybercrime are various, ranging from the ' low tech ' such as defamation through social media to the ' high tech ' such as theft of credit card data and other customer data.

Cyber ​​Security

According to its terminology, cybersecurity is an activity to secure telematics resources in order to prevent cybercrime.

A process of improving security (security hardening), generally includes technical issues, such as security from the network side, operating system, data security and application source code. Financial and telecommunications institutions routinely hire cyber securitytechnicians to carry out penetration testing'. But aside from the technical side, security tightening activities must also include security against threats from internal personnel. There must be a number of protocols or SOPs that must be carried out by the personnel. In fact, it can be said that internal personnel is the highest security threat factor compared to technical matters.

In terms of human resources, cybersecurity practitioners can be grouped into at least 3 groups:

1. Security Analyst
Assigned to map potential security threats, then provide recommendations for mitigation of potential threats.

2. Forensic Specialist
As the name implies, this forensic specialist is tasked to conduct an investigation after a security leak incident. A forensic specialist must have qualified technical skills to be able to find and map the traces left by the perpetrators, to be able to track and find the perpetrators.

3. Hackers
The term hacker has been experiencing a distortion of meaning, whereas if the act of hacking is a criminal act even though it is not entirely like that. Hacker itself is a term given to people who have the ability to carry out acts of exploitation of telematics systems through various means.

Cyber ​​War

If conventional physical war can be seen in the form of destruction, the killing of a number of people and occupation of the territory, then this cyber warfare is largely behind the counter activities and is invisible. But the potential damage caused by this cyberwar could be as dangerous as conventional warfare. Activities that occur in cyber warfare, in general, are hacking and anti-hacking activities carried out 'officially' by the state. The goal starts with stealing data to paralyze the system owned by the enemy country.

24 comments:



  1. Magellan Roadmate Update provides the best possible guidance for GPS navigation. The Magellan Roadmate delivers a best in class GPS navigation experience with spectacular features. Also, it is developed with features to reduce driving stress, save time and money.




    Magellan Roadmate Update


    ReplyDelete
  2. This is really interesting. You are a very professional blog. ฝาก-ถอน isc888 have joined your feed and look forward to finding more good articles. I share your website on my social network!

    ReplyDelete
  3. Taking assignment help for your homework from allassignmenthelp.com is completely legit and in fact also very resourceful.
    programming assignment help
    essay typer

    ReplyDelete
  4. If you are facing any issues due to your Gmail get rid of emails related query. or can connect our experienced team engineers can resolve your all problems. for example What is Gmail temporary error? || How to fix Gmail temporary error?

    ReplyDelete
  5. For AOL Webmail is a free web-based email service that is provided by AOL mail. You can create an online address book for your important contacts through AOL Email service. To begin with the usage of AOL. and for more info visit aol.com/mail

    ReplyDelete
  6. Great post! I have definitely noted some points from it. It feels crazy how a well-composed assignment can have a strong impact on the grades. To help you achieve the academic goals, the MyAssignmentHelpAU platform has curated an exclusive Matlab Assignment Help Australia facility to help students enjoy their academic journey.

    ReplyDelete
  7. Byju's Founder is a former teacher who turned into an entrepreneur. He is the founder of ed-tech startup Byju's. He is the beloved son of physics and mathematics teachers from Azhikode village in the Kannur district of Kerala. This Byju's helping many students in achieving goals towards their career.

    ReplyDelete
  8. Brother printers are perhaps the best printer accessible in the market today. They are giving extreme fruition to every one of its rivals. In any case, now and then, because of availability issues, the user may confront the issue of the Brother Printer not interfacing with WiFi. Link brother printer not connected On the off chance that you at any point run over the present circumstance, don't stress. In this blog, you will discover the investigating steps to follow when your bother's printer will not associate with wifi. In the event that your Brother Printer isn't interfacing with WiFi, it very well maybe because of availability issues or fundamental equipment or programming issues. It can also be because of obsolete printer drivers. The following are the investigating steps that you can follow when your Brother Printer isn't associating with WiFi. In the event that you can't associate your Brother printer to the remote network, the principal thing you ought to do is to restart your devices including the printer, Wifi switch, PC/Laptop. Unplug the links from your printer and PC. Hang tight for quite a while and afterward interface your devices and now you are prepared to investigate.

