Digital security
Security issues
Cloud computing is considered a big security issues because from a security perspective, cloud-based computing still has to address several vulnerabilities before it can be considered the ideal answer to modern computing needs.(pmaconsulting.co.za)
One of the main issues is the nature of so-called “multi-tenant” clouds. A large number of different companies may all have their data and applications on a single cloud – and you won’t have any way of telling who’s sharing your cloud with you. You might even be sharing a cloud with your main competitors.(pmaconsulting.co.za)
If a single tenant’s application has a security flaw, there’s the potential that an attacker who manages to exploit this flaw will gain access not only to that tenant’s data and systems, but to yours too because you data will be stored from the server that is being attakced
Another security concern is that using cloud-based services involves handing your potentially sensitive data to an external third party, in the form of the service provider so your information is no longer secured as it was when you had it in your computer.(pmaconsulting.co.za)
Types of cyber crimes
1. THEFT OF TELECOMMUNICATIONS SERVICES
This cyber crime is the one in which phone breakers break into telecommunications of an organisation or company. criminals organisations can obtain access to dial-dial circuits and then make their own calls or sell call time to third parties (Gold 1999). Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employee's access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing "calling card" details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards.(www.crime.hku.uk)
2. TELECOMMUNICATIONS PIRACY
Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistible to many.(www.crime.hku.uk)
3. ELECTRONIC MONEY LAUNDERING AND TAX EVASION
For some time now, electronic funds transfers have assisted in concealing and in moving the proceeds of crime. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Legitimately derived income may also be more easily concealed from taxation authorities. Large financial institutions will no longer be the only ones with the ability to achieve electronic funds transfers transiting numerous jurisdictions at the speed of light. The development of informal banking institutions and parallel banking systems may permit central bank supervision to be bypassed, but can also facilitate the evasion of cash transaction reporting requirements in those nations which have them. Traditional underground banks, which have flourished in Asian countries for centuries, will enjoy even greater capacity through the use of telecommunications.(www.crime.hku.uk)
4. SALES AND INVESTMENT FRAUD
As electronic commerce becomes more prevalent, the application of digital technology to fraudulent endeavors will be that much greater. The use of the telephone for fraudulent sales pitches, deceptive charitable solicitations, or bogus investment overtures is increasingly common. Cyberspace now abounds with a wide variety of investment opportunities, from traditional securities such as stocks and bonds, to more exotic opportunities such as coconut farming, the sale and leaseback of automatic teller machines, and worldwide telephone lotteries (Cella and Stark 1997 837-844). Indeed, the digital age has been accompanied by unprecedented opportunities for misinformation. Fraudsters now enjoy direct access to millions of prospective victims around the world, instantaneously and at minimal cost.(www.crime.hku.uk)
5. ELECTRONIC FUNDS TRANSFER FRAUD
Electronic funds transfer systems have begun to proliferate, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.(crime.hku.uk)
Source: http://www.google.co.za/imgres?imgurl=http://maconeastlibraryprojects.wikispaces.com/file/view/creatvie_commons_picture.png/294338428/creatvie_commons_picture.png&imgrefurl=http://maconeastlibraryprojects.wikispaces.com/Creative%2BCommons%2BLicenses&h=437&w=508&tbnid=EHFxad5ZE1itGM:&zoom=1&docid=zUCgHF64KeobDM&ei=8_Z3VdygPIWy7QaU6YKAAg&tbm=isch&ved=0CBsQMygAMABqFQoTCJzm0Z_chMYCFQVZ2wodlLQAIA
References
Australian Institute of criminology.2015.9 types of cyber crime.[online].Available at: http://www.crime.hku.hk/cybercrime.htm
PM&A.2014.Cloud computing: why is security an issue?.[online].Available at: http://pmaconsulting.co.za/news/cloud-computing-why-security-issue
Forbes.2013.How to prevent cyber crime.[online].Available at:http://www.forbes.com/sites/thesba/2013/08/28/how-to-prevent-cyber-crime/
This cyber crime is the one in which phone breakers break into telecommunications of an organisation or company. criminals organisations can obtain access to dial-dial circuits and then make their own calls or sell call time to third parties (Gold 1999). Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employee's access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing "calling card" details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards.(www.crime.hku.uk)
2. TELECOMMUNICATIONS PIRACY
Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistible to many.(www.crime.hku.uk)
3. ELECTRONIC MONEY LAUNDERING AND TAX EVASION
For some time now, electronic funds transfers have assisted in concealing and in moving the proceeds of crime. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Legitimately derived income may also be more easily concealed from taxation authorities. Large financial institutions will no longer be the only ones with the ability to achieve electronic funds transfers transiting numerous jurisdictions at the speed of light. The development of informal banking institutions and parallel banking systems may permit central bank supervision to be bypassed, but can also facilitate the evasion of cash transaction reporting requirements in those nations which have them. Traditional underground banks, which have flourished in Asian countries for centuries, will enjoy even greater capacity through the use of telecommunications.(www.crime.hku.uk)
4. SALES AND INVESTMENT FRAUD
As electronic commerce becomes more prevalent, the application of digital technology to fraudulent endeavors will be that much greater. The use of the telephone for fraudulent sales pitches, deceptive charitable solicitations, or bogus investment overtures is increasingly common. Cyberspace now abounds with a wide variety of investment opportunities, from traditional securities such as stocks and bonds, to more exotic opportunities such as coconut farming, the sale and leaseback of automatic teller machines, and worldwide telephone lotteries (Cella and Stark 1997 837-844). Indeed, the digital age has been accompanied by unprecedented opportunities for misinformation. Fraudsters now enjoy direct access to millions of prospective victims around the world, instantaneously and at minimal cost.(www.crime.hku.uk)
5. ELECTRONIC FUNDS TRANSFER FRAUD
Electronic funds transfer systems have begun to proliferate, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.(crime.hku.uk)
How cyber crime can be prevented or reduced
Prevention step one: education and training
You need to train your employees to learn about the access of the organisation network and the information of the organisation because making them aware of the cyber crime so that you are protected from the cyber crime.(forbes.com)
Prevention step two: securing computers, digital assets and networking
Update your software protection regularly like the intrusion prevention system and anti-viruses software's because if your not protected it is easy for cyber hackers to access your system and intrude so you must be always safe by being updated on your software.(forbes.com)
Images for creative common licences
Source: http://www.google.co.za/imgres?imgurl=http://maconeastlibraryprojects.wikispaces.com/file/view/creatvie_commons_picture.png/294338428/creatvie_commons_picture.png&imgrefurl=http://maconeastlibraryprojects.wikispaces.com/Creative%2BCommons%2BLicenses&h=437&w=508&tbnid=EHFxad5ZE1itGM:&zoom=1&docid=zUCgHF64KeobDM&ei=8_Z3VdygPIWy7QaU6YKAAg&tbm=isch&ved=0CBsQMygAMABqFQoTCJzm0Z_chMYCFQVZ2wodlLQAIA
References
Australian Institute of criminology.2015.9 types of cyber crime.[online].Available at: http://www.crime.hku.hk/cybercrime.htm
PM&A.2014.Cloud computing: why is security an issue?.[online].Available at: http://pmaconsulting.co.za/news/cloud-computing-why-security-issue
Forbes.2013.How to prevent cyber crime.[online].Available at:http://www.forbes.com/sites/thesba/2013/08/28/how-to-prevent-cyber-crime/
No comments:
Post a Comment