Wednesday, May 6, 2020
Summary Cyber Security Principles And Policy Options
Summary for Cyber security - principles and policy options Cyber security is one of the major problem now a days because this problem doesn t consent with a single company or a state, all over the world are facing Cyber security problems. Some of the countries are consistently improvising their security. Some of the most prescient threats to cyber security are online identity theft, critical infrastructure protection, industrial cyber espionage and bonnets. Online identity theft is mostly seen in bank sectors because banks are encouraging online transactions because of their easy services and also with low transaction cost compare to that of transaction at physical branches. But banks have not kept up authentication, to identifyâ⬠¦show more contentâ⬠¦by remotely destroyed a large diesel power generator by simply issuing SCADA commands. Industrial cyber espionage, the information of the company which is stored in the digital form on a corporate network which made its compotators to remotely gain access to the proprietary information . Which leads to the down fall of the company shares etc. In 2005 executives at several large Israeli companies have been arrested for hiring private investigators to install spyware to steal corporate secrets from competitors. Botnets a network of millions of computers under the control of an attacker which is used to carry out wide range of services, which includes include sending spam, hosting phishing attacks, committing online-advertising fraud, launching denial-of-service attacks etc. This botnets can employ attacks on all of the above categories. These are crafted for a particular purpose, which vary based on the preferences of the miscreant controlling the botnet, called a botnet herder. The size of botnets varies, the more important factor is what purpose they are being put toward. The Conficker botnet which was huge, infecting millions of computers but which is no harm full. Economic barriers to improving cyber security are Misaligned Incentives, Information Asymmetries an d Externalities. Misaligned Incentives, information system fails when the person protecting the information is not the one who suffers when the information is
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.