    ReplyDelete
  9. I am a new user of HP products, so I don’t know anything about its features and tasks. I need to start a multiple HP printer with the help of 123.hp.com.setup

    ReplyDelete
  10. smart game booster 5 license key is useful tool used to optimize any of the systems to run games. So the tool is used to prepare and make heavy graphics and also use this tool to install and get the system up and running with just a few clicks. Also, this tool is used to install the system and create the best interactive interface. While using this tool to disable process diversity and create a new system, run it in games. Keep track of FPS along with game timers, with this dedicated easy-to-use app. Download the Sensible Video Game Booster Crack app to get and update the ATK affiliate driver in case you are using a 64-bit version of it. Similarly, it can assist in cleaning the RAM before the clients launch their games. In addition, this offers the Highlights that can provide better performance and it can even overclock the PC.Be that as it may, it likewise delivers more space and framework assets, handicaps the startup thing, tidies up RAM, and that’s only the tip of the iceberg. In this way, when it is done, the casing rate should be improved. What’s more, the game Booster ought to consistently keep the FPS esteems high when con. What is Smart Game Booster 5 License Key

    ReplyDelete
  11. This is so amazing post; I was checking continuously on this blog and I am impressed! Extremely helpful information particularly the last part. Thanks so much for the nice effort. Meanwhile, visit cun post utme past question pdf

    ReplyDelete
  12. Amazing article. Thanks for sharing with us. Do you need help for your online essay writing service? Sourceessay.com is the best services to explore maximum benefits regarding research paper help.

    ReplyDelete
  13. Thank for sharing this useful information.Need assistance an Epson printer setup, driver install, troubleshooting issues. Feel free to reach our website. Epson Printer Driver

    ReplyDelete
  14. We can instruct you properly if you need to set up an HP wireless printer using 123.hp.com. You can do the setup process easier if you have the correct technical knowledge about 123. hp/setup. First of all, you must go to open 123. hp/setup and open it in the internet browser.

    ReplyDelete
  15. Now stop wondering about the assignment help in Australia. Sample Assignment is one of the best assignment providers in Australia. Sample Assignment is your one-stop destination because it offers world-class facilities at your location with no restrictions. It is one of the most dependable and trustworthy assignment providers. Many students are into part-time jobs and occupations, which restricts them from crafting assignments according to the university guidelines. Therefore, they search for online chcage001 assessment answer to avoid a negative impact on their academics.

    ReplyDelete
  16. your post is awsome its very knowageful content i never read any blog like this your are a good wrighter and thankyou for this articel. Contact us for a Digital Marketing Consultant in USA

    ReplyDelete
  17. Finding difficulty in connecting the HP printer and computer wirelessly? If yes, then contact our customer support team. Our team has skilled and experienced professionals who will provide you with the necessary support. No matter whether you have the Windows or Mac operating system, we are ready to support you in connecting it with the wireless HP printer. If you want detailed information on HP printer setup, log on to 123.hp.com/setup

    ReplyDelete
  18. If you want to download free crack software so so I suggest this site is the best site for free crack softwareDr.Fone Crack

    ReplyDelete
  19. There is a wealth of information to be gleaned from reading this post, so it must cover a lot of ground. Here at My Assignment Help AU, we provide services that won't break the bank and can write assignments to your specific needs. Students in Australia Rely on Us for Homework Assistance. Hiring Us Will Guarantee You Will Receive Original Work On Time. check coou post utme form closing date

    ReplyDelete
  20. I appreciate the information you provide on your website; it is both relevant and pertinent ekiti state poly post-utme admission portal

    ReplyDelete
  21. Cybercrime is a pressing issue that requires our collective attention and vigilance. In today's interconnected world, it poses significant threats to individuals, businesses, and even nations. laptop to use CAD software . Let's work together to raise awareness, promote cybersecurity education, and develop robust systems to protect ourselves and mitigate the risks associated with cybercrime.

    ReplyDelete
  22. We would like to take this opportunity to thank you for the enormous amount of effort that you have put into the design of this website as well as the routine maintenance that it receives on a regular basis. Both of these aspects are very important to us.iaue post utme form 2023

    ReplyDelete
  23. This comment has been removed by the author.

    ReplyDelete

Cyber Threat Intelligence

Threat Intelligence is  data collected and analyzed by an organization in order to understand a cyber threat’s motives and attack behav...