Wednesday, July 7, 2010
Making an IMPACT on Cyber-terrorism
Sunday, June 6, 2010
Cyber terrorism: fact or fiction?

In 2000, a disgruntled employee rigged a computerised control system at a water treatment plant in Australia and released 200,000 gallons of sewage into parks, rivers and the grounds of a major hotel. Hackers have already gained access to the American air traffic control system — in fact, they caused a partial shutdown of the system in Alaska. And the Office of the Inspector General has warned that further modernisation of air traffic control, using internet protocol technologies, will create more opportunities for those intent on mischief.
In a security audit, it identified no fewer than 763 potential vulnerabilities that would allow an intruder to execute remote commands or introduce malicious software. The jury is still out on whether cyber terrorism will be a major threat in the short to medium term. But in the meantime it does no company or organisation any harm to beef up its network security.
Even the great Jack Bauer in the current series of 24 wasn’t able to stop terrorists from infiltrating air traffic control and putting two planes on collision course.
What’s science fiction today often becomes science fact tomorrow.
Tuesday, May 11, 2010
How can I protect myself from cyber-terrorism ?

1.All accounts should have passwords and the passwords should be unusual, difficult to guess.
2.Change the network configuration when defects become know.
3.Check with venders for upgrades and patches.
4.Audit systems and check logs to help in detecting and tracing an intruder.
5.If you are ever unsure about the safety of a site, or receive suspicious email from an unkown address, don't access it. It could be trouble.
Tuesday, April 20, 2010
CSI


About CSI:
Computer Security Institute (CSI) is the leading membership organization and provider of education for the information security community. CSI serves the needs of security professionals worldwide through conferences, educational events, research and publications, blogs, podcasts and awareness tools.
CSI 2009 was held October 24-30 ,2009 in Washington,D.C .
CSI 2010 will be held October 25-29,2010 in Washington,D.C.
CSI Computer Crime and Security Survey 2009
This survey marks the 14th annual edition of the CSI Computer Crime and Security Survey, making it the longest-running project of its kind in the security industry.
Several new questions were added to the CSI survey this year, but the survey continues to describe what kinds of attacks respondents' organizations experienced and how much security incidents cost those organizations. The survey includes information about targeted attacks, incident response and the impacts of both malicious and non-malicious insiders. It contains details about respondents' security programs, including budgeting, policies implemented, tools used, satisfaction with security tools and budgets, degree of outsourcing, use of metrics and effects of compliance requirements.
Also new this year, the comprehensive edition of the survey compares CSI's findings to those of the Verizon Business RISK Team Data Breach Investigations Report, the Ponemon Institute's Cost of a Data Breach report and the Symantec Global Internet Threat Report.
Respondents reported big jumps in incidence of password sniffing, financial fraud, and malware infection.
One-third of respondents' organizations were fraudulently represented as the sender of a phishing message.
Average losses due to security incidents are down again this year (from $289,000 per respondent to $234,244 per respondent), though they are still above 2006 figures.
Twenty-five percent of respondents felt that over 60 percent of their financial losses were due to non-malicious actions by insiders.
Respondents were satisfied, though not overjoyed, with all security technologies.
Most respondents felt their investment in end-user security awareness training was inadequate, but most felt their investments in other components of their security program were adequate.
When asked what actions were taken following a security incident, 22 percent of respondents stated that they notified individuals whose personal information was breached and 17 percent stated that theyprovided new security services to users or customers.
When asked what security solutions ranked highest on their wishlists, many respondents named tools that would improve their visibility—better log management, security information and event management, security data visualization, security dashboards and the like.
Respondents generally said that regulatory compliance efforts have had a positive effect on their organization's security programs.
This year's survey results are based on the responses of 443 information security and information technology professionals in United States corporations, government agencies, financial institutions, educational institutions, medical institutions and other organizations. Their responses cover the security incidents they experienced and security measures they practiced from the period of July 2008 to June 2009.
Sunday, April 18, 2010
Fighting cyber terrorism

Wednesday, April 14, 2010


